Today’s machines rely heavily on software for electronic controls, digital data transfer and guidance. How much access should owners get to a machine CPU to tinker with those systems? | KUBOTA PHOTO

Is right to repair a security vulnerability?

Brands should be proactive about allowing controlled CPU access to their equipment, security experts says

In May 2022, Agco announced it had become the victim of a ransomware cyberattack, which disrupted production at assembly plants. In May of this year, Germany-based implement manufacturer Lemken announced it too had been attacked by hackers. Equipment manufacturers across the board are working to protect their digital systems against malicious intrusion. At the same […] Read more

Cybersecurity experts offer tips to prevent a cybersecurity breach, handle an attack and mop up the fallout. | Getty Images

Digital defence must start with prevention

Saskatchewan cybersecurity expert Brennan Schmidt and Ali Dehghantanha of the University of Guelph offered the following tips to prevent a cybersecurity breach, handle an attack and mop up the fallout. Related story: Manage cybersecurity risks To prevent a breach • Take a comprehensive inventory of all technology and identify the most important and potentially vulnerable […] Read more

Farmers are used to risks from weather, pests and markets but are less prepared for digital threats.  |  Getty Images

Manage cybersecurity risks

Glacier FarmMedia – Farming involves risk. There’s all manner of weather to deal with, plus shifting markets, crop and animal diseases and unexpected production hurdles. Related story: Digital defence must start with prevention In response, farmers cover their acres with crop insurance, buy policies to protect against livestock price volatility and work feed options into […] Read more