AIB Worldwide: Latin America
China          Japan
Europe, Middle East, & Africa


Computer Security Article 1

In AIB's newly published book, The AIB Guide to Food Security the statement is made that the majority of security issues come from someone "on the inside". In light of that fact, have you considered whether or not your security plan is secure? Assuming that your company has a thorough and well-documented security plan, where do you keep it? Are the documents stored on a computer somewhere in the facility? It is likely that other business critical documents are stored on the same computer -recall plans, for example. Now, consider the worst-case scenario for a moment: someone inside your plant wants to do damage for whatever reason. Wouldn't a well thought out and well-executed plan also include the destruction or alteration of the very documentation designed to minimize your risk from such attacks?

Consider the standard Windows XP workstation running in your facility. If it even has a password on it, multiple people probably know what the password is. It is likely powered on and logged into your network all day long and perhaps even after business hours if no one is responsible for shutting it down at the end of the day. If they were determined, how many people in your facility could gain access to the computer resources that hold your security and recall plans? How would your actual recall of a tainted product be affected if you were forced to spend several hours restoring missing documents from backups? What if those backups didn't exist onsite and you couldn't access them for a day or more? Or, even worse, what if the actual recall plans were not deleted but instead were subtly altered. Who would recognize that the plans had been tampered with before it was too late? Good food security comes at all levels, including electronic documents and Information Technology (IT). Think about it!


Site Map   |    Contact AIB   |    Online Catalog   |    Seminar Calendar   |    My Account