Stories such as a Las Vegas casino being hacked through a fish tank pump or cybercriminals holding an entire city’s functions at ransom are harrowing tales that may seem like a plot line out of the latest Hollywood blockbuster, not applicable to today’s world.
But Eric Regnier, vice president of operations at ZAG Technical Services, an information technology consulting firm, joins Rob Collings, marketing director for ZAG, and Melinda Goodman, president of FullTilt Marketing, on the latest “Tip of the Iceberg” podcast to share the very real and imminent threat cybersecurity plays in the increasing tech world of agriculture.
“We always have to keep in mind both the advantages of technology that we’re bringing to bear and the convenience that it has for our life,” Regnier said. “You have to keep in mind that presents a vulnerability that may be actively being exploited now and if it isn’t someone’s working very hard to do so.”
No longer are hackers bored teenagers breaking into systems to change grades or expose flaws, Regnier said. Modern-day hackers are sophisticated criminals with the funds to commit large-scale breaches. He said expect these cybersecurity threats to continue or even increase.
“We have to take this threat seriously because these folks are the real deal,” he said. “These are the pros, and they’re not coming for someone else — they’re coming for us.”
And he says it’s not just multinational or large corporations; today’s cybercriminals attack any and all businesses.
“Cyber criminals are just as happy to extort a ransom or to get an extortion demand paid from a little guy, or a medium gal or the big players equally,” he said. “They’re coming after everyone, and we have to all prepare collectively to defend and be ready for when they do succeed.”
Regnier says a major risk to produce growers, packers and shippers is the vulnerability of the partners these operations do business with.
“It’s not just your own technology that you’re having to worry about, it’s your supporting partners, your vendors — the refrigeration vendor that controls cooling and air conditioning for your production plant,” he said. “How secure are they how are they accessing your environment, and do they have the opportunity to interact with other computing systems placing you at risk?”
To hear the full conversation, click the purple-and-white play button below, or this link or listen on your favorite podcast platforms such as Google Play, Spotify, Apple and more.


