MERCK IT stinks

























Outlook has been up since Thursday. Go play on your fisher price toy dummy PC kid.


Wow - a patchwork piece of shit emergency email system was cobbled together.

Why is research still completely down? Why do half of the support personnel not have simplicity on their Merck PC's. Facilities lost EVERYTHING, most research labs lost EVERYTHING, all the instruments are idle as they work on windows PC's and the ARE NO BACKUPS.

Nice work Merck - you saved a few hundred thousand dollars cutting IT to the bone, happy now? LOL!!!!

Who was the IT leader who was contacted while on vacation and told not to bother coming back to work?
 






Wow - a patchwork piece of shit emergency email system was cobbled together.

Why is research still completely down? Why do half of the support personnel not have simplicity on their Merck PC's. Facilities lost EVERYTHING, most research labs lost EVERYTHING, all the instruments are idle as they work on windows PC's and the ARE NO BACKUPS.

Nice work Merck - you saved a few hundred thousand dollars cutting IT to the bone, happy now? LOL!!!!

Who was the IT leader who was contacted while on vacation and told not to bother coming back to work?

Awaiting next virus debrief and lessons learned messages from senior leadership.. writing has been excellent so far, very creative dodges of the simple fact that the patch issued 3 months prior was not applied.

Employee business briefing will be amazing with awkward laughter and cringe worthy smiles as management passes blame. Note: only 6 minutes saved for employee questions, with 1 warm up question on keytruda "submitted by email".

Why weren't any other big US companies infected? All explanations other than 100% merck ITs fault are bullshit.

Now give me my laptop back with win7 as all other companies are on win10 so I can get into office 2010.
 












Non-IT employee thinks he knows everything about Petya and could have prevented himself. I'm shocked.

https://krebsonsecurity.com/2017/06/petya-ransomware-outbreak-goes-global/

A new strain of ransomware dubbed "Petya " is worming its way around the world with alarming speed. The malware is spreading using a vulnerability in Microsoft Windows that the software giant patched in March 2017 — the same bug that was exploited by the recent and prolific WannaCry ransomware strain.

Microsoft released a patch for the Eternal Blue exploit in March (MS17-010 ), but many businesses put off installing the fix. Many of those that procrastinated were hit with the WannaCry ransomware attacks in May.

New ransomware, old techniques

https://blogs.technet.microsoft.com...-old-techniques-petya-adds-worm-capabilities/

These two exploits were leaked by a group called Shadow Brokers. However, it is important to note that both of these vulnerabilities have been fixed by Microsoft in security update MS17-010 on March 14, 2017. Machines that are patched against these exploits (with security update MS17-010 ) or have disabled SMBv1 are not affected.
 
























Thanks a lot for screwing things up!! Syncplicity was not installed in many of our computers. We lost everything!

Oh and thanks for wiping out my IPAD! You made me change my password three times in two weeks! How could someone remember that long ass password!

FU CLARK!!

Of course it sucks when you hire type A, micromanagers who can't sell, who are narcissistic, and who make reps lives a living hell if they don't kiss their butts like Vaccine DCO Thomas L. Lyon III.
 












Typical profile at all of the pharma companies.
Bingo!!! the incestuous nature of this industry is nauseating. The sales strategies of these companies are so myopic and self serving its a miracle that any physician today actually takes the time to interact with a rep, much less one dragging in their "Hall Monitor" manager ( for the umpteenth time)to critically evaluate whether or not the rep with 20 plus years of experience knows who to sell. You cant make this stuff up!!!
 






Very much IT, and very much aware of the fact that Merck IT sucks, yes - the patch the rest of the world applied months ago was missed, care to debate that skippy?

We not sucks, we much work hard in Prague to give good IT to Merk. We good IT people, Czech it out!
Prosím, pošlete vízum, abych se mohl dostat z této pekelné díry!
 












Very much IT, and very much aware of the fact that Merck IT sucks, yes - the patch the rest of the world applied months ago was missed, care to debate that skippy?

Nobody would argue the need to patch IT systems in a timely manner. The question is would that have prevented this?

The first blog article on Petya linked earlier also states, "Organizations and individuals who have not yet applied the Windows update for the Eternal Blue exploit should patch now. However, there are indications that Petya may have other tricks up its sleeve to spread inside of large networks."

Merck's IT organization and its leaders clearly are at fault here but you should be asking:

1. Who approved letting M.E.Doc updates through the firewall when we don't even do that for Microsoft?
2. Did local admin rights facilitate the spread?
3. Why did the business continuity plan rely on the backup data center not being hit also?
4. Did our prolific use of network shares contribute to the spread?
5. Why were there not offline backups?

Not disagreeing, Merck IT sucks.
 






Nobody would argue the need to patch IT systems in a timely manner. The question is would that have prevented this?...
Merck's IT organization and its leaders clearly are at fault here but you should be asking:
1. Who approved letting M.E.Doc updates through the firewall when we don't even do that for Microsoft?
2. Did local admin rights facilitate the spread?
3. Why did the business continuity plan rely on the backup data center not being hit also?
4. Did our prolific use of network shares contribute to the spread?
5. Why were there not offline backups?
Not disagreeing, Merck IT sucks.

No no no, Merk should send IT business to us in Mumbai! For all the questions above, we know how to do the needful! Data centres in India never get virus - we know how to protect us since we use same data centres to call you Americans that your Windows computers are sending us error messages.
আমাদের আপনার জন্মতারিখ এবং সামাজিক নিরাপত্তা সংখ্যা দাও!
 
  • Like
Reactions: mbryan












Nobody would argue the need to patch IT systems in a timely manner. The question is would that have prevented this?

The first blog article on Petya linked earlier also states, "Organizations and individuals who have not yet applied the Windows update for the Eternal Blue exploit should patch now. However, there are indications that Petya may have other tricks up its sleeve to spread inside of large networks."

Merck's IT organization and its leaders clearly are at fault here but you should be asking:

1. Who approved letting M.E.Doc updates through the firewall when we don't even do that for Microsoft?
2. Did local admin rights facilitate the spread?
3. Why did the business continuity plan rely on the backup data center not being hit also?
4. Did our prolific use of network shares contribute to the spread?
5. Why were there not offline backups?

Not disagreeing, Merck IT sucks.


All the points above are the result of rampant cost cutting with no regard to actual information systems security.

Large scale sharing/clustering and consolidation was all the craze, no actual functional HA or DR consideration, the plan was on paper only. Not having backups for essential personnel because they are contractors make zero sense, especially when they use Merck PC's. Domain Forest consolidation with many administrators as well as centralized security functions with zero granularity. Letting seasoned professionals go for folks on the other side of the world with no functional experience in infrastructure is also short term "immediate" gain move that makes no sense from a security and P+R perspective.

In the end you might have a slightly smaller footprint and initially lower cost, but the risk (as we have seen) is insane.