Saskatchewan cybersecurity expert Brennan Schmidt and Ali Dehghantanha of the University of Guelph offered the following tips to prevent a cybersecurity breach, handle an attack and mop up the fallout.
Related story: Manage cybersecurity risks
To prevent a breach
Read Also

Agriculture ministers agree to AgriStability changes
federal government proposed several months ago to increase the compensation rate from 80 to 90 per cent and double the maximum payment from $3 million to $6 million
• Take a comprehensive inventory of all technology and identify the most important and potentially vulnerable pieces.
• Use unique, solid passwords, enable multi-factor authentication where possible and consider using a password manager program.
• Limit farm system and sensitive information access to essential personnel.
• Educate the team to recognize cyber threats like unauthorized access to feeding systems.
• Conduct routine audits and simulations with security specialists and partner with trusted companies with strong cybersecurity measures before sharing data.
• Use updated systems and an encrypted Virtual Private Network to separate home and farm business access. Keep the farm network inaccessible to guests and suppliers.
• Engage with cybersecurity professionals for assistance and use automated and remote monitoring systems.
• Always back up information to external drives with no internet access and secure clouds and maintain detailed records of communications/transactions to identify discrepancies. Schmidt added that storing an external hard drive in a separate location, away from the farm, can keep information safe in case of an emergency such as a flood or fire.
During a breach
• Remain calm and immediately report the incident to your cybersecurity service provider. It will advise on next steps.
• Attempt to determine the scope and impact of the breach.
• Do not negotiate with hackers directly. Leave that to professionals, who will negotiate for lower ransoms if necessary.
• Never pay a digital currency ransom with your virtual wallet. Let the professionals handle that if payment is necessary.
After a breach
• Monitor all systems to ensure they are safe and meet security standards.
• Identify and address system vulnerabilities to stave off future breaches.
• The evolution of cybersecurity is ongoing; keep up to date on current threats and educate employees on changes.