{"id":51513,"date":"2021-04-09T09:30:00","date_gmt":"2021-04-09T08:30:00","guid":{"rendered":"https:\/\/www.highspeedtraining.co.uk\/hub\/?p=51513"},"modified":"2026-01-26T16:12:07","modified_gmt":"2026-01-26T16:12:07","slug":"cyber-security-in-food-drink-manufacturing","status":"publish","type":"post","link":"https:\/\/www.highspeedtraining.co.uk\/hub\/cyber-security-in-food-drink-manufacturing\/","title":{"rendered":"Cyber Security in Food &#038; Drink Manufacturing: BRCGS Standards"},"content":{"rendered":"\n<p>Cyber attacks and data breaches threaten the business structure, reputation, safety and profitability of the global food supply chain. As such, cyber security measures must be fit to withstand threats from hackers. <a href=\"https:\/\/specopssoft.com\/blog\/cyber-security-investing\/\" target=\"_blank\" rel=\"noreferrer noopener\">The Food, Drink and Hospitality sector invests the least amount in cyber security<\/a>, even though for businesses following BRCGS standards, cyber security measures are mandatory. In 2019, the average investment in cyber security for the Food &amp; Hospitality sector was only \u00a31,080.<\/p>\n\n\n<p id=\"top\">\n\n\n<p>With such low investment, the threat of a cyber attack is very much a real prospect for food and drink manufacturers. This article will cover the cyber security threats to manufacturers &#8211; including why cyber security is so important, outline the cyber security clauses in the BRCGS standards Issue 8, and suggest how manufacturers might avoid any potential risks.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity\"\/>\n\n\n\n<p><strong>This article covers the following:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"#cyberthreats\">What are the Cyber Security Threats to Food &amp; Drink Manufacturers?<\/a>\n<ul class=\"wp-block-list\">\n<li><a href=\"#malware\">Malware including viruses, worms, Trojans and ransomware<\/a><\/li>\n\n\n\n<li><a href=\"#phishing\">Phishing<\/a><\/li>\n\n\n\n<li><a href=\"#identitytheft\">Identity Theft<\/a><\/li>\n\n\n\n<li><a href=\"#dos\">Denial of Service (DoS), Man-in-the-Middle (MitM), Structured Query Language Injection (SQL Injection),<strong> <\/strong>Cross-Site Scripting (XXS)<\/a><\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><a href=\"#cyberimportance\">Why is Cyber Security Important for Food Businesses?<\/a>\n<ul class=\"wp-block-list\">\n<li><a href=\"#breaches\">Examples of Security Breaches<\/a><\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><a href=\"#brcgsstandards\">BRCGS Cyber Security Standards<\/a><\/li>\n\n\n\n<li><a href=\"#brcgs\">How Do I Meet the BRCGS Standards in Manufacturing?<\/a><\/li>\n<\/ul>\n\n\n<p id=\"cyberthreats\">\n\n\n<p><em>Use the links above if you\u2019d like to jump to a certain section of the article.<\/em><\/p>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity\"\/>\n\n\n<p id=\"malware\">\n\n\n<h2 class=\"wp-block-heading\" id=\"h-what-are-the-cyber-security-threats-to-food-drink-manufacturers\">What are the Cyber Security Threats to Food &amp; Drink Manufacturers?<\/h2>\n\n\n\n<p>The most common cyber security threats and different types of security risks to an organisation are:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-malware\">Malware<\/h3>\n\n\n\n<p>There are four main types of malware: viruses, worms, Trojans and ransomware. Each of these cyber security threats attack your device in a different way.<\/p>\n\n\n\n<p>The attacker can install the malware onto your device using a variety of methods. All of which rely on downloading software.<\/p>\n\n\n\n<p><strong>Viruses <\/strong>prevent the computer from running efficiently and can result in corrupted files. In some cases, viruses allow the criminals access to your computer by creating a &#8216;back door&#8217;.<\/p>\n\n\n\n<p><strong>Worms <\/strong>can duplicate themselves like clones and can deplete the system resource. Worms can also allow attackers to steal data by creating a &#8216;back door&#8217; into your computer.<\/p>\n\n\n\n<p><strong>Trojans <\/strong>are hidden in seemingly legitimate software, such as a screensaver or an app, so that people are misled into downloading the malware. Once the Trojan has been downloaded, the malware provides the attacker with access to your device. The attackers will then have access to your computer and will be able to copy your files, delete information, monitor what you are doing, and spread other malware.<\/p>\n\n\n<p id=\"phishing\">\n\n\n<p><strong>Ransomware <\/strong>is malware which makes your files inaccessible until payment is given for their release or decryption. In 2017, the NHS were the victim of a <a href=\"https:\/\/www.bbc.co.uk\/news\/health-39899646\" target=\"_blank\" rel=\"noreferrer noopener\">ransomware attack<\/a> which caused widespread disruption to the service nationwide. The ransomware attack was not targeted and affected organisations globally.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"685\" height=\"295\" src=\"https:\/\/www.highspeedtraining.co.uk\/hub\/wp-content\/uploads\/2021\/04\/Password-Protection.jpg\" alt=\"Password Protection\" class=\"wp-image-51530\"\/><\/figure><\/div>\n\n\n<p><a href=\"#top\">Back to the top<\/a><\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-phishing\">Phishing<\/h3>\n\n\n\n<p><strong><a href=\"https:\/\/www.highspeedtraining.co.uk\/hub\/what-is-phishing\/\">Phishing<\/a> <\/strong>is the most common type of cyber attack in the UK. Phishing refers to any attempt made by criminals to obtain personal details or information which can then be exploited. Phishing emails appear to be from a trustworthy company or person and deceive people into sharing their confidential information.<\/p>\n\n\n\n<p>Phishing is a social engineering tactic because it exploits human weakness by manipulating people. It is used by cyber attackers because it&#8217;s an easy way of targeting large groups of people, with a high success rate.<\/p>\n\n\n\n<p><strong>Social engineering<\/strong> is using human interaction to carry out a cyber attack. It uses psychological manipulation to deceive individuals into making security mistakes or handing over sensitive information. Social engineering tactics often have multiple steps to the attack, using identity theft or impersonation to retrieve the confidential information.<\/p>\n\n\n\n<p><strong>Spear phishing<\/strong> is a type of phishing attack that is directed at specific organisations or individuals. The content of the email is personalised to make it appear as though it is from someone you know and trust.<\/p>\n\n\n<p id=\"identitytheft\">\n\n\n<p>In 2020, there was a coordinated <a href=\"https:\/\/www.bbc.co.uk\/news\/technology-53425822\" target=\"_blank\" rel=\"noreferrer noopener\">cyber hack of several Twitter accounts<\/a> of well known public figures including Barack Obama, Elon Musk, Joe Biden and Jeff Bezos. The attackers gained access to internal systems and, by extension, the accounts through social engineering tactics targeted at internal employees.<\/p>\n\n\n\n<p><a href=\"#top\">Back to the top<\/a><\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-identity-theft\">Identity Theft<\/h3>\n\n\n\n<p>Identity theft is defined as the theft of your personal details. Identity theft becomes identity fraud when stolen details are used to commit fraud. Criminals may use your identity details to open bank accounts or credit cards, apply for loans or to gain control of your existing accounts.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"685\" height=\"295\" src=\"https:\/\/www.highspeedtraining.co.uk\/hub\/wp-content\/uploads\/2021\/04\/Office.jpg\" alt=\"Office\" class=\"wp-image-51531\"\/><\/figure><\/div>\n\n<p id=\"dos\">\n\n\n<p><a href=\"#top\">Back to the top<\/a><\/p>\n\n\n\n<p>Other less well known cyber security threats are:<\/p>\n\n\n<div class=\"accordion\">\n<h3>Denial of Service (DoS)<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.highspeedtraining.co.uk\/hub\/wp-content\/uploads\/2015\/09\/down53.png\" alt=\"drop down menu\" width=\"24\" height=\"24\"><\/h3>\n<div>Denial of Service attacks overload servers or networks making them crash leaving the system vulnerable as it can no longer process requests.<\/div>\n<\/div>\n<div class=\"accordion\">\n<h3>Man-in-the-Middle (MitM)<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.highspeedtraining.co.uk\/hub\/wp-content\/uploads\/2015\/09\/down53.png\" alt=\"drop down menu\" width=\"24\" height=\"24\"><\/h3>\n<div>Unsecured public Wi-Fi may be compromised if the hacker is able to insert themselves between a victim&#8217;s device and the network. Man-in-the-Middle attacks obtain personal information by intercepting online or telephone communication. The attacker is then able to copy all of the victim&#8217;s data.<\/div>\n<\/div>\n<div class=\"accordion\">\n<h3>Structured Query Language Injection (SQL Injection)<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.highspeedtraining.co.uk\/hub\/wp-content\/uploads\/2015\/09\/down53.png\" alt=\"drop down menu\" width=\"24\" height=\"24\"><\/h3>\n<div>A SQL injection attack is when malicious code is entered into an entry field and used to obtain, delete or modify private information from a server. Internet service provider <a href=\"https:\/\/www.bbc.co.uk\/news\/business-37565367\" target=\"_blank\" rel=\"noopener noreferrer\">TalkTalk was fined \u00a3400,000<\/a> over a SQL hack in 2015 that resulted in the personal information of over 157,000 customers being accessed by attackers.<\/div>\n<\/div>\n<div class=\"accordion\">\n<h3>Cross-Site Scripting (XXS)<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.highspeedtraining.co.uk\/hub\/wp-content\/uploads\/2015\/09\/down53.png\" alt=\"drop down menu\" width=\"24\" height=\"24\"><\/h3>\n<div>These attacks inject malicious scripts into legitimate websites. They are often found in web applications, such as online retail sales. The user&#8217;s browser does not recognise the infected webpage and executes the script. The malicious script can then access any cookies or other sensitive information that is held by the browser. This would allow the attacker to login as a user once the credentials have been stolen. They will also be able to edit the website and add in their own advertisements, phishing links, or malware.<\/div>\n<\/div>\n<p id=\"cyberimportance\">\n\n\n<p><a href=\"#top\">Back to the top<\/a><\/p>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-why-is-cyber-security-important-for-food-businesses\">Why is Cyber Security Important for Food Businesses?<\/h2>\n\n\n\n<p>The food sector has not yet been the target of a high profile cyber attack; however, this has resulted in the sector becoming complacent.<\/p>\n\n\n\n<p>Smaller food business operators, for example, believe that they are at less risk of a cyber attack even though they receive the same number of malicious emails.<\/p>\n\n\n\n<p>Breaches in cyber security have the potential to affect any part of the supply chain as businesses accelerate digital operations. Attacks aim to disrupt operations and threaten the safety, profitability and reputation of organisations. Ransomware has the potential to halt entire food supply chains with no guarantee of files becoming accessible on payment.<\/p>\n\n\n\n<p>Several other methods of cyber attacks could be used to gain access to systems and steal customer data. This would compromise customer trust and open your customers up to identity fraud.<\/p>\n\n\n\n<p><strong>Criminals wanting to tamper with the food product could access systems in place to control CCPs (Critical Control Points) resulting in harm to human health. <\/strong>If this occurs without detection, it would result in additional costs to the food business operator through product recalls.<\/p>\n\n\n\n<p>Smaller businesses with legacy systems such as Windows XP pose greater security risks as the code is longer being maintained with security updates. An \u2018if it\u2019s not broken, don\u2019t fix it\u2019 approach could end up costing food business operators more in the long run in trust and monetary value.<\/p>\n\n\n\n<p>An IT department is often responsible for the cyber security measures of a business however all employees should be responsible and have an awareness of cyber security.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"685\" height=\"295\" src=\"https:\/\/www.highspeedtraining.co.uk\/hub\/wp-content\/uploads\/2021\/04\/VPN.jpg\" alt=\"VPN\" class=\"wp-image-51636\"\/><\/figure><\/div>\n\n\n<p><a href=\"#top\">Back to the top<\/a><\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-examples-of-security-breaches\">Examples of Security Breaches<\/h3>\n\n\n\n<p>JJ Foodservice have recently increased their online security by requiring a unique purchase order ID and pin code following <a href=\"https:\/\/www.thegrocer.co.uk\/wholesalers\/jj-foodservice-steps-up-online-security-in-response-to-fraudulent-impersonations\/654704.article\" target=\"_blank\" rel=\"noreferrer noopener\">a case of identity fraud<\/a>. <a href=\"https:\/\/www.thegrocer.co.uk\/online\/cybercriminals-capitalise-on-online-grocery-boom-with-slew-of-fake-sites\/645192.article\" target=\"_blank\" rel=\"noreferrer noopener\">ASDA, Iceland and Brakes were also affected by impersonation<\/a>.&nbsp;<\/p>\n\n\n\n<p>In 2016, the American food chain Wendy\u2019s <a href=\"https:\/\/www.foodmanufacture.co.uk\/Article\/2016\/07\/08\/Brexit-Rise-in-cyber-crime-after-EU-exit\" target=\"_blank\" rel=\"noreferrer noopener\">reported a cyber attack<\/a> in which over 1,000 customer\u2019s card details were stolen. The cyber criminals used malware to gain access to their internal systems.<\/p>\n\n\n<div class=\"tip__box\">\n<div class=\"tip__title__container\">\n<div class=\"tip__title__text\">\n<div class=\"tip__title__icon\"><img decoding=\"async\" src=\"https:\/\/www.highspeedtraining.co.uk\/hub\/wp-content\/uploads\/2019\/11\/expert-tip-icon.png\" alt=\"expert icon\"><\/div>\n<h3>Need a Course?<\/h3>\n<\/div>\n<\/div>\n<p>Take a look at our <a href=\"https:\/\/www.highspeedtraining.co.uk\/courses\/business-essentials\/\" target=\"_blank\" rel=\"noopener noreferrer\">business skills course library<\/a> where you can find <a href=\"https:\/\/www.highspeedtraining.co.uk\/courses\/business-essentials\/intro-to-cyber-security\/\" target=\"_blank\" rel=\"noopener noreferrer\">Cyber Security<\/a>, <a href=\"https:\/\/www.highspeedtraining.co.uk\/courses\/business-essentials\/data-protection-course\/\" target=\"_blank\" rel=\"noopener noreferrer\">Data Protection<\/a> and <a href=\"https:\/\/www.highspeedtraining.co.uk\/courses\/business-essentials\/gdpr-training\/\" target=\"_blank\" rel=\"noopener noreferrer\">GDPR<\/a> Training to learn more about security threats.<\/p>\n<\/div>\n<p id=\"brcgsstandards\">\n\n\n<p><a href=\"#top\">Back to the top<\/a><\/p>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-brcgs-cyber-security-standards\">BRCGS Cyber Security Standards<\/h2>\n\n\n\n<p>Issue 8 of the BRCGS Food Safety Standard introduced cyber security requirements as part of food defence. The introduction of these requirements in 2018 may have required food business operators to implement additional measures and controls in order to fulfil the standards.&nbsp;<\/p>\n\n\n\n<p>For more information on who the BRCGS are and what they do, read \u2018<a href=\"https:\/\/www.highspeedtraining.co.uk\/hub\/understanding-brcgs\/\" target=\"_blank\" rel=\"noreferrer noopener\">Our Guide to Understanding BRCGS<\/a>\u2019.<\/p>\n\n\n\n<p>The clauses which require cyber security controls are:<\/p>\n\n\n\n<p><strong>3.2.1. Document Control &amp; 3.3.1. Record Completion and Maintenance&nbsp;<\/strong><\/p>\n\n\n\n<p>Documents stored electronically must be stored securely with authorised access, control of amendments or password protection. Files should also be backed up to prevent loss.<\/p>\n\n\n\n<p><strong>3.11.1 Management of Incidents, Product Withdrawal and Product <a href=\"https:\/\/www.highspeedtraining.co.uk\/hub\/product-recall-template\/\">Recall<\/a><\/strong><\/p>\n\n\n\n<p>Procedures must be in place to report and manage situations which impact food safety, legality or quality including cyber security failures and attacks.<\/p>\n\n\n\n<p><strong>6.1.2. Control of Operations<\/strong><\/p>\n\n\n\n<p>Where possible, controls should be password protected or otherwise restricted for controls critical to food safety.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"685\" height=\"295\" src=\"https:\/\/www.highspeedtraining.co.uk\/hub\/wp-content\/uploads\/2021\/04\/Packaging-Line.jpg\" alt=\"Packaging Line\" class=\"wp-image-51529\"\/><\/figure><\/div>\n\n<p id=\"brcgs\">\n\n\n<p><a href=\"#top\">Back to the top<\/a><\/p>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-how-do-i-meet-the-brcgs-standards-in-manufacturing\">How Do I Meet the BRCGS Standards in Manufacturing?<\/h2>\n\n\n\n<p>Cyber security falls under <strong>TACCP <\/strong>(Threat Analysis Critical Control Point) or is sometimes categorised on its own as <strong>CHACCP <\/strong>(Cyber Hazard Analysis Critical Control Point). A risk assessment into the threats of food safety looks into those with the intent to harm.<\/p>\n\n\n\n<p>It could also be considered to be part of <strong>VACCP <\/strong>(Vulnerability Analysis Critical Control Point) for cyber attacks without the intent to harm but could cause harm if production is halted. A total <a href=\"https:\/\/www.highspeedtraining.co.uk\/hub\/food-safety-culture\/\">food safety culture<\/a> includes cyber security. TACCP and VACCP assessments often encompass more areas and individuals than a <strong>HACCP <\/strong>(Hazard Analysis Critical Control Point) plan as it also covers cyber security in manufacturing and employees.<\/p>\n\n\n\n<p>Cyber security threats can be risk assessed and managed through awareness and a cyber security culture within a business, not just left to the IT department. Employees with access to internal systems should be aware of:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Clicking on an unsafe link or attachment in an email and unknowingly downloading malware.<\/li>\n\n\n\n<li>Clicking on links on a website which then downloads malware when you click on it.<\/li>\n\n\n\n<li>Malware in fake copies of normal software, for example, pirated copies of Microsoft Office.<\/li>\n\n\n\n<li>Ensuring the Wi-Fi is secure when working away from the office or using a VPN when using an unsecured public Wi-Fi network.<\/li>\n\n\n\n<li>Frequently changing passwords and using strong (not easy to guess) passwords.&nbsp;<\/li>\n\n\n\n<li>Not leaving a computer or laptop unattended, especially when unlocked.<\/li>\n\n\n\n<li>Updating software to the latest version, ensuring the computer has the latest security patches.<\/li>\n<\/ul>\n\n\n\n<p>To ensure cyber security in manufacturing, make sure all documents are stored securely, backed up and password protected where possible. <\/p>\n\n\n\n<p>To meet standard 3.11.1, implement a whistleblowing policy and a policy to report cyber security attacks which could impact the safety of food. You should also review the cyber security measures on CCP equipment and ensure it is password protected where possible.<\/p>\n\n\n\n<p><a href=\"#top\">Back to the top<\/a><\/p>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity\"\/>\n\n\n\n<p><em>Complete a risk assessment of your current cyber security measures and implement a continuous improvement approach instead of an \u2018if it\u2019s not broken, don\u2019t fix it\u2019 mindset. Cyber security threats should be managed by every employee, consider training staff on safe practices and the consequences of not being cyber security aware.<\/em><\/p>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity\"\/>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-further-resources\">Further Resources:<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.highspeedtraining.co.uk\/courses\/business-essentials\/intro-to-cyber-security\/\" target=\"_blank\" rel=\"noreferrer noopener\">Introduction to Cyber Security Course<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.highspeedtraining.co.uk\/hub\/taccp-quiz\/\" target=\"_blank\" rel=\"noreferrer noopener\">TACCP Quiz<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.highspeedtraining.co.uk\/hub\/understanding-brcgs\/\" target=\"_blank\" rel=\"noreferrer noopener\">Our Guide to Understanding BRCGS<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.highspeedtraining.co.uk\/hub\/understanding-brcgs-grading-system\/\">What Does the BRCGS Grading System Mean?<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.highspeedtraining.co.uk\/hub\/common-cyber-attacks\/\">What are the Most Common Types of Cyber Attack?<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.highspeedtraining.co.uk\/hub\/what-is-the-food-supply-chain\/\">Food Supply Chain: Importance &amp; Management Strategies<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>The threat of a cyber attack is very much a real prospect for food and drink manufacturers. We cover the cyber security threats and the BRCGS standards here.<\/p>\n","protected":false},"author":44,"featured_media":51730,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[27],"tags":[3386,700],"class_list":["post-51513","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-business","tag-data-protection","tag-food-safety"],"acf":{"schema_disabled":false,"schema_properties_FAQPage_question_answer":null,"schema_properties_HowTo_howto_tools":null,"schema_properties_HowTo_howto_supplies":null,"schema_properties_HowTo_howto_steps":null,"schema_properties_WebPage_cssSelector":null,"schema_sameAs_repeater":null,"schema_custom_json_repeater":null,"schema_custom_json_override":false},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v19.5 (Yoast SEO v19.12) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cyber Security | BRCGS Standards in Manufacturing<\/title>\n<meta name=\"description\" content=\"The threat of a cyber attack is very much a real prospect for food and drink manufacturers. We cover the cyber security threats and the BRCGS standards here.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.highspeedtraining.co.uk\/hub\/cyber-security-in-food-drink-manufacturing\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Security in Food &amp; Drink Manufacturing: BRCGS Standards\" \/>\n<meta property=\"og:description\" content=\"The threat of a cyber attack is very much a real prospect for food and drink manufacturers. We cover the cyber security threats and the BRCGS standards here.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.highspeedtraining.co.uk\/hub\/cyber-security-in-food-drink-manufacturing\/\" \/>\n<meta property=\"og:site_name\" content=\"The Hub | High Speed Training\" \/>\n<meta property=\"article:publisher\" content=\"http:\/\/www.facebook.com\/highspeedtraining\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-04-09T08:30:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-26T16:12:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.highspeedtraining.co.uk\/hub\/wp-content\/uploads\/2021\/04\/cyber-security-manufacturing-fb-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Zoe Ager\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.highspeedtraining.co.uk\/hub\/wp-content\/uploads\/2021\/04\/cyber-security-manufacturing-twit-1.jpg\" \/>\n<meta name=\"twitter:creator\" content=\"@hst\" \/>\n<meta name=\"twitter:site\" content=\"@hst\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Zoe Ager\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"11 minutes\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cyber Security | BRCGS Standards in Manufacturing","description":"The threat of a cyber attack is very much a real prospect for food and drink manufacturers. We cover the cyber security threats and the BRCGS standards here.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.highspeedtraining.co.uk\/hub\/cyber-security-in-food-drink-manufacturing\/","og_locale":"en_GB","og_type":"article","og_title":"Cyber Security in Food & Drink Manufacturing: BRCGS Standards","og_description":"The threat of a cyber attack is very much a real prospect for food and drink manufacturers. We cover the cyber security threats and the BRCGS standards here.","og_url":"https:\/\/www.highspeedtraining.co.uk\/hub\/cyber-security-in-food-drink-manufacturing\/","og_site_name":"The Hub | High Speed Training","article_publisher":"http:\/\/www.facebook.com\/highspeedtraining\/","article_published_time":"2021-04-09T08:30:00+00:00","article_modified_time":"2026-01-26T16:12:07+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/www.highspeedtraining.co.uk\/hub\/wp-content\/uploads\/2021\/04\/cyber-security-manufacturing-fb-1.jpg","type":"image\/jpeg"}],"author":"Zoe Ager","twitter_card":"summary_large_image","twitter_image":"https:\/\/www.highspeedtraining.co.uk\/hub\/wp-content\/uploads\/2021\/04\/cyber-security-manufacturing-twit-1.jpg","twitter_creator":"@hst","twitter_site":"@hst","twitter_misc":{"Written by":"Zoe Ager","Estimated reading time":"11 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.highspeedtraining.co.uk\/hub\/cyber-security-in-food-drink-manufacturing\/#article","isPartOf":{"@id":"https:\/\/www.highspeedtraining.co.uk\/hub\/cyber-security-in-food-drink-manufacturing\/"},"author":{"name":"Zoe Ager","@id":"https:\/\/www.highspeedtraining.co.uk\/hub\/#\/schema\/person\/6785a49fe46a969d7893e39ee962c887"},"headline":"Cyber Security in Food &#038; Drink Manufacturing: BRCGS Standards","datePublished":"2021-04-09T08:30:00+00:00","dateModified":"2026-01-26T16:12:07+00:00","mainEntityOfPage":{"@id":"https:\/\/www.highspeedtraining.co.uk\/hub\/cyber-security-in-food-drink-manufacturing\/"},"wordCount":1918,"commentCount":4,"publisher":{"@id":"https:\/\/www.highspeedtraining.co.uk\/hub\/#organization"},"keywords":["Data Protection","Food Safety"],"articleSection":["Business"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.highspeedtraining.co.uk\/hub\/cyber-security-in-food-drink-manufacturing\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.highspeedtraining.co.uk\/hub\/cyber-security-in-food-drink-manufacturing\/","url":"https:\/\/www.highspeedtraining.co.uk\/hub\/cyber-security-in-food-drink-manufacturing\/","name":"Cyber Security | BRCGS Standards in Manufacturing","isPartOf":{"@id":"https:\/\/www.highspeedtraining.co.uk\/hub\/#website"},"datePublished":"2021-04-09T08:30:00+00:00","dateModified":"2026-01-26T16:12:07+00:00","description":"The threat of a cyber attack is very much a real prospect for food and drink manufacturers. We cover the cyber security threats and the BRCGS standards here.","breadcrumb":{"@id":"https:\/\/www.highspeedtraining.co.uk\/hub\/cyber-security-in-food-drink-manufacturing\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.highspeedtraining.co.uk\/hub\/cyber-security-in-food-drink-manufacturing\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.highspeedtraining.co.uk\/hub\/cyber-security-in-food-drink-manufacturing\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.highspeedtraining.co.uk\/hub\/"},{"@type":"ListItem","position":2,"name":"Cyber Security in Food &#038; Drink Manufacturing: BRCGS Standards"}]},{"@type":"WebSite","@id":"https:\/\/www.highspeedtraining.co.uk\/hub\/#website","url":"https:\/\/www.highspeedtraining.co.uk\/hub\/","name":"The Hub | High Speed Training","description":"Welcome to the Hub, the company blog from High Speed Training.","publisher":{"@id":"https:\/\/www.highspeedtraining.co.uk\/hub\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.highspeedtraining.co.uk\/hub\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.highspeedtraining.co.uk\/hub\/#organization","name":"The Hub | High Speed Training","url":"https:\/\/www.highspeedtraining.co.uk\/hub\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.highspeedtraining.co.uk\/hub\/#\/schema\/logo\/image\/","url":"https:\/\/www.highspeedtraining.co.uk\/hub\/wp-content\/uploads\/2021\/05\/HST_Logo_Dark-Blue_CMYK_AW-scaled.jpg","contentUrl":"https:\/\/www.highspeedtraining.co.uk\/hub\/wp-content\/uploads\/2021\/05\/HST_Logo_Dark-Blue_CMYK_AW-scaled.jpg","width":2560,"height":1206,"caption":"The Hub | High Speed Training"},"image":{"@id":"https:\/\/www.highspeedtraining.co.uk\/hub\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/www.facebook.com\/highspeedtraining\/","https:\/\/twitter.com\/hst"]},{"@type":"Person","@id":"https:\/\/www.highspeedtraining.co.uk\/hub\/#\/schema\/person\/6785a49fe46a969d7893e39ee962c887","name":"Zoe Ager","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.highspeedtraining.co.uk\/hub\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d277f276e524b5f2b1a63e0f44142754?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d277f276e524b5f2b1a63e0f44142754?s=96&d=mm&r=g","caption":"Zoe Ager"},"description":"Zoe Ager is the Learning Development Analyst for the Food &amp; Drink sector at High Speed Training. Zoe completed her degree at the University of Birmingham on the Campus of University College Birmingham, also known as the College of Food, in Food Development &amp; Innovation. The degree was specific to food manufacturing. Her wide range of work experience includes being a Quality Technician at Holden's Bottling Company and a Chocolate Scientist (working with product specifications) at Mondelez International. She brings her detailed knowledge of the industry to bring you the most up-to-date information and guidance.","url":"https:\/\/www.highspeedtraining.co.uk\/hub\/author\/zoe\/"}]}},"_links":{"self":[{"href":"https:\/\/www.highspeedtraining.co.uk\/hub\/wp-json\/wp\/v2\/posts\/51513","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.highspeedtraining.co.uk\/hub\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.highspeedtraining.co.uk\/hub\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.highspeedtraining.co.uk\/hub\/wp-json\/wp\/v2\/users\/44"}],"replies":[{"embeddable":true,"href":"https:\/\/www.highspeedtraining.co.uk\/hub\/wp-json\/wp\/v2\/comments?post=51513"}],"version-history":[{"count":11,"href":"https:\/\/www.highspeedtraining.co.uk\/hub\/wp-json\/wp\/v2\/posts\/51513\/revisions"}],"predecessor-version":[{"id":81405,"href":"https:\/\/www.highspeedtraining.co.uk\/hub\/wp-json\/wp\/v2\/posts\/51513\/revisions\/81405"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.highspeedtraining.co.uk\/hub\/wp-json\/wp\/v2\/media\/51730"}],"wp:attachment":[{"href":"https:\/\/www.highspeedtraining.co.uk\/hub\/wp-json\/wp\/v2\/media?parent=51513"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.highspeedtraining.co.uk\/hub\/wp-json\/wp\/v2\/categories?post=51513"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.highspeedtraining.co.uk\/hub\/wp-json\/wp\/v2\/tags?post=51513"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}