Search

Voices For Food
Resources for Food Councils to bridge the gap between food security and healthy food choices.

Regulatory Guidance for Selling Foods in South Dakota
Now more than ever, we are seeing food processors and entrepreneurs in South Dakota bringing their food products, not only to farmers markets, but also to retail stores. This article provides regulatory guidance and outlines the necessary steps required to allow for the sale of foods to retail stores.

A Guide to Drying Foods
Fact sheet about drying foods

Cybersecurity Planning: Securing the Future
With reliance on digital technologies, precision agriculture requires securing data and implementing key strategies to safeguard digital assets and maintain operational integrity and confidentiality.

SDSU Extension Beef Team Members Receive Training for the Secure Beef Supply Plan
The Secure Beef Supply Plan provides cattle producers and industry partners with the resources needed for business continuity in case foot and mouth disease infects the United States livestock industry.

Food Safety for Farmers Markets
Food safety bulletins for farmers markets and other direct marketing vendors

Dakota Food Rx Recipes
Recipes for Dakota Food Rx patients

Food Safety Scientist: A Dynamic STEM Educational Adventure
Real-life situations provide some of the greatest opportunities for students to learn how science impacts their life. Explore the common science and technological concepts in the development of a safe food supply within the classroom through the Food Safety Scientist Curriculum.

Being Vigilant of Livestock Property Security and Surveillance
Livestock producers have many daily responsibilities when it comes to caring for and protecting their animals. One responsibility is to remain vigilant regarding individuals that oppose the use of animals for food or other purposes.

What should you do before or after any cyber security breaches?
Preparation is critical for managing cybersecurity breaches in agriculture, where digital tools and data are increasingly integral to operations. Learn what you can do before, during, and after a security breach to protect your operation in the event of a breach.