Page 69 - Grapevine NovDec 2021
P. 69
International News
Brown-Forman, E & J Gallo Winery, Molson Coors, While unsecured computer systems and mobile
and the Campari Group. devices are common attack vectors, it’s safe to
assume that as your operation grows, so too does
The Earth Is Mine. your attack surface. Now wine operations have bar-
(What About Your Network?) coded, inventory-tracking devices that are used on
a remote workflow in the field. That information is
On the one hand, it’s a brave new world for the fed into a central ERP system that’s tied to another
farming and production aspects of winemaking, automation system, and so on throughout the pro-
thanks to automation advances. But on the other duction process, as tank temperatures and acidity
hand, a great deal of manual labor is involved, and levels are monitored. Then, too, consider the con-
despite advances, the wine industry is still consid- trols that regulate humidity levels inside a facility or
ered very much old-school, lagging behind other the transfer of wine from tank to tank. Any and all
industries when it comes to the use of technology. of these systems can be tampered with and if they
are, it can negatively affect the end product and
When you consider the production process from your business.
grape to glass, some of the greatest risk of cyber
exposure lies on the farming side. Growing the Data, Decanted
perfect grape comes with a lot of moving parts,
and like other production businesses, enterprise Outside the confines of your vineyard or winery lie
resource planning (ERP) systems are in place to even further risks. Supply chains are attractive tar-
track a variety of processes, from what pesticide gets not just for the information they hold but the
was applied on which date, to the costs involved, damage they can inflict if disrupted. Distributors,
etc. Whereas how these things are tracked will vary especially smaller ones, often track depletions
from vineyard manually and
to vineyard, the share updates via
inator is that in Increasingly, cybercriminals email. Consider
common denom-
the example of a
people interact- are targeting the beverage small warehouse
most cases the
in Kansas City
systems are pre- industry. Lay down a strong that might have
ing with these
20 pallets of your
dominantly field security plan now and watch wine and little
workers who to no security
most tech-savvy. it come of age. solutions in place
might not be the
and then consid-
Add to this the er how quickly
fact that many a threat vector
front-line remote systems are loosely managed and could spread via a spreadsheet attachment.
run on personal field laptops or mobile devices, and
you have an ideal attack vector. On the retail side of wine operations, both on-
and off-premise operations, offer up other strike
Regardless of whether you are operating a small, zones. Each of these channels has its own supply
family-run vineyard or have a large-scale wine and inventory management systems that track
operation, you face an even greater risk each activity all the way out to individual shops, bars,
time you sit down at your desk. The vast major- and restaurants, which again, may or may not have
ity of cyberattacks begin with malware, typically the strongest security posture.
embedded in an attachment sent with a seemingly
innocuous email. Maybe it’s an invoice from a dis- Nor can you overlook the direct-to-consumer
tributor you work with, maybe it’s your bookkeeper aspect. Customer relationship management(CRM)
asking you to review a document, or maybe it’s a systems that are used to manage your wine club
complete stranger, hoping you’ll slip up, open his or market tasting events hold a wealth of personal
attachment, and launch a malware script that will information, not to mention credit card numbers.
encrypt your data until you give in to his demands. They’re gold mines for those looking to sell that
877-892-5332 The Grapevine • November - December 2021 Page 67
Grapevine Main Pages GV111221_Layout 1-1 .indd 67 10/26/21 3:44 PM