Scarinci Hollenbeck, LLC, LLCScarinci Hollenbeck, LLC, LLC

Firm Insights

What Can the Food and Beverage Industry Learn from the Molson Coors Cyberattack?

Author: Scarinci Hollenbeck, LLC

Date: March 31, 2021

Key Contacts

Back
What Can the Food and Beverage Industry Can Learn from the Molson Coors Cyberattack?

Molson Coors Beverage Company (Molson Coors) recently disclosed that it suffered a cyberattack that forced its beer production to come to a screeching halt...

Molson Coors Beverage Company (Molson Coors) recently disclosed that it suffered a cyberattack that forced its beer production to come to a screeching halt. The incident highlights why robust cybersecurity is so important in the food and beverage industry.

Molson Coors Cyberattack Results in Systems Outage

Molson Coors disclosed the cyberattack in a filing with the US Securities and Exchange Commission (SEC). According to the 8-K filing, the incident, which caused a “systems outage,” occurred on March 11, 2021. In the wake of the cyberattack, Molson Coors “engaged leading forensic information technology firms and legal counsel to assist the Company’s investigation into the incident,” the filing stated.

“The company is working around the clock to get its systems back up as quickly as possible,” the company said in its filing. “Although the company is actively managing this cybersecurity incident, it has caused and may continue to cause a delay or disruption to parts of the company’s business, including its brewery operations, production and shipments.”

Food and Beverage Industry Has Unique Cyber Risks

As we have discussed in prior articles, cybercrime has increased dramatically during the COVID-19 pandemic, impacting businesses in all sectors. The food and beverage industry is no exception—Brown-Forman, which owns Jack Daniel’s; Lion, an Australian alcoholic beverage company; and Italy’s Licya Campari Group all fell victim in the past year.

Ransomware attacks are becoming increasingly common in the food and beverage industry as cybercriminals discover they can score large paydays by disrupting the critical business operations of large industrial companies. While Molson Coors has not yet disclosed the nature of its cyber incident, many security experts suspect it fell victim to ransomware.

According to a recent report by Claroty, an industrial cybersecurity company, the food and agriculture sector experienced a fifty-six percent (56%) increase in industrial control system (ICS) vulnerabilities from 2019 to 2020. “Given the round-the-clock nature of operations in food and beverage companies, much of the IT equipment in manufacturing plants can’t be patched frequently, making these assets a prime target for attacks such as ransomware, which can seize up operations abruptly with a dramatic cost to the enterprise,” Grant Geyer, Claroty’s Chief Product Officer, told Industry Week.

As cyber risks increase, continuous threat monitoring of all IT systems is essential. Businesses should also ensure that operating systems, software, and firmware are patched as soon as manufacturers release updates. Employees can also play a critical role in combatting cyberattacks, often thwarting an attack before it takes down your systems. However, as ransomware attacks become more sophisticated, workers need to be trained on the latest threats. For instance, while ransomware attacks initially relied on email messages that were clearly identifiable as spam, hackers are now using phishing schemes that make emails appear to come from a known contact.

With prevention as the goal, businesses should also plan for an inevitable attack. Because it can take time to recover from a cyberattack and restore normal operations, it’s important to plan for the possibility of critical information systems being inaccessible for an extended period of time. Creating, maintaining, and exercising a basic cyber incident response plan can help businesses recover more quickly, as everyone involved knows their role and can immediately start to “work the plan” to regain normal business operations.

Business continuity plans are also invaluable. While many plans address how to continue critical business operations in the face of a flood, power disruption, or other disaster, cyberattacks are not always addressed. A good starting point is to determine all the potential threats to your business operations posed by a cyberattack, rank the severity of each business disruption, and devise a plan to address each risk.

Key Takeaway

As Molson Coors learned the hard way, a cyberattack can significantly disrupt production and distribution. Since it is not always possible to thwart an attack, it is essential to have policies and procedures in place to get systems back up and running as quickly as possible. Food and beverage companies should use this latest incident as motivation to thoroughly review their cybersecurity and business continuity plans to ensure they address current and emerging risks.

If you have questions, please contact us

If you have any questions or if you would like to discuss the matter further, please contact me, Corey LaBrutto, or the Scarinci Hollenbeck attorney with whom you work, at 201-896-4100.

    No Aspect of the advertisement has been approved by the Supreme Court. Results may vary depending on your particular facts and legal circumstances.

    Scarinci Hollenbeck, LLC, LLC

    Related Posts

    See all
    Does Your Homeowners Insurance Provide Adequate Coverage? post image

    Does Your Homeowners Insurance Provide Adequate Coverage?

    Your home is likely your greatest asset, which is why it is so important to adequately protect it. Homeowners insurance protects you from the financial costs of unforeseen losses, such as theft, fire, and natural disasters, by helping you rebuild and replace possessions that were lost While the definition of “adequate” coverage depends upon a […]

    Author: Jesse M. Dimitro

    Link to post with title - "Does Your Homeowners Insurance Provide Adequate Coverage?"
    Understanding the Importance of a Non-Contingent Offer post image

    Understanding the Importance of a Non-Contingent Offer

    Making a non-contingent offer can dramatically increase your chances of securing a real estate transaction, particularly in competitive markets like New York City. However, buyers should understand that waiving contingencies, including those related to financing, or appraisals, also comes with significant risks. Determining your best strategy requires careful analysis of the property, the market, and […]

    Author: Jesse M. Dimitro

    Link to post with title - "Understanding the Importance of a Non-Contingent Offer"
    Fred D. Zemel Appointed Chair of Strategic Planning at Scarinci & Hollenbeck, LLC post image

    Fred D. Zemel Appointed Chair of Strategic Planning at Scarinci & Hollenbeck, LLC

    Business Transactional Attorney Zemel to Spearhead Strategic Initiatives for Continued Growth and Innovation Little Falls, NJ – February 21, 2025 – Scarinci & Hollenbeck, LLC is pleased to announce that Partner Fred D. Zemel has been named Chair of the firm’s Strategic Planning Committee. In this role, Mr. Zemel will lead the committee in identifying, […]

    Author: Scarinci Hollenbeck, LLC

    Link to post with title - "Fred D. Zemel Appointed Chair of Strategic Planning at Scarinci & Hollenbeck, LLC"
    Novation Agreement Process: Step-by-Step Guide for Businesses post image

    Novation Agreement Process: Step-by-Step Guide for Businesses

    Big changes sometimes occur during the life cycle of a contract. Cancelling a contract outright can be bad for your reputation and your bottom line. Businesses need to know how to best address a change in circumstances, while also protecting their legal rights. One option is to transfer the “benefits and the burdens” of a […]

    Author: Dan Brecher

    Link to post with title - "Novation Agreement Process: Step-by-Step Guide for Businesses"
    What Is a Trade Secret? Key Elements and Legal Protections Explained post image

    What Is a Trade Secret? Key Elements and Legal Protections Explained

    What is a trade secret and why you you protect them? Technology has made trade secret theft even easier and more prevalent. In fact, businesses lose billions of dollars every year due to trade secret theft committed by employees, competitors, and even foreign governments. But what is a trade secret? And how do you protect […]

    Author: Ronald S. Bienstock

    Link to post with title - "What Is a Trade Secret? Key Elements and Legal Protections Explained"
    What Is Title Insurance? Safeguarding Against Title Defects post image

    What Is Title Insurance? Safeguarding Against Title Defects

    If you are considering the purchase of a property, you may wonder — what is title insurance, do I need it, and why do I need it? Even seasoned property owners may question if the added expense and extra paperwork is really necessary, especially considering that people and entities insured by title insurance make fewer […]

    Author: Patrick T. Conlon

    Link to post with title - "What Is Title Insurance? Safeguarding Against Title Defects"

    No Aspect of the advertisement has been approved by the Supreme Court. Results may vary depending on your particular facts and legal circumstances.

    Sign up to get the latest from our attorneys!

    Explore What Matters Most to You.

    Consider subscribing to our Firm Insights mailing list by clicking the button below so you can keep up to date with the firm`s latest articles covering various legal topics.

    Stay informed and inspired with the latest updates, insights, and events from Scarinci Hollenbeck. Our resource library provides valuable content across a range of categories to keep you connected and ahead of the curve.

    What Can the Food and Beverage Industry Learn from the Molson Coors Cyberattack?

    Author: Scarinci Hollenbeck, LLC
    What Can the Food and Beverage Industry Can Learn from the Molson Coors Cyberattack?

    Molson Coors Beverage Company (Molson Coors) recently disclosed that it suffered a cyberattack that forced its beer production to come to a screeching halt...

    Molson Coors Beverage Company (Molson Coors) recently disclosed that it suffered a cyberattack that forced its beer production to come to a screeching halt. The incident highlights why robust cybersecurity is so important in the food and beverage industry.

    Molson Coors Cyberattack Results in Systems Outage

    Molson Coors disclosed the cyberattack in a filing with the US Securities and Exchange Commission (SEC). According to the 8-K filing, the incident, which caused a “systems outage,” occurred on March 11, 2021. In the wake of the cyberattack, Molson Coors “engaged leading forensic information technology firms and legal counsel to assist the Company’s investigation into the incident,” the filing stated.

    “The company is working around the clock to get its systems back up as quickly as possible,” the company said in its filing. “Although the company is actively managing this cybersecurity incident, it has caused and may continue to cause a delay or disruption to parts of the company’s business, including its brewery operations, production and shipments.”

    Food and Beverage Industry Has Unique Cyber Risks

    As we have discussed in prior articles, cybercrime has increased dramatically during the COVID-19 pandemic, impacting businesses in all sectors. The food and beverage industry is no exception—Brown-Forman, which owns Jack Daniel’s; Lion, an Australian alcoholic beverage company; and Italy’s Licya Campari Group all fell victim in the past year.

    Ransomware attacks are becoming increasingly common in the food and beverage industry as cybercriminals discover they can score large paydays by disrupting the critical business operations of large industrial companies. While Molson Coors has not yet disclosed the nature of its cyber incident, many security experts suspect it fell victim to ransomware.

    According to a recent report by Claroty, an industrial cybersecurity company, the food and agriculture sector experienced a fifty-six percent (56%) increase in industrial control system (ICS) vulnerabilities from 2019 to 2020. “Given the round-the-clock nature of operations in food and beverage companies, much of the IT equipment in manufacturing plants can’t be patched frequently, making these assets a prime target for attacks such as ransomware, which can seize up operations abruptly with a dramatic cost to the enterprise,” Grant Geyer, Claroty’s Chief Product Officer, told Industry Week.

    As cyber risks increase, continuous threat monitoring of all IT systems is essential. Businesses should also ensure that operating systems, software, and firmware are patched as soon as manufacturers release updates. Employees can also play a critical role in combatting cyberattacks, often thwarting an attack before it takes down your systems. However, as ransomware attacks become more sophisticated, workers need to be trained on the latest threats. For instance, while ransomware attacks initially relied on email messages that were clearly identifiable as spam, hackers are now using phishing schemes that make emails appear to come from a known contact.

    With prevention as the goal, businesses should also plan for an inevitable attack. Because it can take time to recover from a cyberattack and restore normal operations, it’s important to plan for the possibility of critical information systems being inaccessible for an extended period of time. Creating, maintaining, and exercising a basic cyber incident response plan can help businesses recover more quickly, as everyone involved knows their role and can immediately start to “work the plan” to regain normal business operations.

    Business continuity plans are also invaluable. While many plans address how to continue critical business operations in the face of a flood, power disruption, or other disaster, cyberattacks are not always addressed. A good starting point is to determine all the potential threats to your business operations posed by a cyberattack, rank the severity of each business disruption, and devise a plan to address each risk.

    Key Takeaway

    As Molson Coors learned the hard way, a cyberattack can significantly disrupt production and distribution. Since it is not always possible to thwart an attack, it is essential to have policies and procedures in place to get systems back up and running as quickly as possible. Food and beverage companies should use this latest incident as motivation to thoroughly review their cybersecurity and business continuity plans to ensure they address current and emerging risks.

    If you have questions, please contact us

    If you have any questions or if you would like to discuss the matter further, please contact me, Corey LaBrutto, or the Scarinci Hollenbeck attorney with whom you work, at 201-896-4100.

    Let`s get in touch!

    * The use of the Internet or this form for communication with the firm or any individual member of the firm does not establish an attorney-client relationship. Confidential or time-sensitive information should not be sent through this form.

    Sign up to get the latest from the Scarinci Hollenbeck, LLC attorneys!

    Please select a category(s) below: