By selecting UK flag, you have now set your site language to English. If you'd like to change your language preference again, simply click on one of the other flags.

Close

こちら Japan flag を選択して頂くと、言語設定が日本語に切り替わります。設定変更後は以下の機能が利用可能です。

  • 日本語版ウェブサイトへのクイックアクセスが可能となり、日本語の刊行物をご覧頂けます。

  • 日本語版が閲覧可能な刊行物や記事については、日本語が優先表示されます。表示言語については Japan flag をご参照下さい。

閉じる 言語設定を切り替えたい場合には、国旗のマークをクリックして下さい。

By selecting Japan flag, you have now set your language to Japanese. This has several benefits, including:

  • Providing quick access to our Japan page, which collates all our Japanese content in one place.

  • Ensures that content is presented to you in Japanese first, if we have an article, publication or webpage available in Japanese. Look out for the Japan flag indicators across the site.

Close If you’d like to change your language preferences again, simply click on one of the other flags.

点击选择 China flag,可将网站语言设置为中文。这能帮助您:

  • 快速访问我们的中国区页面,该页面将有网站内容的中文汇总。

  • 在我们的文章、出版物或者网页有中文版本提供的情况下,确保首先向您展示的是中文版本的内容。您可关注站点上的 China flag 按键。

关闭 点击任意其他国旗,可切换您的语言偏好。

By selecting China flag, you have now set your language to Chinese. This has several benefits, including:

  • Providing quick access to our China page, which collates all our Chinese content in one place.

  • Ensures that content is presented to you in Chinese first, if we have an article, publication or webpage available in Chinese. Look out for the China flag indicators across the site.

Close If you’d like to change your language preferences again, simply click on one of the other flags.

Cybersecurity: A Growing Concern

Over the past few years we have seen a steady rise in the level of automation on fish farms around the world.

From life support systems, alarm call outs and automatic equipment switch-over, to remote feed operation, automated mortality removal and computerised water management systems.

As such, the need for proper cybersecurity and resilience in the aquaculture industry has increased. Farm owners should now be taking active steps to know where they are in terms of preparedness and vulnerability, both in terms of human training and in operational system terms. It would be even better if farm owners are actively managing their position to ensure that cyber preparedness is increasing, and vulnerability is decreasing.

What is cyber risk?

Cyber risk refers to an accident, incident, financial loss, business disruption or reputational damage through the failure or manipulation of an electronic system, which could be the result of a malicious attack. The risk of system failure is generally well known however unauthorised and malicious cyber-attacks are relatively new threats.

An increasingly digital industry

The number of tasks being carried out on both on and offshore farms has increased as the farms have become larger and more complex. In offshore farms these tasks include; net washing, mooring and other infrastructure inspections, health checks, fish movements, in-situ treatments and plankton sampling. The picture is the same in onshore farms; water testing and management, health sampling, vaccination, feeding, maintenance and checks on the mechanical systems. These tasks are labour intensive, and more staff are needed to be employed to run the system and ensure levels of husbandry are being maintained.

To counter this, systems have been developed to automate key aspects of farms. Offshore farms can be monitored and fed from shorebases and inland offices. Staff at large Recirculating Aquaculture Systems (RAS) sites have portable computers giving live environmental parameters, while pumps and other hardware can be adjusted with a simple tap on the screen. Sensors can also detect feed levels in hoppers and automatically deliver the correct type of feed to refill it. With the rise of technology some farms are now becoming more streamlined allowing staff to focus on husbandry and system maintenance.

Be prepared!

How will your company respond if staff are locked out of your systems? Do you have enough staff to keep the farm operational? Do the automated systems have manual overrides?

In 2017, the WannaCry ransomware virus shut down factories and businesses around the world until the attackers had been paid and in 2018 a petrochemical plant was taken over by hackers which resulted in a complete system shutdown. There have been countless reports of systems being compromised as a test of the hackers’ abilities. As well as direct malicious attacks, hackers can also target employees who may well be tricked into releasing sensitive data via phishing scams and compromised hardware.

In response to these increasing and potentially damaging threats, we recommend applying a six-stage cyber security process to your business; identify threats, identify vulnerabilities, assess risk exposure, develop protection and detection measures, establish contingency plans and respond to cyber security incidents.

Fish

Author: James Simison
Risk Management Surveyor and Coordinator

This website, www.nepia.com, is now in archive and will not be updated with new content. The website will remain accessible for a short time as we complete the transfer of relevant content to the new NorthStandard website (north-standard.com).

If you would like to access the ECDIS training assessment app (ETA), you can still register for app access via MyNorth.

Please head to north-standard.com for the latest industry news, expert analysis and publications, club rules and contacts, and access to our newly launched digital tools specifically designed to support your operations.

TAKE ME TO NORTH-STANDARD.COM