Summer Phishing Surge: Why Scammers Love Holidays
Here we look at how phishing scams spike in summer, including fake travel bookings, delivery text traps and urgent invoice fraud, and why UK businesses and individuals are especially vulnerable during the summer holiday season.
Phishing Peaks in Summer as Risk Awareness Drops
The summer season is increasingly being exploited by cyber criminals as a prime window to launch targeted phishing campaigns. For example, according to Action Fraud, UK consumers lost over £11.6 million to holiday-related scams in 2024 alone, with July and August seeing the highest volume of reports.
Why?
Experts point to a combination of seasonal distractions and increased online transactions, particularly for travel and leisure, as key drivers. With staff taking annual leave and workflows stretched thin, businesses are also becoming easier prey for invoice fraud and impersonation attempts.
Proofpoint, a global cyber security firm, recently warned that over one third of major UK travel booking platforms are failing to implement basic email authentication protections, such as full DMARC rejection policies, leaving customers vulnerable to spoofed messages. “Criminals know people are more likely to be booking trips or awaiting parcels,” said Adenike Cosgrove, cybersecurity strategist at Proofpoint. “That makes them more likely to click without thinking.”
Fake Travel Sites and Booking Confirmations Are Widespread
A common scam involves fake travel booking websites or emails posing as legitimate platforms such as Booking.com, Airbnb or Jet2. In many cases, victims are lured through paid adverts on social media or search engines, where fraudulent domains are made to closely resemble real travel brands.
In one incident recently flagged on Reddit and verified by multiple users, scammers exploited Booking.com’s internal messaging system to pose as hotels, sending follow-up messages asking guests to confirm payment via a malicious third-party link. The impersonators mimicked the platform’s branding and messaging style with alarming accuracy.
Fake Accommodation Offers
According to Action Fraud, 44 per cent of holiday-related phishing reports in 2024 involved fake accommodation offers. For example, many victims were contacted after initially engaging with a legitimate booking site, suggesting criminals are monitoring and hijacking booking journeys to insert phishing attempts at key points.
Delivery Text Scams Continue to Catch Holidaymakers Off Guard
One of the most persistent phishing threats this summer is smishing, where fraudulent text messages impersonate delivery companies such as Royal Mail, Evri or DPD. These scams typically claim a parcel is delayed or requires a small fee to release, directing the recipient to a fake website that harvests card details or personal information.
The problem is growing. According to Proofpoint and UK Finance, fake parcel delivery texts accounted for 67.4 per cent of all reported smishing attempts in the 30-day period to mid-July 2025, up from 53.2 per cent in previous months. Financial impersonation scams, by comparison, made up just 22.6 per cent over the same period.
This reflects a longer-term trend. The National Cyber Security Centre reported a 174 per cent year-on-year rise in smishing attacks as of mid-2024, and industry data indicates that the increase has continued well into 2025. A recent consumer survey by Ofcom found that 42 per cent of UK mobile users had received a suspicious call or SMS in the past three months.
Mobile Scam Filters Still Falling Short
While mobile operators claim that scam filters are improving, independent testing has raised concerns. In one 2025 study by cyber firm MetaCert, every simulated smishing message was successfully delivered to UK phones. These included texts spoofing well-known brands and containing malicious links, suggesting that current filtering systems are still failing to block even basic threats.
Why Summer Timing Makes These Scams More Effective
The seasonal context plays an important role. During the summer, people are more likely to shop online for travel items, gifts or personal deliveries while away from home. This makes messages about missed or rescheduled parcels seem believable and time-sensitive, creating the urgency that scammers rely on.
According to advice published by Age UK Barnet, for example: “scam texts often appear to come from delivery companies, like Evri or Royal Mail, saying that a parcel is on its way and asking for payment.” The charity warns that people may click without thinking, especially when expecting a delivery, and highlights that older users may be particularly vulnerable if they are unfamiliar with digital services or not used to checking links carefully.
The growing sophistication of these scams, including the use of personalised names, postcodes or local courier references, makes them harder to detect. This is especially true on mobile devices, where links and sender details are less visible at a glance.
Fake Invoices and Business Email Scams Surge Before Holiday Deadlines
For UK businesses, the summer period brings another kind of cyber threat. Business Email Compromise (BEC) and invoice phishing scams often spike around end-of-quarter deadlines or during peak holiday handovers, when key personnel may be absent.
Scammers typically insert themselves into existing email threads by using a near-identical address to impersonate suppliers, contractors or internal staff. They then request urgent payments to altered bank accounts, citing things like updated banking details or changes to invoice terms.
With this in mind, the North East Business Resilience Centre (NEBRC), for example, has issued multiple alerts this summer urging firms to verify payment details verbally before transferring funds. “Organisations should treat every payment change request—no matter how routine it seems—with extreme caution, especially when staff are away,” said the NEBRC’s cyber lead. “We see companies lose tens of thousands of pounds in a single transaction.”
According to UK Finance, invoice and mandate scams cost UK businesses over £56.7 million in a single year, with construction, legal and property sectors among the most targeted.
Quishing Attacks Using QR Codes Are Also on the Rise Too
Perhaps a less familiar but growing trend is the use of malicious QR codes in phishing campaigns, often referred to as “quishing”. These codes may appear in emails, event posters, parking meters or travel itineraries, and lead to malicious websites once scanned.
Security researchers at Check Point have identified a significant increase in such attacks since spring 2025, with many targeting travellers by mimicking airline boarding passes or local information portals.
The real danger lies in the perception of safety associated with QR codes, particularly when presented in a printed or semi-official context. In several recent cases, scammers have replaced public QR codes on transport signage or tourist maps with fake stickers that lead to credential-harvesting sites.
UK businesses operating physical locations or QR-based digital services are being urged to regularly check signage, validate their own codes, and educate staff on the risks of scanning unknown links.
Criminals Exploit Social Context and Emotional Cues
What links all of these attacks is timing and emotional manipulation. For example, summer, with its relaxed atmosphere, frequent purchases and disrupted routines, creates ideal conditions for social engineering.
For example, as cyber security firm Barracuda reports, seasonal phishing emails tend to use more emotionally charged language, including urgency, fear of missing out or appeals to customer service or refunds. Phrases like “Your booking is at risk”, “Re-delivery needed today” or “Outstanding invoice requires attention” are designed to provoke rapid reactions.
The NCSC encourages UK users to follow its “Stop, Challenge, Protect” guidance—pausing before clicking or paying, questioning the legitimacy of the request, and reporting suspicious messages to the Suspicious Email Reporting Service (SERS) (at report@phishing.gov.uk).
Many Attacks Are Enabled by Gaps in Email Security
A report by Proofpoint revealed that as of summer 2025, only 61 per cent of the UK’s top 50 travel websites had enforced full DMARC rejection policies, which is a basic email authentication setting that helps prevent domain spoofing. This leaves both individual travellers and business clients exposed to fake emails that appear to come from trusted brands.
Similarly, smaller organisations often lack the cyber hygiene measures to filter out high-risk attachments or check for lookalike domains. In phishing simulations conducted by KnowBe4, UK companies saw click rates of over 33 per cent during peak summer periods, compared to 24 per cent in winter, suggesting seasonal distractions increase user vulnerability.
Also, the British Chambers of Commerce has called on smaller firms to step up basic security practices, especially during holiday periods when decision-making may be rushed or decentralised.
Cybercriminals Are Adapting Faster Than Users Can React
The final concern raised by many experts is the speed with which scammers adapt. While businesses and individuals may learn to spot one kind of scam, attackers quickly switch tactics, changing domain names, targeting new seasonal trends or using AI tools to personalise their phishing lures.
Check Point’s threat intelligence team recently found that Google, Microsoft and Apple were the top three brands impersonated in UK phishing campaigns during Q2 2025. These impersonations often come in the form of bogus security alerts, fake travel subscriptions or seemingly legitimate service confirmations.
The summer of 2025 is no exception. As more people head off on breaks, and companies operate with skeleton crews, phishing attacks are exploiting every opportunity to slip through the cracks.
What Does This Mean For Your Business?
What emerges from this summer’s phishing surge is a clear pattern of opportunism that cuts across both consumer and business behaviour. It seems that cyber criminals are not relying on sophisticated infrastructure or zero-day exploits. Instead, they seem to be exploiting timing, familiarity and human distraction. For UK businesses, especially smaller firms, this creates a persistent operational risk that does not end with the holiday season.
Attacks linked to fake bookings, delivery texts and invoice fraud are not only rising in volume but also in precision. Social engineering tactics have become more convincing, and the tools behind them more accessible. As the examples in this report show, scammers no longer need to breach systems to steal money or data, but they just need to catch someone at the wrong moment with the right message. This is particularly dangerous in summer when staff changes, out-of-office patterns and dispersed decision-making leave more gaps than usual.
The ongoing failure to implement email authentication standards such as DMARC, and the unreliable performance of mobile scam filters, suggest that many organisations are still relying on outdated or partial defences. Without investment in basic technical controls and regular user awareness training, UK businesses will continue to see preventable losses from phishing, whether in the form of misdirected invoice payments, stolen credentials or damaged trust.
For individuals, especially those booking holidays or expecting deliveries, the lesson is equally pressing. The presence of a recognisable brand or a plausible message is no longer a guarantee of safety. Personal vigilance, combined with public reporting and institutional support, will remain critical.
Looking ahead, the challenge is not just seasonal. Cyber criminals will continue to adapt their tactics to whatever events, platforms or behaviours dominate public attention. However, the summer phishing spike is a useful case study in how quickly attackers can exploit simple human habits, and how slow many defences still are to catch up. For both UK organisations and their customers, tackling phishing will require more than just summer warnings. It demands consistent, year-round resilience.
When the Boss Is Away – Don’t Let Security Slip
With managers away, risks like poor passwords, unlocked screens and slow reporting can quietly escalate, and this article explains why it happens and how to stop it.
Why Summer Leave Demands Heightened Password Hygiene
In 2025, just over four in ten UK businesses (43 per cent) reported experiencing a cyber security breach or attack during the previous 12 months, with that figure rising to 67 per cent in medium-sized firms and 74 per cent in large ones. Phishing remained the dominant method of attack, affecting 85 per cent of organisations that identified breaches.
Seasonal reductions in staff numbers, remote working and less oversight can allow small mistakes, such as reusing passwords, to have much bigger consequences. According to the Royal Institution of Chartered Surveyors, 27 per cent of UK businesses were hit by a cyber attack in the past year, up from 16 per cent the year before. These figures highlight the growing risk, particularly during periods with less supervision.
Use Modern Password Standards and Move Beyond Forced Expiry
UK cyber guidance now discourages regular forced password changes unless there has been a suspected breach. This is because, when users are prompted to change credentials frequently, they often create weaker, predictable passwords, for example by simply adding a number or punctuation mark.
Instead, the National Cyber Security Centre (NCSC) recommends the use of longer passphrases made up of three random words, separated by full stops. These are both stronger and easier to remember than traditional passwords. The NCSC also advises organisations to adopt password managers and, where possible, passkeys. These tools can generate and store unique credentials securely, reducing the risk of password reuse or staff writing details down.
MFA
Multi-factor authentication (MFA) remains one of the most effective ways to protect business-critical systems. Yet despite its benefits, only around 40 per cent of UK businesses have implemented MFA across all user accounts. Email accounts are especially vulnerable, as they can often be used to reset access to other platforms. Ensuring these are protected with MFA is considered a baseline measure by most UK security professionals.
Lock Screens and Devices Immediately When Unattended
An unattended device with an open screen is one of the easiest targets for opportunistic attacks or accidental misuse. Whether it is a visitor in the office, a contractor passing by or a well-meaning colleague, leaving access open can result in emails being forwarded, data copied or malware being introduced via USB.
The Information Commissioner’s Office (ICO) advises that screens should lock automatically after two or three minutes of inactivity. Staff should also be trained to manually lock their devices every time they step away from their desks. This is especially important during summer when office routines may be more relaxed and the mix of people in the workplace can change.
Recent incidents show that even organisations with secure buildings can fall victim to social engineering or internal threats if unattended devices are left exposed. Automatic screen locking, combined with a strong culture of responsibility, helps reduce the risk significantly.
Ensure Quick Incident Reporting When Supervision Is Reduced
When teams are leaner, delays in reporting suspicious activity can allow small issues to spiral. For example, even a single phishing email that goes unreported could result in credential theft, malware infection or wider compromise of the organisation’s systems.
The ICO reminds organisations of their legal obligation to report serious personal data breaches within 72 hours. However, underreporting remains an issue. For example, a (2023) Cybsafe survey found that many employees still hesitate to report security issues, fearing they will be blamed or seen as incompetent. Some of them attempt to fix problems themselves, often making the situation worse.
Clear Policies
Clear policies and non-judgemental internal reporting procedures can also help. For example, businesses should reinforce the message that early reporting is vital, regardless of the perceived severity of the issue. When fewer people are available to detect problems, every employee becomes part of the security perimeter.
Vigilance Essential
Major cyber attacks on well-known UK retailers in early 2025 highlighted how attackers often exploit gaps in supervision. For example, in one widely reported case, criminals impersonated staff during a helpdesk call to reset login credentials at a large national department store chain. Using publicly available information and a convincing pretext, they persuaded internal support teams to grant access to privileged systems. The attackers then used this access to infiltrate the company’s ordering and stock systems, causing widespread disruption to online deliveries, store stock management and customer services across the UK.
The NCSC has since updated its guidance to stress the importance of identity verification, particularly during periods when usual contacts may be away. Organisations should ensure that all staff know who to contact in case of a suspected breach and that backup procedures are in place when key individuals are on leave.
Also, Proofpoint’s 2024 threat report showed a rise in phishing campaigns timed around bank holidays and summer breaks, many of which referenced internal systems or posed as absent executives. These tailored scams are more convincing and more dangerous when teams are under pressure or lacking oversight.
Promote a Culture of Accountable Vigilance Year-Round
It’s worth noting here that security does not begin and end with IT departments. In reality, everyone in the organisation has a role to play, particularly when fewer colleagues are present to notice if something goes wrong.
As Richard Horne, CEO of the NCSC, recently warned “businesses ignore advice at their peril,” thereby highlighting that even basic security measures can reduce insurance claims by over 90 per cent. However, the latest government figures show that fewer than one in ten UK organisations are currently certified under Cyber Essentials, the UK’s official baseline standard.
The ICO and NCSC both emphasise that technical tools must be matched by behaviour and awareness. That includes locking screens, using secure credentials, escalating concerns early and understanding that cyber security is not someone else’s job.
What Does This Mean For Your Business?
A key takeaway here is that there’s no seasonal exemption from cyber threats. In fact, if anything, the summer period heightens the risk, as gaps in supervision and more flexible routines make it easier for poor habits to slip through unnoticed. For UK businesses, this is not just a matter of good practice but of operational resilience. Attacks timed during holiday cover or lean staffing can have a disproportionate impact, especially when response times are slower and reporting structures unclear.
The broader lesson is that culture really matters. Password policies, screen-locking procedures and incident response plans are only effective when staff at all levels understand them and use them without hesitation. For security teams and senior leaders, this means investing in clarity and communication as much as in software or hardware.
UK regulators are already making expectations clear. With the ICO strengthening its stance on breach reporting and the NCSC repeatedly highlighting the need for accountability beyond the IT department, there is growing pressure on organisations to prove that cyber responsibility is being taken seriously throughout the business. That includes facilities managers, HR teams and anyone with access to systems or data.
What this means for UK businesses is a need to treat holiday periods not as downtime, but as a potential test of their internal defences. For insurers, regulators and supply chain partners, lapses in protocol will look less like an accident and more like a failure to plan. For customers and clients, the reputational damage from a breach can be immediate and lasting.
Avoiding that outcome does not require complex changes. It comes down to reinforcing a few non-negotiables. Strong, unique passwords. Locked screens. Prompt reporting. And a shared understanding that good security is not a favour to the IT team but a safeguard for the whole organisation.
Out of Office, Not Out of Mind …
In this article, we look at various ways staff can stay cyber-secure while away, from setting safer out-of-office replies to avoiding phishing on the move and protecting devices abroad.
Out-of-Office Messages Can Put You at Risk
Most employees see out-of-office (OoO) replies as a harmless admin task. However, the wrong message can actually open the door to social engineering and impersonation attacks. It’s not the message itself that’s risky but what it reveals, and to whom.
For example, attackers actively scan for out-of-office responses which include return dates, job roles, colleague names, or even direct phone numbers. These details can be used to craft credible phishing emails that appear to come from someone inside your organisation or a known supplier.
To reduce the risk, the UK’s National Cyber Security Centre (NCSC) advises that organisations set clear rules for OoO replies. The most important steps include:
– Using different messages for internal and external recipients.
– Avoiding specific return dates or colleague names in external replies.
– Limiting details to a simple confirmation of unavailability.
For example, instead of “I’m in Spain until 15 August—please contact Lisa in Accounts,” a better external message would be: “I’m currently unavailable and will respond to your message on my return.”
Internally, it’s fine to include a bit more information, but it should still be concise if possible. The aim is to help colleagues, not advertise an absence to outsiders.
Phishing Attacks Are Timed to Catch You Off Guard
When staff are away from their usual routines, especially while travelling, they’re more likely to fall for phishing attempts. This is no coincidence and cyber criminals actively exploit periods like school holidays and summer breaks to increase attacks.
The UK Government’s Cyber Security Breaches Survey 2025 found that phishing remains the most common form of cyber attack, accounting for 85 per cent of incidents reported by businesses and 86 per cent by charities. The same survey estimated over 8.5 million cyber crimes against UK businesses in the past 12 months, of which more than 7.8 million were phishing-related.
These attacks often take the form of fake hotel confirmations, airline refund requests, or urgent security notifications that appear to come from well-known brands. A mobile phone notification while queuing at an airport (while distracted and in an unfamiliar environment) is far more likely to be clicked than an email during a typical office day.
To mitigate this, staff should be reminded before going away that:
– No reputable company will ask for login credentials by email or SMS.
– Links and attachments in unexpected travel-related messages should never be clicked without verifying the source.
– Suspicious messages can be reported to report@phishing.gov.uk or via text to 7726.
Tip: Pre-holiday reminders and short cyber awareness refreshers can make a significant difference, especially when phishing attempts are designed to catch people off guard.
Travel Exposes Devices to Extra Risks
It’s worth noting that business travellers face a different set of risks, especially if they’re logging into company systems abroad. For example, public Wi-Fi networks, hotel business centres, and even charging stations can all pose threats if used without care.
With this in mind, the NCSC recommends several precautions that should now be considered standard practice:
– Keep all software and security updates current before leaving.
– Use strong passwords and enable multi-factor authentication.
– Turn off Bluetooth and Wi-Fi auto-connect settings to avoid rogue connections.
– Only use secure, private Wi-Fi or a trusted mobile hotspot.
– Avoid public USB charging points, which can be used to extract data or install malware.
– Use a Virtual Private Network (VPN) when connecting to work resources remotely.
VPNs encrypt your internet traffic, reducing the risk of interception. Without one, using a free Wi-Fi network at an airport or hotel could expose email, login credentials or confidential files to anyone else on the same network.
Temporary Devices
Some organisations now go a step further, issuing temporary devices for international work trips. These are pre-configured with minimal data and set up to be wiped remotely in case of theft or compromise.
What Happens If a Device Is Lost or Stolen?
According to recent government data, over 2,000 official laptops, phones and tablets were reported lost or stolen in a single year. While most were encrypted, even a brief exposure could result in leaked credentials, compromised apps, or unauthorised access to systems if multi-factor authentication is not used.
In the private sector, the same risks apply. For example, if a staff member leaves a work phone in a taxi or hotel room, the consequences can range from inconvenience to data breach, particularly if no backup exists or if the device grants access to sensitive files without additional controls.
The most effective countermeasure is a layered one:
– Encrypted storage.
– Device lockout after inactivity.
– Remote tracking and wipe capability.
– Strict separation between personal and work accounts.
Employees should also know who to notify if a device is lost, and how quickly a compromise can escalate if not handled swiftly.
Oversharing on Social Media Can Be Just as Dangerous
Even without phishing or device theft, sharing too much about travel plans can lead to risk. A well-timed LinkedIn post saying “off to Greece for two weeks” may seem harmless, but it confirms a person’s absence to anyone watching, including cyber criminals looking to exploit out-of-office gaps.
Posting photos of boarding passes, passports or hotel locations on social media can also invite fraud. In recent cases, scammers have used partial passport information combined with leaked credentials to access travel accounts or generate fraudulent documents.
The safest approach is to wait until you’re home before sharing holiday updates publicly, or to keep posts strictly limited to private audiences.
Clear Expectations and Small Changes Make a Big Difference
While cyber threats grow more sophisticated each year, the most effective defences are still relatively simple:
– Don’t overshare in auto-replies.
– Watch for phishing while on the move.
– Keep devices locked down and updated.
– Avoid unnecessary risks abroad.
UK businesses can do more to embed these habits into everyday culture, especially during peak holiday months. Even if a full training session isn’t feasible, a short checklist or pre-departure reminder can reduce exposure significantly.
What Does This Mean For Your Business?
The risks outlined here are not theoretical. They reflect common oversights that continue to be exploited by attackers year after year. For UK businesses, especially those with remote or hybrid teams, these issues matter because they affect every department. A single out-of-office reply or a misjudged click while abroad can lead to reputational damage, operational disruption or financial loss.
The increase in phishing attacks during holiday periods shows how cyber criminals adapt their tactics to match human behaviour. The fact that over 85 per cent of cyber incidents reported by UK businesses now involve phishing should act as a clear warning. Routine travel or time off is not a reason to lower defences. In many cases, it is when organisations are most vulnerable.
All this creates a strong case for better awareness, firmer controls around device use while travelling and more consistent defaults for things like out-of-office replies and remote access. These measures are not expensive. In most cases, they come down to clear expectations, simple communications and a few minutes of preparation that can prevent much bigger problems later.
For individual employees, these risks are not always obvious, particularly for those in non-technical roles. That is why basic guidance on travel-related security should be part of the normal rhythm of work. Whether someone is attending an overseas meeting or switching off for a well-earned break, the same principles apply.
This also matters for HR, compliance and communications teams. The way cover is arranged, the wording of public messages and the tone of internal guidance all play a part in how securely staff behave while away. Responsibility for this does not sit with IT alone.
In the end, protecting an organisation during staff holidays is not about large-scale policy overhauls. It is about recognising that certain periods carry higher risk and planning accordingly. When simple habits like cautious messaging, phishing awareness and secure device use are embedded into daily working culture, the chances of a successful attack drop significantly. Also, in a landscape where cyber criminals only need one opening, those habits are what keep your business protected.
Sustainability-In-Tech : Robots Cut Strawberry Pesticides
A new wave of farm automation is aiming to cut chemical use in food production, led by California-based TRIC Robotics, whose UV-powered robots are helping strawberry growers tackle pests and disease without pesticides.
Tackling One of the Dirtiest Fruits on the Shelf
Strawberries may be a consumer favourite, but they’re also among the most chemically treated fruits in commercial farming. For example, according to the US-based non-profit Environmental Working Group’s 2024 “Dirty Dozen” list, strawberries once again topped the rankings for the highest levels of pesticide residue found on produce in the US. Despite growing demand for organic alternatives, conventional pest control practices in strawberry production remain heavily reliant on chemical sprays, often applied multiple times per week throughout the season.
It’s this issue that San Luis Obispo-based TRIC Robotics set out to address with a radically different approach. For example, rather than spraying crops with synthetic chemicals, the ag-tech company is using ultraviolet (UV-C) light, applied by autonomous robots operating at night, to kill pathogens and deter pests. Early results suggest the method could significantly reduce pesticide use on commercial farms while improving yield and sustainability.
Who Is Behind TRIC Robotics?
TRIC Robotics was founded in 2017 by Adam Stager, who holds a PhD in robotics. The company originally focused on developing mobile robots for law enforcement but pivoted towards agriculture in 2020 after Stager began exploring how automation could be applied to more socially impactful sectors. Through a US Department of Agriculture (USDA) commercialisation programme, he was introduced to dormant UV-light research that had not yet reached the field.
“I really wanted to do something that would have meaningful impact,” Stager told TechCrunch earlier this year. “When I discovered the potential of UV-C for farming, I saw a way to improve food production while reducing harm.”
Alongside co-founders Vishnu Somasundaram and Ryan Berard, TRIC began trialling early prototypes in strawberry fields along the US West Coast. The first robot was built in Stager’s garage and transported cross-country to farms in California, where the majority of US strawberries are grown. Since those early experiments in 2021, the company has expanded to nine robots and secured contracts with several major growers.
How the Technology Works
The system centres around large, tractor-sized autonomous robots, named Eden and Luna, which use UV-C light to control fungal and bacterial pathogens as well as insects such as spider mites. UV-C light, a short-wavelength ultraviolet radiation, damages the DNA of microorganisms, disrupting their ability to reproduce.
The robots operate exclusively at night, when UV-C is most effective and when plants are less vulnerable to stress. Each robot is equipped with adjustable booms, dosing systems, and high-resolution cameras for precision treatment. They can cover 50 to 100 acres each, moving independently through rows and adjusting to uneven terrain and plant height in real time. Vacuum systems are also fitted to remove pest residue and insects from leaves without damaging the crop.
Robots As-A-Service?
Instead of selling robots to farmers outright, TRIC offers a subscription-style “service model” in which robots are delivered, managed, and maintained by the company. Farmers pay roughly the same as they would for conventional spraying but avoid the need for pesticides, re-entry delays, or additional labour.
Environmental and Operational Benefits
The approach offers a clear environmental upside, which is reduced pesticide use. This, in turn, means less chemical runoff into soil and waterways, lower risk to pollinators and other beneficial insects, and fewer residues on produce. It also supports growers aiming to meet organic standards or export restrictions tied to pesticide levels.
From a business perspective, the robots improve consistency, reduce re-spray requirements, and allow treatments to occur more frequently. TRIC claims farms using its robots have seen pesticide use fall by up to 70 per cent, with some reporting yield improvements thanks to better pest and disease control.
The autonomous machines also generate valuable data. Built-in cameras and sensors capture real-time insights on plant health and pest pressure, helping growers monitor performance and make more informed decisions.
Ambition = Automated Crop Protection
TRIC raised $5.5 million in seed funding in mid-2025, led by Version One Ventures, with backing from Garage Capital, Lucas Venture Group, and others. The investment is being used to expand the robot fleet, enhance analytics, and explore the system’s applicability to other crops beyond strawberries.
Stager says the long-term ambition is to provide “automated crop protection” across multiple types of produce. “Agriculture needs practical, scalable solutions to reduce chemical inputs and protect yields,” he told investors during the funding round. “UV-C is one of those solutions—but only if it can be applied efficiently, safely, and at scale.”
TRIC’s approach also highlights a broader shift in ag-tech away from standalone equipment sales towards service-based, data-rich models that mirror the way many farmers already procure services like spraying or fertilisation.
Others in the Field
TRIC is not alone in applying UV-C to agriculture, but its combination of automation, scale, and commercial deployment is relatively rare. One of the best-known alternatives is Norway’s Saga Robotics, whose Thorvald platform uses UV-C light to treat strawberries and grapes in Europe and the US. However, Saga’s robots are smaller, battery-powered, and typically used in research or niche applications.
Other firms, such as FarmWise and Naïo Technologies, are also building autonomous farm machinery, but these generally focus on weeding, harvesting, or mechanical cultivation rather than light-based disease control.
In the greenhouse sector, Dutch firms like Priva and Signify have experimented with UV light for fungal control in tomatoes and cucumbers, but few solutions are currently available for open-field use at scale.
This essentially positions TRIC as one of the most commercially advanced players applying UV-C at field level. Still, the space is expected to grow quickly, with McKinsey predicting that farm robotics and automation will become a $50 billion global market by 2030.
Challenges
Despite promising results, the technology is not without challenges. One concern is the potential for overuse of UV-C, which can damage plant tissue or lead to resistance in certain pest populations if not carefully managed. TRIC’s dosing systems are designed to avoid this, but it remains a technical and biological balancing act.
Another issue is energy use. For example, although TRIC’s early robots were battery-powered, the current versions use on-board diesel generators due to limited field charging infrastructure, thereby raising questions about carbon emissions, especially for a solution marketed on sustainability grounds. TRIC has acknowledged this limitation and says future versions may explore hybrid or fully electric designs as farm infrastructure improves.
There are also operational constraints to consider. For example, the robots work best in certain field layouts and require access to well-maintained paths and consistent planting patterns which is something not all farms can offer without modification. That said, TRIC’s tractor-sized form factor was deliberately chosen to mirror existing spray rigs and reduce disruption.
Also, some industry observers have questioned whether UV-C alone is actually sufficient to replace chemical sprays across a full growing season, especially in regions with high pest pressure. While results from pilot sites have been encouraging, broader third-party trials and peer-reviewed research will be key to long-term credibility.
What Does This Mean For Your Business?
If TRIC’s model continues to scale, it may bring about a change in how pest and disease control is delivered across large-scale agriculture. By offering automation as a service and avoiding upfront equipment costs, the company has lowered the barrier to adoption for growers who might otherwise resist change. That could accelerate the move away from chemical inputs in a sector long dependent on them. The fact that it’s proving cost-comparable to traditional spraying means it may not take government intervention or subsidies to push adoption forward.
For the robotics industry, TRIC’s success adds weight to the idea that task-specific, autonomous machines, especially those built around a practical service model, can find real traction in farming. This is a notable development in a space where many ag-tech ventures remain trapped in trial stages or small-scale pilots. If other crops can be treated as effectively, and if energy issues are resolved, UV-C robotics may offer a compelling template for reducing agrochemical reliance more widely.
UK farmers, especially those under pressure from changing pesticide rules and tighter sustainability requirements, may see clear potential in this approach. For example, British growers facing EU-derived regulations on maximum residue levels and soil health could benefit from a model that allows frequent treatment without chemical application or delayed re-entry. There could also be scope for adaptation to local crops such as soft fruits, leafy greens, or high-value organics, particularly where manual spraying is still dominant or increasingly expensive due to labour shortages.
Also, for UK businesses involved in food supply chains, TRIC’s methods are likely to be promising. For example, as major retailers and buyers place more emphasis on sustainability, traceability, and reduced chemical use, upstream suppliers using robotic UV-C solutions may gain competitive advantage. The same applies to UK-based ag-tech firms exploring adjacent fields. The window is open for others to localise or licence similar models in the UK and Europe, or to partner with growers on collaborative trials.
However, any rollout here would need to take into account different field conditions, crop types, and infrastructure. Unlike the flat, uniform rows of California strawberry farms, many British farms are smaller, more varied in layout, and less mechanised. That may limit near-term deployment without further design iterations.
It’s also worth watching how regulators may respond. For example, UV-C is already used in food processing and healthcare, but applying it in open-field environments could raise fresh questions about environmental exposure, crop labelling, and treatment records. Clear data on safety, efficacy, and operational standards will be essential to building trust.
For now, TRIC’s model stands out as an example of how robotics, when applied thoughtfully and at the right point in the production chain, can genuinely support more sustainable agriculture. The bigger test will come as more farms take it on, and as others begin to compete on similar ground.
Video Update : A Quick Look At The ChatGPT ‘Agent’
We’ve all been waiting for it … and now it’s here! This video takes a quick peek at the ‘agent’ which is now available in the UK for paid ChatGPT users … and it is far from perfect as we’ll see!
[Note – To Watch This Video without glitches/interruptions, It may be best to download it first]
Tech Tip – Snooze Gmail Messages to Deal With Them Later
Busy Gmail inbox? The ‘Snooze’ feature lets you temporarily hide an email and have it reappear at a date and time when you’re ready to act on it.
How to:
– Hover over the email in your Gmail inbox.
– Click the clock icon (Snooze) on the right.
– Choose a preset time like “Tomorrow” or “Next week”, or click Pick date & time to choose your own.
– The email will disappear from your inbox and return at the scheduled time—marked as unread and flagged for attention.
What it’s for:
Keeps your inbox clear and helps you deal with non‑urgent emails at the right moment—ideal when you’re on the move, in meetings or just prioritising.
Pro‑Tip: Snoozed emails appear in your Snoozed tab (left-hand menu), so you can check or reschedule them at any time.