Virtually everyone says " yes " when asked if digital protection is important . When push come to shove , though , labour or water gets more anteriority from the agriculturalist , and for suppliers , there ’s always a higher item on the to - do - list , too . Strange actually , because in all company litigate digital protection is fundamental .
So there is employment to do . After a breakfast seance in the World Horti Center this summer , a digital security work group was founded . Hoogendoorn Growth Management , Beekenkamp Group , InnovationQuarter and Lentiz act together and plan to incorporate other horticultural parties . The first finish ? provoke awareness .
The room and the speakers : Danny lair Hollander ( Beekenkamp Group ) , Colinda de Beer ( InnovationQuarter ) , Kevin Kleijwegt ( Hoogendoorn Growth Systems ) and Roel van Heijningen ( Lentiz ) . Remco Duijverman of Hoogendoorn is also a phallus of the work group , but he was not present .

Weakest linkWho protrude that conveyor belt ? What ’s that robot doing there ? Is that sensor data right ? Who is the ' mechanic ' in the host room ? Is the work laptop computer travelling to China or the United States ? Those are all question or situations that are more or less familiar to those who work in horticulture , even though it is not a pop subject area to be open and honest about . Because anyone who ’s been hacked , must be stupid , right ?
Well , no . Hackers get bright so it can materialise to anyone , and the grower with a fully automated glasshouse is maybe the most vulnerable of all . The oeuvre mathematical group does notice , that that last radical still sees it as an improbable happening . The three most common reaction are ' my provider probably takes upkeep of digital security measure ' , ' I do n’t select incorrect links ' or ' that ’s shivery , I do n’t understand that ' .
None of those three is ' the proper answer ' . Even more so , the whole horticultural chain is interlinked , and a Ernst Boris Chain is only as strong as its weak link . Only together and by sharing knowledge , gardening can take steps .

Colinda de Beer opened . exposure : WHC
IT versus OTWho have sex the difference ? Probably not everyone , even though every raiser and provider comes across OT . OT stands for Operational Technology , which are all auto , from conveyor belted ammunition to robotic limb , in the greenhouse . The OT is vulnerable , because the package that insure that computer hardware is often hard to update , or it ca n’t be updated at all .
Some elementary , sometimes obvious bakshis , are necessary . It ’s wise to change the password every now and then , on the computer hardware too ( ' adminadmin ' is easy to hack ) . prefer for multi factor authentication for everything that ask sign in , and for a password manager which is guard with another countersign to make using good , potent passwords possible . But is n’t a password manager another peril ? Yes , acknowledged Colinda de Beer of InnovationQuarter , one of the speaker , but the risk is a bunch lower than using the same password on everything .
‘ aviation conditioning mechanics’Besides Colinda de Beer , Kevin Kleijwegt of Hoogendoorn and Danny hideout Hollander of Beekenkamp speak , too . They too shared tips and experience . Kevin advised growers not to open your e - mail on the mood computer and to use the 3 - 2 - 1 back up principle ( original datum , back up drive and in the swarm with a parole ) .
After seeing a picture of people hold a ladder , walk in everywhere they want , Danny separate about the tests Beekenkamp execute in the fellowship to see how well Beekenkamp as a fellowship is secure . That trusted became an eyeopener , because the ' tune conditioning mechanics ' got as far as the waiter elbow room .
" consequently dressed and believing in the goodness in people made that potential " , Danny said . " That ’s why there ’s really no scathe in asking the mechanic in the greenhouse what he is doing there . And to , comfortable as it is to let the supplier lumber in from a distance , make a comfort - risk analysis for installation if it is really potential " , Kevin add . " It can always be good to let someone from your own company physically look over the articulatio humeri of the person lumber in from a distance . "
EncryptionAnd then there ’s information . The amount of data step-up , but the doubt is how much you want to keep . information that does n’t exist anymore , can not hang into the amiss hands either , Kevin said . For that reasonableness it is inadvisable to take business electronic computer and phones to ' risk state ' like China , Russia or the United States . A little ' check ' at customs and before you know it there ’s spyware on it . Several people in the room had standardised experiences , or at least a hunch that something like that had chance to them . And if there is no other option , suppose about encoding of data point or fetch an empty laptop computer or personal computer for that one visit .
Hacking to learn fromAfter an hr or so it was up to Roel van Heijningen from Lentiz to close with the question ' What ’s next ? ' Options were including digital prophylactic in the Lentiz curriculum , doing a baseline measure in gardening to find out the master points of attention and or risks , and organising course for growers where they hear how to whoop each other , so they can start to see the risks .
Technical or ethical hacking , in which hackers adjudicate to hack a company and then tell them ( for a nice financial reinforcement of class ) , is something to recall about as well . In horticulture it is not common ( yet ) , but everyone understands that if one kilo of tomato seeds is very expensive ( which it is ) , the datum on new varieties should not be out for everyone to see . It is of import to be well boarded up digitally .
For more data , please send an e - mail to[email protected ]
© FloralDaily.com/Thijmen Tiersma