Home Security Tractors vs. threat actors: How to hack a farm