Hackers

















Last HQ told ctl's it will be back up MAYBE eod Thursday.

Ridiculous! Cannot believe Merck mandates reps send constant field emails and fast sampling. We are exposing ourselves to attacks further whilst pissing off the very customers we serve. It doesn't make internet security sense to keep sending out these crap emails to thousands of emails. Blame the useless CTL's who mandate the use of these tools to justify their overpaid babysitter jobs!
 












Kind of ironic, isn't it? A company run by a liberal, trial lawyer, complaining about Russian hacking into our elections(proof that even if they did it had an effect?)now has his companys computer system hacked. I love it. Kenny boy, and trial lawyers come through again. Keep up the good work boys.
 




Kind of ironic, isn't it? A company run by a liberal, trial lawyer, complaining about Russian hacking into our elections(proof that even if they did it had an effect?)now has his companys computer system hacked. I love it. Kenny boy, and trial lawyers come through again. Keep up the good work boys.
Ken Frazier is an imbecile.
 












Time to ditch the computers and use the old paper forms for samples. it is much safer that way.

Life was good pre computers. If you operated sans comp you know that very well. There were less useless exercises of turning around a email request within minutes versus days via regular mail. Those were the days! If you worked then only you remember that quality of life that is now lost forever.
 




















The Real Story of True Arrogance & Stupidly .Real Great Idea to Fire all IT people & Outsource to eastern.

Merck missed two critical opportunities earlier this year to inoculate themselves from the vicious cyberattack they suffered this week, roiling operations and raising questions about their lack of preparation to defend themselves.

The June 27 “Petya/NotPetya” cyberattack hit the multinational Merck and several other companies, such as the law firm DLA Piper, shipping giant Maersk, and even a West Virginia hospital, which was forced to scrap its electronic medical records in favor of paper.

The core technology in Petya is called ETERNALBLUE and it was developed by American spy agencies, the Washington Post previously reported. Obviously, it was never intended for wide distribution. It relied on bugs in Windows that Microsoft presumably wasn’t aware of until earlier this year, when a group of still-unknown hackers calling themselves ShadowBrokers allegedly broke into the US NSA and demanded payment in exchange not releasing the ultra-secret exploits.

The stolen tools were eventually dumped on the internet.

In March, Microsoft quickly issued a critical bulletin advising IT administrators of the precise steps needed to patch their systems to prevent hackers — ranging from the state-sponsored to lone-wolves — in using the ETERNALBLUE technology to gain unauthorized access to their networks. Experts recommend critical bulletins be installed immediately, versus merely recommended ones, which large companies sometimes test out before deploying to a large network.

Then in May, the first global attack based on this exploit, dubbed WannaCry, spread widely, notably shutting down sixteen hospitals in the UK.

Microsoft issued yet another patch in the aftermath, and along with the most prominent security firms worldwide, began pleading with companies to immediately employ these crucial patches to prevent unauthorized access to private networks.

So after continuous warnings from Microsoft starting in March, with two critical software updates, and a global cyberattack in May which showed the potential impacts on the healthcare industry, Merck still neglected to update their systems.

Repeated attempts to contact Merck have been unsuccessful.