security (3)

Fish from afar

13740185701?profile=RESIZE_400xAround 80% of the seafood consumed in the UK is imported. Much of it comes from Norway, Iceland, Vietnam, and more countries.

In the latest issue of Food Science and Technology, Ivan Bartolo explores the UK’s reliance on imported seafood, driven by consumer preferences, global supply chains, and the demands of fish processing factories.

The article also explains how food safety is maintained, how the country determines the origin of seafood, and the environmental and resilience challenges associated with these imports.

Access full article: https://doi.org/10.1093/foodst/vwaf044

Read more…

Tenet Law are a FAN partner.  They have kindly provided this best-practice guide to protect your business against Cyber Crime.  You can find out more at Tenet's website.

Cyber Risk: Who’s Really Prepared?

Cyber threats are evolving rapidly, yet many organisations remain unprepared for the risks they face and uncertain about how to respond in the event of an incident. No organisation is immune to the risks, making proactive cybersecurity measures essential.

From safeguarding sensitive data to managing third-party risks and responding to ransomware attacks, businesses must first identify vulnerabilities and gaps in their systems and processes.

Adding to the challenge, regulatory requirements impose additional complexity on our already demanding roles. Ensuring compliance and managing policies, procedures, and vendor relationships are crucial.

This article offers practical advice and strategies, helping organisations to feel confident in their approach, emphasising the importance of everyone in the business supporting and building resilience against cybercrime.

Large Organisations Vs Small Organisations

  • Large firms invest heavily in cybersecurity due to greater risks and assets, but their systems are complex and harder to patch.
  • Smaller firms may assume they are not targets or rely on outdated practices, making them vulnerable.
  • Businesses of all sizes should conduct regular audits, training and software updates to avoid vulnerabilities in legacy systems and to comply with the latest regulation.
  • At a minimum, carry out a basic cyber hygiene check annually to review software updates, access controls and incident response plans.
  • Many businesses treat certifications like Cyber Essentials as a tick-box exercise, but these basic measures do not stop advanced cyber threats.
  • The best security tools can be expensive, making them inaccessible for small businesses.
  • ISO 27001 is the international standard for information security, requiring organisations to:
    • Identify security risks.
    • Select appropriate controls to mitigate risks.
    • Establish an internal process to handle incidents.

________________________________________

Protecting Data & Third-Party Risks

  • Fraudsters often target smaller vendors to gain access to bigger companies.
  • Vendor risk assessments are essential—ask suppliers about their cybersecurity controls before sharing data.
  • Review supplier contracts for security clauses and require them to meet cybersecurity best practices.
  • Monitor third-party access—limit vendor access to only what they need, for the time they need it.
  • Effective cybersecurity is about setting clear parameters—knowing what data is coming in, what is going out, identifying risks and defining actions to take when threats arise.
  • Ensure your staff know how to escalate an incident to the appropriate person or team to determine whether a breach has occurred.

________________________________________

Strengthening Defences

  • Many businesses avoid cybersecurity because it feels too technical.
  • Asking "Why do we do it this way?" can reveal security gaps.
  • Get the Board interested by asking “What happens if we lose access to X system for 24 hours?”
  • Cyber risk is now treated like health and safety—it’s no longer optional.
  • Many businesses assume, “It won’t happen to us,” leading to poor preparation and rushed decisions during an attack.
  • Have an incident response plan that includes:
    • Who is involved (internal/external)?
    • What steps must be followed?
    • Who makes key decisions?
    • How are systems restored and regulators informed?
  • Be open and honest about breaches—notify affected parties promptly and follow legal reporting obligations (e.g., GDPR’s 72-hour rule).
  • Transparency is key - I can recover from the truth I can’t recover from a lie!

________________________________________

Real and Relevant Cyber Threats

  • The cybersecurity industry often spreads fear rather than offering practical solutions.
  • Many businesses struggle to identify which threats are real and relevant.
  • Instead of overwhelming staff with too many security policies, focus on keeping it simple.
    • Protect your perimeter (firewalls, network monitoring).
    • Control what goes in and out (limit USB drives, monitor email attachments, downloads).
    • Training and education (unusual payment requests, phishing emails, passwords).
  • AI tools create new risks, such as data leaks, deepfake scams and employees sharing confidential information with AI chatbots.
  • Educate staff on AI risks and set clear guidelines on what can/cannot be shared.
  • Many breaches occur because employees don’t report suspicious activity due to fear of blame.
  • Build a non-blame reporting culture where employees feel safe reporting potential security issues.

________________________________________

Ransomware Dilemmas

  • Many companies quietly pay ransoms instead of reporting breaches.
  • The government is moving toward banning ransomware payments for critical infrastructure sectors.
  • NEVER pay a ransom—it does not guarantee data return and invites further attacks.
  • Have offline backups to restore data if ransomware locks your systems.
  • Some industries must report cyber incidents (e.g., financial firms under DORA regulations) and more mandatory breach disclosure laws may follow.
  • Keep an action log—document every step of your cyber response (who was notified, what actions were taken) for legal and compliance purposes.
  • Stay informed about new cyber security laws (e.g. the UK’s upcoming "King’s Resilience Bill").

________________________________________

Preparing for a Cyber Attack

  • The best way to prepare is to practice before it happens.
  • Run a cyber attack simulation using real-life threats:
    • A fake invoice email with malware.
    • A ransomware attack locking business files.
    • A data breach where customer information is stolen.
    • An employee clicking on a phishing link.
  • Measure response time, decision-making and gaps in your plan.

 

To understand more about Cybercrime watch the latest ‘At the Coalface’ webinar back on YouTube. Tenet’s Arun Chauhan - an accomplished lawyer specialising in fraud investigations and disputes, is joined by leading cyber security expert and consultant Adrian Jolly. Together, they cut through the noise and have an unfiltered conversation about cyber risk, what businesses are getting right, what they’re getting wrong, and how to stay resilient against evolving threats. Click here:

 

Tenet are a multi-award winning law firm specialising in complex fraud disputes, investigations and financial crime compliance. Our experience and sole focus is our expertise of dealing with a range of financial crime and fraud issues and applying that detailed and experienced knowledge to certain sectors, including food. For more information on how you can better prevent or investigate fraud within your business visit our website or sign up to receive articles, events and insights straight to your inbox

Read more…

Food in a Pandemic report published

8676946872?profile=RESIZE_584x

The Food in a Pandemic report, commissioned by the FSA and produced by Demos as part of Renew Normal: The People’s Commission on Life after Covid, looks to understand how a new food environment created during the pandemic has impacted the public’s behaviours and preferences. The research included: a nationally representative survey of 10,069 UK adults, a nationally representative online deliberative method called Polis with 1,006 UK respondents, a series of four deliberative workshops, and an open access survey of 911 adults.

Key findings on the public’s experience during the pandemic 

Food insecurity 

The report shows that people have stepped in to help prevent new forms of food insecurity caused by people self-isolating by offering informal forms of support such as shopping for others   

Findings also show there is a public appetite for the government to take action to help feed those without the means to feed themselves. People also tend to be more supportive of preventative actions for food insecurity, such as ensuring well-paid jobs are available to all. Just under two thirds (63%) agreed in the Polis that ‘it is the government’s responsibility to make sure no-one goes hungry’. 

UK food supply 

It’s reported a significant proportion of the population have bought food more locally or grown more food during the pandemic, reflecting a wider move towards individual self-sufficiency. Many of those who have made this move expect it to continue after the pandemic. 

78% of those surveyed supported the UK keeping its current food quality standards, even if food is more expensive and less competitive in the global market. A similar proportion (82%) also supported maintaining the UK’s current animal welfare standards, when presented with the same trade-off against prices and competitiveness. 

Diet and eating habits 

There has been a complex shift in people’s diets during Covid-19, with more home cooking. Although a third (32%) of respondents in the poll reported eating more healthy main meals, a third (33%) ate more unhealthy snacks. 

Some of the restrictions and public health advice, such as stay at home, might have encouraged more healthy eating. Those who have cooked more or eaten healthier main meals tend to expect this change to continue. However, this is likely to be somewhat dependent on the other changes, such as continued flexible working.  

Read full report.

 

Read more…