Food Safety
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • PRODUCTS
  • TOPICS
  • PODCAST
  • EXCLUSIVES
  • BUYER'S GUIDE
  • MORE
  • WEBINARS
  • FOOD SAFETY SUMMIT
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin
  • NEWS
  • Latest News
  • White Papers
  • TOPICS
  • Contamination Control
  • Food Types
  • Management
  • Process Control
  • Regulatory
  • Sanitation
  • Supply Chain
  • Testing and Analysis
  • EXCLUSIVES
  • Food Safety Five Newsreel
  • eBooks
  • FSM Distinguished Service Award
  • Interactive Product Spotlights
  • Videos
  • MORE
  • ENEWSLETTER >
  • Store
  • Sponsor Insights
  • ENEWSLETTER >
  • Archive Issues
  • Subscribe to eNews
  • EMAG
  • eMagazine
  • Archive Issues
  • Editorial Advisory Board
  • Contact
  • Advertise
Food Safety
search
cart
facebook twitter linkedin
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Food Safety
  • NEWS
    • Latest News
    • White Papers
  • PRODUCTS
  • TOPICS
    • Contamination Control
    • Food Types
    • Management
    • Process Control
    • Regulatory
    • Sanitation
    • Supply Chain
    • Testing and Analysis
  • PODCAST
  • EXCLUSIVES
    • Food Safety Five Newsreel
    • eBooks
    • FSM Distinguished Service Award
    • Interactive Product Spotlights
    • Videos
  • BUYER'S GUIDE
  • MORE
    • ENEWSLETTER >
      • Archive Issues
      • Subscribe to eNews
    • Store
    • Sponsor Insights
  • WEBINARS
  • FOOD SAFETY SUMMIT
  • EMAG
    • eMagazine
    • Archive Issues
    • Editorial Advisory Board
    • Contact
    • Advertise
  • SIGN UP!
ManagementRecall/Crisis ManagementRisk Assessment

Food and Beverage Industry Cyber Security Risk Management: Does a HACCP-Based Food Safety Culture Provide Solutions?

September 19, 2017

Information technology systems, referred to by many as cyber systems, have become ubiquitous in nearly every component of our domestic and global food supply chains. While these systems bring substantial efficiencies and economic benefit, they can also become an Achilles heel in complex production systems and supply chains. Although strict food processing steps ranging from Hazard Analysis to system monitoring has improved food safety, the cyber controls and tools that are vital components within food processing systems may not be included in food safety system monitoring. These cyber-based components are often surreptitious pathways to the most important intellectual property, financial assets or process control systems, whether they are employed in production agriculture, transportation management, financial systems or as industrial controls. The use of widely available nefarious software tools provides crooks the ability to quickly and quietly break into almost any firm to disrupt the processes and operations or steal valuable information or money. As pointed out by a former director of the Federal Bureau of Investigation, there is little reason for crooks to rob banks in person these days. They can do it remotely, with far less risk and make a lot more money! Very often, a cyber penetration is merely a precursor or gateway to the actual crime. Such penetrations have led to ransomware attacks and have facilitated cargo theft via fictitious pick-ups.   

While we all see the news and read about hackers and their cybercrimes, few think they will be targeted by hackers. The truth is that it has probably already happened and many firms may not be aware they have been compromised. In recent visits to a number of diverse food firms, I have seen a disturbingly common situation where food processing control cyber systems are utterly unprotected. Owners and operators may not even have systems in place to detect compromise even though data from a variety of technology security event tracking firms confirm that the Retail and Food and Beverage sectors are more often attacked than banking and financial firms![1] The simple fact is that the food industry has evolved from a manual, hands-on and labor-intensive manufacturing profile to a largely automated environment that exploits a variety of information technologies and industrial controls. Some systems are based upon highly proprietary, custom software code, while others are simply off the shelf technologies that are widely used. However, nearly all are based on common and often outdated operating systems such as Windows 98, early Linux, IBM AS 400 (a version of UNIX) or even ZENIX. Even when newer, more sophisticated operating systems are employed, few protections may be in place for manufacturing floor industrial control systems. Worse, these control systems within a food manufacturing facility are often networked into other company administrative, financial, and management operating systems. For example, it is common to find the industrial controls networked with transportation management systems and purchasing management systems. Those small Internet of Things items within a firm can be the very tools used by hackers to attack or gain access to steal from or disrupt the operations of the firm.

This lack of protection of cyber-based components in food manufacturing environments is the result of many factors. These include the very manner in which the systems evolved over time to exploit the advantages of information technologies and how systems are integrated to improve efficiencies and reduce production cost. The bottom line approach to their evolution is a double-edged sword. While these cyber technologies provide direct financial benefit to the firm, they also create great risk especially when there is little to no awareness when something adverse. Adding to the perception of low risk is that the U.S. Food and Drug Administration (FDA) does not see cyber systems as a component of food safety risk. Certainly, FDA supports private sector’s need to secure their technological systems from attack, but they do not specifically include these systems in their Preventive Controls regulations or guidance. The convenience of these systems, their proven operational reliability, their efficiencies and labor cost-saving roles in the firm, the belief that “it won’t happen here” and the omission of regulatory oversight all contribute to the prevailing complacency and lack of cyber security priority and investment in the food and beverage sector.

It is understandable then that a lack of appreciation of these control system risks exists at the board room level. This lack of concern is also rooted in how these systems evolved within the sector, their phased adoption and often inadequately planned growth or expansion within food production facilities. One also must consider that historically there has been little reporting and awareness of actual cyber events within the food and beverage industry. The reluctance to share adverse experiences has also led to complacency. Observe the level of financial and technology investment in door lock systems, perimeter detection systems, area surveillance systems and compartmented access control for a modern food processing plant. However, the owners and operators of these same facilities often do not invest in network intrusion detection systems or multi-layered network defense at the most basic levels.

For example, consider the situation that involved the Target Corporation just a few years ago. The operating assumption within the firm was that their systems were not at risk because they were not aware that anyone had penetrated them. They allowed vendors to directly exchange information with internal technology systems without investing time or resources to monitor those linkages. Target did not know they had been penetrated nor that their customer’s financial information had been stolen until the banking system began to report, rather publicly, that their point of sale systems had been hacked. Some customers lost substantial amounts as a result. Target’s losses were considerable[2] and the damage to their brand was enormous. The senior company leadership team, including the CEO, was terminated.[3] Target is still recovering from this event even after a significant payout to the affected customers.[4] In brief, Target lacked critical security controls on their information networks. This was not, and is not, a unique situation.[5]

The integration of systems is the Achilles heel. There are so many points where these integrated cyber networks face or connect with the Internet that crooks have multiple pathways into and across the systems. The networks certainly provide management convenience and efficiency, but they also control or give access to many of the key production, management and safety functions on the plant’s line. They are often so integrated that virtually all of a company’s cyber functions can be accessed from any point within the network and, worse, they may be directly accessible from the Internet.

While it may be difficult to convince senior management and a board of directors to invest in an area for which there is little awareness of risk, the risk is substantial and often not lost on underwriters or investors. Premiums for business interruption and cyber system failures are rising and most underwriting firms have begun to assess the security and adversary event history of a firm’s IT systems. Indeed, many underwriters are finding lax controls within firms for their IT systems and employee cyber practices.[6]   

Perhaps just as important is the fact that many insurance and underwriting firms still lack sufficient historical data to write policies that provide adequate coverage. Recently, Charles Cowan, counsel to law firm Drinker Biddle & Reath’s insurance transactional and regulatory team, offered that “First and foremost in cyber risk is the need for data. Not a lot of reliable data exists about incidents and where future potential attacks might be, or of what size.” In the food and beverage sector, this is often because firms involved in such breaches are reluctant to make the event public or even make a claim due to the potential for brand damage and loss of consumer confidence in their product(s). Notwithstanding the reluctance to report, data from firms suggest the incidence of events is frequent and growing.

Cyber system protections are increasing in the financial, insurance, and regulatory sectors, but food sector clients, in which there are substantial investment in terms of money, accountability and rules compliance, have not been required to implement similar standards. Some firms explain that 24/7 access combined with convenient and rapid access across systems is vital to their production and delivery requirements. This access convenience for a firm’s production staff provides the same access convenience for those with bad intentions. If the production supervisor can simply link in from home via an open internet connection, so can anyone. Without using a secure VPN that requires two-factor authentication and a modestly complex password, the system is vulnerable. It is then not a question of if, but one of when a system will be compromised. In the food safety world, a risk assessed on when—meaning it will happen at some point—is the standard. Why is this not the case within the cyber component of food production systems?

As pointed out above, most of food and beverage firms have fully integrated network systems. The integration creates huge risk for the firm and its investors, underwriters and customers. The computer services industry used this convenience as a selling point for the networks they sought to install. Unfortunately, the risk of cybercrime can negate much of that convenience. A secure network system now requires compartmentalized networks that prevent intrusion at one point from providing access to all aspects of a facility’s networks. Even on the plant floor, production components, safety and quality assurance-quality control components, cleaning and sanitization, and packing components should all be compartmentalized. Yet, most often these production networks fully linked and are directly tied to human resources, financial, administrative, and communications networks within the firm.

A secure cyber network operating system must be maintained in the same manner that a mixer or slicer is regularly cleaned and serviced under the firm’s maintenance and Hazard Analysis and Critical Control Points (HACCP) programs. The firm must use strictly enforced access protocols, require air-gaps between network components, secure all network access ports and implement high security, user-access procedures. Certainly, a small measure of convenience will be sacrificed, but safety and security of the firm will be substantially improved. The firm’s products will be safer and their employees will have improved job security.

It must be recognized that all cyberattacks cannot be stopped. When one risk area is fixed, a new one often surfaces because systems are always evolving and technology is constantly improving. The holy grail of information technology and cyber systems security for food companies is active intrusion detection monitoring. As a comparison, if fencing around a plant is illuminated and under active surveillance, then criminals will not have the time needed to break into the plant. The same holds true for networks. No matter how secure a network is setup or how one employs the latest firewall technology and password protocols, hackers will find a way into the network if no one is actively watching the access gateways. Detection failure has been the root cause of many recent high visibility cyber events including the Target breach and a separate federal breach where millions of government employee records were stolen. Intrusion detection is not expensive, complicated or labor intensive. It requires relatively small additional investment. It does require prioritization, focus, discipline and adherence to the same standards by all network users. When an attempted breach is detected, whether via apparent employee account “phishing,” password testing, network port pinging/exploration, non-protocol-compliant access attempts or similar efforts to hack the network, network administrators can take active steps to block the attempted penetration or, if the penetration was successful, to intervene quickly, limit damage and reduce information exposure. Further, these systems can provide immediate forensic information to aid in both improving network security and identifying the source and nature of the unauthorized penetration. Employee training, discipline, up-to-date systems, segregated networks and layered defense are vital. The addition of an active intrusion detection system improves protection by providing early detection and warning of attempted breaches and providing a means to monitor network protocol compliance to aid in identifying training needs for staff.   

If we think in terms of HACCP concepts to assure food safety, the leap to applying similar concepts to securing our cyber-based process control systems across our facilities is not a large. Under HACCP and the new FDA Preventive Controls rules, food sector owners and operators conduct system risk assessment, develop and implement risk mitigation for critical components, and then monitor and test the system for function and potential failures. While it took many years to prove the value of the HACCP approach and even longer for wide adoption by both regulators and operators, it has become the standard that even the new Preventive Controls rules are founded upon. Developing a framework for reducing risk to cyber systems of all types is precisely this same process. Cyber risks must be considered, within the food and beverage sector, as presenting the same risks to the firm and the consumer as any food safety risk. A system failure, or worse a system penetration, resulting in intentional harm to consumers would be catastrophic to both the company and its investors. While cyber system event mitigation has not yet become a priority for regulators, in time it most certainly will. The question for today’s owners and operators is how long will it be before industry and regulators step up and require cyber hazard reduction measures? Who will be the next victim of a high consequence cyberattack? What will be the impact on their customers and consumers? What would such an event mean for the company brand? And what can I do to prevent it? 

John T. Hoffman, Colonel, USA, Retired, is Senior Research Fellow at the Food Protection and Defense Institute.

References
1. 2016 Trustwave Global Security Report, see also www.fbi.gov/investigate/cyber.
2. www.techtimes.com/articles/3794/20140226/target-loss-to-credit-thieves-pegged-at-400-million-q4-earnings-take-a-hacking.htm.
3. krebsonsecurity.com/2014/05/the-target-breach-by-the-numbers/.
4. money.cnn.com/2015/03/19/technology/security/target-data-hack-settlement/.
5. www.sans.org/reading-room/whitepapers/casestudies/case-study-critical-controls-prevented-target-breach-35412.
6. www.insurancejournal.com/news/national/2015/06/12/371591.htm.


Author(s): Colonel John T. Hoffman

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
to unlock your recommendations.

Already have an account? Sign In

  • people holding baby chicks

    Serovar Differences Matter: Utility of Deep Serotyping in Broiler Production and Processing

    This article discusses the significance of Salmonella in...
    Food Type
    By: Nikki Shariat Ph.D.
  • woman washing hands

    Building a Culture of Hygiene in the Food Processing Plant

    Everyone entering a food processing facility needs to...
    Sanitation
    By: Richard F. Stier, M.S.
  • graphical representation of earth over dirt

    Climate Change and Emerging Risks to Food Safety: Building Climate Resilience

    This article examines the multifaceted threats to food...
    Management
    By: Maria Cristina Tirado Ph.D., D.V.M. and Shamini Albert Raj M.A.
Subscribe For Free!
  • eMagazine Subscription
  • Subscribe to eNewsletter
  • Manage My Preferences
  • Website Registration
  • Subscription Customer Service

Food Safety Five Ep. 9: Major Changes at FDA, CDC, USDA Under Trump Administration

Food Safety Five Ep. 9: Major Changes at FDA, CDC, USDA Under Trump Administration

Food Safety Five Ep. 10: Scientific Advancements in Listeria Knowledge and Detection

Food Safety Five Ep. 10: Scientific Advancements in Listeria Knowledge and Detection

Food Safety Five Ep. 11: New Foodborne Illness Data and Research From CDC

Food Safety Five Ep. 11: New Foodborne Illness Data and Research From CDC

Food Safety Five Ep. 12: New Sanitation and Growth Prediction Methods for Listeria

Food Safety Five Ep. 12: New Sanitation and Growth Prediction Methods for Listeria

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Food Safety Magazine audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Food Safety Magazine or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Deli Salads
    Sponsored byCorbion

    How Food Safety is Becoming the Ultimate Differentiator in Refrigerated and Prepared Foods

Popular Stories

Image of Tyson Foods logo and the logos of Tyson Foods brands

Tyson Foods is Reformulating Food Products to Eliminate Petroleum-Based Synthetic Dyes

USDA building.jpg

More Than 15,000 USDA Employees Take Trump Administration's Resignation Offer

Woman reading the warning label on a bottle of wine

A 40-Year Hangover: Efforts to Revive 1980s Advocacy About the Potential Negative Effects of Alcohol Consumption

Events

May 12, 2025

The Food Safety Summit

Stay informed on the latest food safety trends, innovations, emerging challenges, and expert analysis. Leave the Summit with actionable insights ready to drive measurable improvements in your organization. Do not miss this opportunity to learn from experts about contamination control, food safety culture, regulations, sanitation, supply chain traceability, and so much more.

May 13, 2025

Traceability Next Steps—Supply Chain Implementation

Live Streaming from the Food Safety Summit: Join us for this engaging and highly practical workshop focused on building and sustaining traceability efforts across the food supply chain. 

May 13, 2025

Effective Sanitation Basics

Live Streaming from the Food Safety Summit: This dynamic workshop will help participants understand the sanitation process, effective monitoring, use of data streams, and root cause analysis basics.

View All

Products

Global Food Safety Microbial Interventions and Molecular Advancements

Global Food Safety Microbial Interventions and Molecular Advancements

See More Products
Environmental Monitoring Excellence eBook

Related Articles

  • Food security

    Cyber as a Vital Element in Comprehensive Food Safety and Defense Programs

    See More
  • Food Safety Management: Hazard- or Risk-Based?

    See More
  • mouse

    Food Safety Culture and Its Impact on Pest Management

    See More

Related Products

See More Products
  • 1119053595.jpg

    Food Safety for the 21st Century: Managing HACCP and Food Safety throughout the Global Supply Chain, 2E

  • 9781138198463.jpg

    Food Safety Management Programs: Applications, Best Practices, and Compliance

  • 9781032369990 (1).webp

    Food Safety Quality Control and Management

See More Products

Events

View AllSubmit An Event
  • March 11, 2025

    Change Management of Food Safety Culture: Effective Strategies for Achieving Greatness

    On Demand: During this webinar, attendees will gain practical knowledge on successful food safety culture change programs and transformation journeys from real-world experiences, enabling attendees to navigate challenges and achieve lasting improvements in their FSC initiatives.
View AllSubmit An Event

Related Directories

  • BD Food Safety Consultants LLC

    We are a Food Safety Training and Consulting firm located in Naperville, IL. Our primary goal is to provide with effective training and consulting solutions for Food Manufacturing and Distributing companies. Our training services include the following: FSPCA PCQI classes, IAVA Courses, IHA Accredited HACCP classes, FSVP Courses and Internal Auditor Training classes. We also offer Learning Management System for food manufacturing industry. Our LMS provides effective training solutions and easy training reporting system. Consulting service we offer includes complex assistance with preparations for SQF, BRC & FSSC audits, other 3rd party audits, FSMA (PC, FSVP, IA), HACCP, Dietary Supplements compliance & more. We serve our clients worldwide.
  • Aptar Food + Beverage - Food Protection

    Aptar Food + Beverage – Food Protection manufactures premium active packaging systems and processing equipment, applying its unique material science expertise to develop advanced packaging systems that help extend freshness and enhance safety for fresh-cut fruits, vegetables and seafood. The company’s newest groundbreaking technology, InvisiShield™, offers an antimicrobial packaging solution that seamlessly integrates into sealed packages to protect fresh-cut produce and other food products from bacteria, fungi and viruses. Other offerings include trays, pouches, containers, slicing equipment, lidding film, and tray sealing technology.
  • KLEANZ Food Safety Technologies

    KLEANZ Food Safety Technologies is proud to be the leader in software and services for the Food and Beverage industry. For over 30 years, we have ensured that our clients’ Food Safety, Sanitation Management, and Maintenance needs are satisfied and streamlined. We pride ourselves in helping our clients mitigate risk.
×

Never miss the latest news and trends driving the food safety industry

eNewsletter | Website | eMagazine

JOIN TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Directories
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • Instagram
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Food Safety
search
cart
facebook twitter linkedin
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Food Safety
  • NEWS
    • Latest News
    • White Papers
  • PRODUCTS
  • TOPICS
    • Contamination Control
    • Food Types
    • Management
    • Process Control
    • Regulatory
    • Sanitation
    • Supply Chain
    • Testing and Analysis
  • PODCAST
  • EXCLUSIVES
    • Food Safety Five Newsreel
    • eBooks
    • FSM Distinguished Service Award
    • Interactive Product Spotlights
    • Videos
  • BUYER'S GUIDE
  • MORE
    • ENEWSLETTER >
      • Archive Issues
      • Subscribe to eNews
    • Store
    • Sponsor Insights
  • WEBINARS
  • FOOD SAFETY SUMMIT
  • EMAG
    • eMagazine
    • Archive Issues
    • Editorial Advisory Board
    • Contact
    • Advertise
  • SIGN UP!