The field lab for Data Driven Autonomous Cultivation & Robotics
Top

Cybersecurity

Cybersecurity is more topical than ever. The protection of valuable company data is central. Hackers pose a real danger, especially in the world of advanced horticulture. During our event on 23 November 2023, we learned how to secure your valuable information. Hackers are not only looking for data for their own gain, but can also bring down entire companies. Dutch horticulture is using more and more digital technologies, such as sensors, AI and robots. This also increases the risk of cyber incidents.

Cyber resilience checklist

If you can answer "yes" to all these statements, you are on the right track!

  • My email does not appear on the website: https://haveibeenpwned.com
  • I and my staff use a password manager to track and store passwords
  • I do not write passwords on loose sheets
  • I am aware of what could happen if my IT and OT systems fail
  • I have hard-to-guess, different and strong passwords for my devices and company accounts
  • I use multi-factor authentication to log into my systems
  • I, and/or my supplier regularly check that the devices and software we use are up-to-date
  • I and my colleagues can distinguish phishing emails from regular emails and report phishing emails

These tips have been prepared by Cyber Resilience Centre Greenport

Tips and tricks from BICT Group

One of our partners we are proud of is BICT Group. They offer smart ICT solutions that work.

If you surf to a news website or watch the news, it is abundantly clear: companies, regardless of their size, possess valuable data that cybercriminals are all too keen to get their hands on. Reliable IT security is absolutely essential for worry-free operations. With the right security solutions and BICT Group's expertise, Tomatoworld has effective protection against various threats, such as ransomware, targeted attacks, data breaches and fileless attacks. Thanks to two-step authentication and data encryption, advanced protection is provided, ensuring compliance with legal data protection regulations and standards for our company's data and systems.

Some quotes from BICT: "The user is the most important link of all" and "People determine whether technology can work" come out of their mouths.

Facts and tips from Erik Rutkens

"Anyone can hack, it's less difficult than it looks"

  • Highest amount extorted by Cybercrime is 41 million
  • In the year 1989 first form of randsomeware
  • Only 10% of cybercrime is solved
  • Tip: Prevention is most important
  • Tip: Do not use the default login and password 'admin'
  • 1:5 chance of a cyber attack
  • €300,000 average damage in a cyber incident
  • 10 days average process downtime after cyber attack
  • 60% companies bankrupt after incident

  1. Use strong passwords: Make sure you have complex passwords with a combination of letters, numbers and symbols. Prefer not to use default passwords and change them regularly.

  2. Two-step verification: Activate two-step verification wherever possible. This adds an extra layer of security, usually via a text code or an authentication app.

  3. Software updates: Make sure all your software, including operating systems, antivirus programmes and apps, is up-to-date. Updates often include patches for known security vulnerabilities.

  4. Secure connections: Always use encrypted connections, especially when sending sensitive information. HTTPS connections, for example, are more secure than HTTP.

  5. Awareness training: Make sure employees are aware of the risks of cyber attacks. Train them in recognising phishing emails and other forms of social engineering.

  6. Data backups: Make regular backups of all your important data. This will allow you to recover quickly in case of a data breach or ransomware attack.

  7. Network security: Use firewalls, secure networks and VPNs to restrict and secure access to your network.