
Protect your small and medium-sized farming enterprises (SMEs) against cyber incidents as you use technology in all areas of your operations, including email, text, online banking, and smart farming tools. Without strong protections, cyber threats can disrupt your operations, affect your profits and damage the trust you've built with your customers and vendors. Stay ahead of cyber risks to help your farm thrive in the digital age.
On this page
- Report a cyber incident
- Learn about cyber security and cyber incidents
- Protect your farming business from cyber incidents
- Access more cyber security information
- Cyber Security Toolkit
- Cyber security risks and resources: Safeguarding Canadian agriculture and agri-food
- Cyber security checklist
- New Cyber security preparedness guide: Plan to detect, respond, recover
- Questions to ask before you make your next AgTech purchase
- Cyber security: A case study in the dairy sector
- Cyber security glossary
- Download the Toolkit resource you need
If you believe you or your farming business was a victim of a cyber incident, please report it immediately to the Canadian Centre of Cyber Security. Your business details will remain confidential. Your reporting helps you:
- access expert assistance
- identify threats and prevent future attacks
- contribute to a stronger defense network
- protect the entire agriculture and agri-food industry from similar threats
While we can't guarantee that you'll be protected from all forms of cyber incidents, you can take steps to safeguard your agribusiness from cyber risks and significantly increase the protections you have from the most common cyber incidents.
Learn about cyber security and cyber incidents
What cyber security is
The main purpose of cyber security is to protect your devices (cellphones, laptops, computers, etc.), the information on them, and the services you use (both personal and business). Cyber security measures can flag suspicious downloads and spam emails, ensure that only people you authorize have access to your systems, and encrypt sensitive information. More importantly, cyber security protects valuable information on your devices and systems, such as feed rations, medications for animals, crop outputs and trends, and your customer and vendor information.
Examples of cyber incidents that affect the agriculture and agri-food industry
Phishing emails that try to steal your personal data or gain access to your business systems
- Phishing emails are deceptive messages designed to trick you into revealing personal information, such as passwords or credit card numbers
- These emails often look legitimate, resembling communications from trusted organizations like banks or online services, and may contain urgent requests to prompt immediate action
- Organizations are particularly at risk because employees can open these emails on their work computers, potentially compromising the entire network
Fraudulent texts and calls
- Fraudulent calls and texts are scams designed to deceive you into providing personal information or money
- These messages often appear genuine, resembling communications from banks or government, and often use urgent language so you answer quickly
- Always check the source before you respond to any unsolicited communication
Ransomware demands
- Ransomware demands are malicious messages that appear after your computer or files have been encrypted by ransomware
- These demands typically inform you that your data is locked, and you must pay a ransom to regain access
- They often come with detailed instructions on how to make the payment, usually in cryptocurrency
Network breaches that steal your sensitive data
- Network breaches that extract and steal your sensitive data are serious cyberattacks where hackers gain unauthorized access to your network and steal confidential information
- These attacks can happen through weak passwords, phishing emails, or outdated software
- For you, this might look like unexpected changes in your accounts, unfamiliar transactions, or unusual network activity
For more information on phishing and other common cyber threats, read Get Cyber Safe Guide for Small Businesses.
Anyone can be a target
A cyber incident isn't personal. Anyone, individuals and organizations, can be targeted. SMEs often believe they are too small to be targeted.
- Threat actors can easily and widely carry out attacks to trap unsuspecting and distracted victims. The harder it is to hack your farm system, the better the chance that threat actors will move on to another, easier, target — no one wants to be an easy target
- A cyber incident can have a lasting effect on you and your farming business
If you experience a cyber incident it can be challenging, but understanding its lasting impacts helps you recover and prevent future issues.
Your farming operation can be disrupted
Cyber incidents can severely disrupt your operations. For example, ransomware attacks can lock critical systems and data, halting production, distribution, and supply chain activities. Such disruptions can lead to:
- delays in delivering products to market
- spoilage of perishable goods
- loss of trust among your business partners and customers
The recovery process from these disruptions can be time-consuming and costly, further affecting business continuity.
The reputation of your agribusiness can be damaged
Reputation is crucial in the agriculture and agri-food sector, where trust and reliability are key to business success.
- Cyber incidents can erode customer trust if sensitive data, such as customer information or trade secrets, is compromised
- Negative publicity resulting from a data breach or cyber incident can damage your brand and reduce its competitive advantage
This reputational harm can have long-lasting effects, making it difficult to regain the confidence of customers, suppliers, and investors.
You could face legal and regulatory consequences
Agriculture and agri-food SMEs are subject to various regulations and standards concerning data protection and food safety.
- A cyber incident that leads to a data breach or compromises food safety protocols can result in legal action, fines, and penalties from regulatory bodies
- You may face lawsuits from affected parties, further straining your financial and operational resources
Compliance with post-incident regulatory requirements can also be burdensome and require significant effort and investment.
The supply chain and business ecosystem can be affected
Cyber incidents can have cascading effects on the wider supply chain.
- Disruptions in one part of the supply chain can impact suppliers, distributors, and retailers, causing broader economic repercussions
The interconnected nature of the agri-food sector means that a cyber incident affecting one company can have ripple effects, highlighting the need for strong cyber security measures across the entire supply chain.
Agriculture systems are at risk of a cyber incident
Targets can include your:
- production, financial, customer and other data
- wireless sensors
- automated and robotic machinery
- autonomous and semi-autonomous vehicles and equipment
- heating, refrigeration, lighting and ventilation controls and systems
Protect your farming business from cyber incidents
There are effective solutions and strategies to improve your preparedness.
Use passphrases or complex passwords
Use a new and unique passphrase or complex password for each of your accounts, including email and banking
- A passphrase, which is easier to remember and longer than a complex password, consists of several words strung together
- It should be at least 4 words and 15 characters in length
- If you can't use a passphrase, use a complex password
- It should consist of uppercase and lowercase letters, as well as numbers and special characters
- Don't use personal details, such as your birthday or pet’s name, and don't use common expressions, song lyrics or movie titles
Avoid using the "save password" option when using public or shared computers, and don't write your passphrases or passwords down on paper
Develop a plan for your business
Use the Cyber security preparedness guide to establish procedures and documentation to help detect, respond to and recover from cyber incidents, minimizing the impact on your farming business.
Prevent phishing attacks
Don't open emails if the sender is unknown to you and don't click on links or attachments in emails unless you're sure of their origin and legitimacy.
Look for the 7 red flags of phishing (Get Cyber Safe) in emails or texts you receive to help spot a phishing attack.
Other important tips
- Take the 10-question Get Cyber Safe self-assessment to help assess the security of your business accounts
- Protect your data
- Don't save personal or financial data on browsers if prompted, avoid auto-fill features
- Don't use public Wi-Fi to access your on-farm digital systems
- Instead of using public Wi-Fi, purchase and use a VPN (virtual private network) service for mobile devices
- Protect your accounts
- Enable multi-factor authentication on all your accounts, wherever possible
- Back up and store vital information regularly, offline or in an external drive, including vendor and client data and information
- Make sure your systems are always up to date
- The updates make sure the latest security patches are applied, protecting against vulnerabilities and cyber threats
- Reach out to your IT service providers and sector associations
- Get technical help and stay informed about new threats and how to manage them
- Take preventive action
- Install verified anti-virus/anti-malware software
- Take cyber security training
- Make sure you and your employees are cyber aware and on alert for threats like scams and phishing attempts
- The Government of Canada offers an online self-paced course about Cyber Security for Small and Medium Organizations. The course:
- is free of charge
- has topic-based modules ranging from 20-60 minutes in length to complete
- The modules can be taken as stand-alone lessons or combined in any order, depending on your interests
Access more cyber security information
- Canadian Centre for Cyber Security
- Get Cyber Safe
- Boost Your Business Technology Grant (Innovation, Science and Economic Development Canada)
- Why cyber security is important - Video (Farm Credit Canada)
- Taking your farm data to the digital cloud (Farm Credit Canada)
Cyber Security Toolkit
The Cyber Security Toolkit is designed for small and medium-sized farming and agri-food businesses who are looking for practical resources and easy-to-implement best practices to help with cyber security preparedness.
What's inside the Toolkit
Cyber security risks and resources: Safeguarding Canadian agriculture and agri-food
As agricultural and agri-food businesses become more digitized and connected online, the need to safeguard against cybercrime increases. Precision agriculture, automation and smart farming technologies contribute to efficiency and productivity, but without proper safeguards, the door opens to cyber vulnerabilities that can range from disruptive to devastating effects, including paralyzing business and impacting profitability and consumer trust.
In this digital landscape, it's critical to understand and guard against cyber risks.
What cyber security is
Cyber security is the practice of safeguarding computer systems, networks and data from digital disruptions. Examples of cyber incidents affecting the agriculture and agri-food industry include fraudulent texts, phishing emails that seek to gain private info and access to systems, and ransomware demands, to name just a few.
At risk agricultural systems
Targets can include production, financial, customer and other data, wireless sensors, automated and robotic machinery, autonomous and semi-autonomous vehicles and equipment, and heating, refrigeration, lighting and ventilation controls and systems.
Quick tips to minimize your risk
- Have different passwords for each account, preferably 12 characters-long, including 1 upper and 1 lower case letter, and 1 special character. Change passwords frequently.
- Enable multi-factor authentication on all your accounts, wherever possible.
- Back up vital information regularly, including vendor and client data and information. Store backup information offline or in an external drive.
- Don't open unknown emails, and don't click on links or attachments unless you're sure of their origin and legitimacy.
- Don't save personal or financial data on browsers if prompted and avoid auto-fill features.
Get started today with these tools and resources
Canadian Centre for Cyber Security
A go-to resource for expert advice, guidance, services and support, and to report cyber incidents
Public Safety Canada
Access the Canadian cyber security tool assessments.
Community Safety Knowledge Alliance
Access targeted resources to help protect your farming business
Cyber security checklist
Simple steps you can take today to improve your cyber security and help keep you and your business protected.
Secure your devices and data
- This includes the passwords of the routers for Wi-Fi network(s) and tractors and other machinery in the field.
- Employees are reminded to change their passwords every quarter and they cannot reuse a password.
- MFA adds an extra layer of security to accounts and makes it harder for threat actors to gain access.
Stay updated, stay safe
- Periodically checking app permissions ensures they don't access data that is not relevant to their function.
- Turn off the permission that allows an app to know your location when you are not using it.
- This includes key contact information on clients, vendors, partners, and any proprietary agricultural data collected from agriculture technology devices on your farm
For more information on how to minimize your cyber security risks, visit Get Cyber Safe.
New Cyber security preparedness guide: Plan to detect, respond, recover
In today’s digital age, it's essential to be able to quickly and effectively respond to cyber incidents. Use this guide to establish procedures and documentation that help detect, respond to and recover from cyber incidents, minimizing the impact on your farming business.
1. Detect
Monitor your systems and data and proactively plan for any cyber security incidents.
- Assign a cyber security lead to monitor your systems and data
- Make sure your employees know how to report security issues or unusual activity
- Make an asset inventory list, including those that are required to maintain your operations
- Identify key contacts, both inside and outside your farming business, to notify during an incident
- Maintain a list of reputable professional services that you could contact in the event of a cyber incident
- Develop a communications plan to inform your customers and the public if operations are affected
- Run anti-virus and anti-malware software on all devices
Make a contact list
Cyber security lead
Monitors systems and data, and is the employee point of contact. Record names and contact info.
- Cyber security lead:
- Alternate contact:
Other key contacts and service providers
In an incident, the cyber security lead informs all key contacts and liaises with professional service providers. Record names and contact info.
- Communications lead:
- Legal lead:
- Key suppliers:
- Key clients:
- Investors:
- Professional services providers:
2. Respond
Take immediate actions to contain and mitigate the impact of the attack.
- Disconnect all devices from the network immediately
- Suspend employee access temporarily, to prevent further incidents
- Seek professional cyber security services if needed
- Change affected passwords and enable multi-factor authentication
- Notify your financial institution if financial information was compromised
- Communicate the incident to your key contacts and the public, as needed
- Report the incident to local police, the Canadian Anti-Fraud Centre and Canadian Centre for Cyber Security.
3. Recover
Restore systems and data, update security measures, and learn from the incident.
- Restore systems and data from backups
- Update all software, including your anti-virus software, firewalls and firmware
- Run anti-virus and anti-malware software on all devices
- Identify and address any security flaws
- Patch and update any security vulnerabilities
- Analyze the incident and your response, and conduct a lessons learned exercise with all decision makers
4. Validate
Test and refine your cyber security preparedness.
- Regularly review each step of your preparedness plan to ensure all systems and assets are included
- Conduct walk-throughs of your plan, using specific incidents, to identify any vulnerabilities
- Perform simulations with your team to practice responding to a cyber attack
Test your backup systems to be sure of business continuity during an incident.
Questions to ask before you make your next AgTech purchase
As your farming business becomes more digitized and connected online, it's critical to guard against cyber security risks. These questions can help guide your conversation with agriculture technology vendors so you can make informed decisions about who you trust to protect your business from cyber security risks and safeguard your data and operations.
- Does the vendor have a good reputation?
- How long has the vendor been in business?
- Is the vendor known to you?
- Does the vendor work with other companies in your sector?
- Do they know your line of business or commodity?
- Are they expanding their reach in your sector, or are they new to your sector?
- Do the companies have a good reputation?
- Will the vendor provide contact information for customers you can speak to for feedback (known as reference customers)?
- Can the vendor explain your contract in plain language?
- Can they explain the clauses in your contract in a way that's easy to understand?
- Can they tell you where your information is stored, who has access, and how it is protected?
- What steps will the vendor take if there is a data breach that impacts data they have stored about you and your business?
- Have there been previous data breaches? If so, what happened?
- Can they explain simply how your data is stored and protected?
- Do they have an emergency response plan they can share with you?
This isn't a full list of questions, but it's a good starting point for talking with a new vendor.
Cyber security: A case study in the dairy sector
Agri-businesses of all sizes are vulnerable to cyber incidents. Here's one example of how a phishing attack could impact your business and what you can do to protect it.
Alex, a small dairy farmer, receives an email supposedly from the bank while working on a business computer.
The email says that Alex's bank account has been blocked. Wanting to reactive it, Alex clicks on the link.
Unfortunately, the email and link are fraudulent. Instead of leading to the bank's website, it downloads ransomware onto Alex's computer.
Alex's laptop is connected to the farm's entire network. The ransomware quickly spreads, encrypting all the farm's data.
This attack has severe consequences
Autonomous milking machines
The ransomware stops the autonomous milking machines, disrupting the milking schedule and impacting the cows' health and milk production.
Supply chain disruption
All supply-chain contacts and communications are encrypted, halting ordering and distribution.
- Alex can't place orders for feed, vet supplies, equipment, and can't receive updates on deliveries.
- The distribution process is crippled. Milk shipments are halted, inventory and order statuses are impacted.
Operational shutdown
Critical farm management software and records are inaccessible, impacting the farm's operations.
- The farm can't communicate with partners or manage logistics, leading to delays, missed deadlines, and potential reputational damage.
- Alex can't access email to reach customers.
- Many orders are delayed, shipments are missed, and trust with partners is eroded.
Alex's farm does not have an IT team or cyber insurance. Without incident restoration services, Alex feels forced to pay the ransom to decrypt data and resume operations. The financial loss and operational disruption are devastating.
Alex's situation could have been mitigated
- Cyber security training for Alex and employees could have helped them recognize phishing emails and avoid clicking suspicious links.
- Antivirus and anti-malware software could have detected and blocked the ransomware before it spread.
- Network segmentation can prevent malware from spreading.
- Regular backups to an isolated, off-network location would have made it easier for Alex to restore systems. Backing up data creates copies of important information, and storing back-ups separately from the main system, such as on an external hard drive or a secure cloud service, adds a layer of security.
- Cyber insurance can provide financial support and access to professional incident response services.
- Incident response planning ensures that all employees know how to respond to a cyber incident.
Stay vigilant to protect your business
Cyber security glossary
Anti-virus/anti-malware software
A program used to prevent, identify, and remove viruses and other malicious software from your computer.
Business continuity
An organization's ability to continue with essential functions during a disruption, such as a cyber incident or natural disaster. A business continuity plan or BCP outlines the protocol and processes an organization follows to ensure that operations continue with as little disruption as possible.
Cyber incident
Attempt by threat actors to cause harm, destroy, or gain unauthorized access to sensitive information in a networked computerized system.
Cyber safeguards
Measures taken to protect data, networks and computer systems from unauthorized access, theft, or damage.
Downtime
Not being able to access a system due to the failure of the system, application, or the entire network of a company. Downtime can occur due to maintenance activities, power cuts, or unexpected technical failures from cyber incidents. Consequences can include loss of revenue, decreased productivity, costs to recover systems and reputational damage.
External drive
A storage device that connects to your computer, often via USB (Universal Serial Bus), FireWire or Thunderbolt connection.
Incident Response Plan
A written document, formally approved by the senior leadership team, which helps your organization before, during and after a confirmed or suspected cyber security incident.
Internet of Things (IoT)
A network of physical devices that transfer data to one another without human intervention. IoT are not limited to computers and can include anything with a sensor, software, and network connection.
Malware
Abbreviation for 'malicious software'. Malware is designed to disrupt or harm computer systems.
Multi-factor authentication (MFA)
The use of two or more authentication methods to log into a system. For example, you are required to enter a code from an authenticator app after entering your password to log in. MFA prevents threat actors from gaining access with just one exploited password.
Network breach
When a threat actor finds a way to bypass your security to get inside your network. Once they have access to the system, they can gain unauthorized access to data, applications, and devices.
Phishing
A form of fraud that involves contacting victims through email, telephone, or text to trick them into sharing personal information. Phishing scams often aim to persuade victims to transfer money, reveal financial information, or share system credentials such as passwords.
Ransomware
A type of malicious software designed to block access to a computer system until a sum of money is paid.
Security patch
A software update that helps address vulnerabilities, bugs and resolves inconsistencies in a software.
Spam
Unsolicited communication sent in bulk. Spam can be sent via email, phone, text messages (SMS) and social media.
Threat actor(s)
An individual or group who tries to access data they aren't authorized to access or cause harm to digital systems. Often referred to as a "hacker" or "cyber criminal".
Virtual Private Network (VPN)
An encrypted internet connection that aims to provide a secure, private network connection for safe data transmission to and from networked devices.
Download the Toolkit resource you need
Feature

Dr. Janos Botschner from the Community Safety Knowledge Alliance and Christine Beauchamp from the Canadian Centre for Cyber Security tell us some true cyber heist stories