Cybercriminals are increasingly setting their sights on industry, seeking out organizations with valuable data and weak or outdated security systems.
The Food and Agriculture sector is no exception. It has become an especially appealing target for bad actors because of the critical nature of its supply chains and the sensitive information companies manage.
When attacks occur, the consequences can be devastating. Victims face lost revenue, reputational damage, exposure of trade secrets, and major disruptions across the supply chain. Several incidents have already shown how a single breach can ripple through production and delivery networks.
For feed manufacturers, the stakes are high. These threats can halt operations, compromise safety, and erode customer trust. It is essential for every feed business to implement a comprehensive security plan that protects data, systems, and the continuity of their operations.
“For small feed companies, the most common misconception is that they're not big or glamorous enough to be a target,” says a security expert from a farmer-owned cooperative that represents rural business owners and the feed industry. “The fact they’re not a big institution with thousands of employees actually makes them even more lucrative as a target because they’re easier to access.”
“Bad actors may not necessarily be targeting them directly but are casting a wide net – and because these businesses don’t have the infrastructure or preventative mechanisms in place, they tend to be the fish that get caught in that net.”
Historically, feed mills and agronomy blending locations don’t tend to invest heavily in information technology (IT) or put people in roles dedicated to the protection of their systems and networks. However, attitudes do appear to be changing.
“We all had a big scare in 2022 with large corporations being publicly breached. It made us realize that we're now a target too.”
“There are usually two ways bad actors get into your environment,” continues the source. “One is because you invite them in; you get an e-mail or a text message and click on or install something that allows them to gain control. The other way is they analyze your software, hardware, or firewalls and see you’re not patched or up to date.”
“The reason ag retail is particularly vulnerable is because we have smaller budgets, smaller IT teams, and we wear a lot of different hats. If you're in harvest season, for example, your focus will be elsewhere, while larger businesses have dedicated security teams working on this 24/7.”
“What we should be doing is treating our businesses like navy ships – segmenting everything and putting bulkheads in the way. Segmentation means different parts of your business can remain effective and operational. Always assume something's going to be vulnerable and start taking on water, and make sure you don't sink.”
Finding the right IT and operational technology partners is really important, adds the source. Feed mills should think always be thinking holistically about the software and suppliers they use, what they want to achieve, and who's going to have access to what.
“In the IT world they say, ‘convenience is the enemy of security’,” says the source. “If you're a general manager, you should make sure your IT leader is working closely with the vendor who's installing an operational technology network from the get-go, so you can have these important conversations.”
None of us would leave home with our front door and windows wide open, but your business becomes just as exposed if your cybersecurity is not up to standard.
Jerrel Conerly, Cyber Security Advisor with the Cybersecurity Infrastructure Security Agency (CISA) assists companies across the U.S. in making sure their public-facing IT systems – such as websites, email infrastructure, and Operational Technology (which includes business process software) – are as secure as possible.
This service is available free of charge in the U.S., says Conerly, who spends a lot of time visiting companies and helping protect their facilities.
He works in the Food and Agriculture – Information Sharing and Analysis Center (Food and AG-ISAC), a team with over 20 years of experience in IT and cyber technology. The Food and AG-ISAC provides threat intelligence, analysis, and effective security processes to help food and agriculture companies detect attacks, respond to incidents, and manage risk.
Unfortunately, there is a dangerous level of complacency among feed manufacturers, he warns. “Some may feel they’re just too small to be a target,” he says.
Yet a continued rise in cyber-attacks shows this is certainly not the case. He encourages companies to prioritize implementing a robust cyber policy to protect themselves if they have not already done so.
Ransomware attacks – where malware encrypts your data and blocks access to your files – are expected to see continued increases across all industries in 2025. Although the Food and Ag sector sees fewer attacks than other critical infrastructure sectors, it is a strategically important sector for the U.S. population and economy that is tightly integrated and susceptible to cyber-attacks.
In 2024, the U.S. the Food and Ag-ISAC tracked 3,494 ransomware incidents, of which 212 were against the U.S. Food and Agriculture sector. This represented 5.8 percent of the total – up from the 5.5 percent reported for 2023. Among the other most impacted manufacturing sectors were critical manufacturing with 20.7 percent of the attacks and commercial facilities at 17.3 percent.
These types of incidents can cause widespread disruption and have a severe ripple effect, with consequences that multiply over time.
Not only could this cause significant issues for specific production lines, but processes and workflows will inevitably be impacted and delayed – potentially causing difficulties with planting or harvesting, for example.
Datacor recently hosted a panel discussion at its North America Regional Meeting, which took a deep dive into Information Security, addressing the growing concerns surrounding the protection of sensitive data, including supply chain logistics, customer information, and proprietary feed formulations in the animal feed industry.
Organizations in the Food and Ag sector should always be wary of an attack and raise efforts to minimize their exposure. According to The Food and AG-ISAC, manufacturing environments often rely on legacy equipment with vulnerabilities in control systems and patch management, which makes them particularly attractive to attackers.
Conerly points to a few simple steps that can help companies become more cyber-resilient:
Protect Yourself
Training your staff to be aware of these underhand approaches is imperative, but there are also several commonsense measures that are advisable.
Why are feed mills increasingly targeted by cybercriminals?
Feed mills are attractive targets because they often have smaller IT budgets, fewer dedicated security teams, and manage critical supply chain operations with sensitive data. Smaller companies are easier to access and may lack the infrastructure or preventative mechanisms that larger institutions have in place.
What is the biggest misconception small feed companies have about cybersecurity?
Many small feed companies mistakenly believe they're too small or not glamorous enough to be targeted, but this actually makes them more lucrative targets because they're easier to access and often lack robust security infrastructure.
What are the two main ways cybercriminals gain access to feed mill systems?
Attackers either trick you into inviting them in through phishing emails or malicious links, or they exploit unpatched software, outdated hardware, or vulnerable firewalls to gain unauthorized access.
How can feed mills protect themselves with limited IT resources?
Feed mills should implement strong passwords with multifactor authentication, regularly update and patch software, train staff on phishing and social engineering risks, back up data regularly, and segment their networks to isolate different business functions.
What is network segmentation and why is it important for feed mills?
Network segmentation means separating different parts of your business systems with protective barriers, similar to bulkheads on a ship. This ensures that if one area is compromised, other parts can remain operational and the entire business doesn't "sink."
What should feed mill staff know about phishing scams?
Staff should never click links or download attachments from unknown senders, verify requests for sensitive information or payments through direct contact, and be wary of urgent requests that play on emotions or create distractions to extract confidential business information.
How significant is the ransomware threat to the Food and Agriculture sector?
In 2024, the Food and AG-ISAC tracked 212 ransomware incidents against the U.S. Food and Agriculture sector, representing 5.8 percent of total attacks and an increase from 5.5 percent in 2023, with continued increases expected in 2025.
What free resources are available to help feed mills improve cybersecurity?
The Cybersecurity Infrastructure Security Agency (CISA) offers free assistance to U.S. companies to secure their public-facing IT systems, and the Food and Agriculture Information Sharing and Analysis Center provides threat intelligence, analysis, and security processes to help detect attacks and manage risk.
To learn more about Datacor Animal Nutrition and how our tools can help you design and manage recipes with confidence, ensuring excellent results and performance every time, get in touch.