MERCK IT stinks

A combination of the company's failure to invest in technology and inept IT leaders...as we slowly get back to normal business, the vultures are beginning to circle, waiting for the bodies to begin to drop...
 






Not to mention outsourcing contracts with no penalty for failure and IT leaders that chase this week's buzzword neglecting the stuff that keeps the business running because it's not sexy
 






Not to mention outsourcing contracts with no penalty for failure and IT leaders that chase this week's buzzword neglecting the stuff that keeps the business running because it's not sexy


"Cloud" - "Data Lake" - "Machine Learning" - "Artificial Intelligence" - "In Memory" - "HANA" - LOL, all have zero to do with keeping the lights on.
 












Merck is still grappling with just how much damage they’ve incurred as a collateral victim of the NotPetya attack one month ago. And as a direct consequence, they’re cutting their profit outlook and signaling delays with some product supply orders.

The pharma giant disclosed the news this morning in their earnings report, with CFO Rob Davis telling analysts the company is still “assessing the full impact.” But it has clearly had an impact on the numbers. “The guidance would have been higher without the cyberattack,” Davis added.

Supplies of Keytruda, Januvia and Zepatier will not be affected, according to the drugmaker.

Shares $MRK were flat in mid-morning trading.

The company isn’t producing any bulk product yet from any of its own facilities, but supplies continue flowing from contract manufacturing relationships. In a statement to Endpoints News, Merck admits research has been affected, but would not elaborate on dosing interruptions or trial schedule changes.

The cyber-attack led to a disruption of our worldwide operations, including research. However, we have been able to maintain our clinical trial execution plan and we continue to pursue previously outlined priorities.

On June 27, thousands of companies around the world were hit by NotPetya — an exploit based on stolen NSA technology. Microsoft first encountered the virus with “worm capabilities” in 12,500 computers in Ukraine, which then spread laterally to another 64 counties including the United States, infecting computers that were not patched with critical updates.

Merck claims the patches were installed. At the time they said, “government authorities working with us have confirmed that the malware responsible for the attack contained a unique combination of characteristics that enabled it to infect company systems despite installation of recent software patches.”
 












Honest, no. They are ensuring they are not sued in future by the shareholders for withholding information that the incident has impacted the value of the company.

At least they are starting to be honest.

There is a lot to be learned here from their getting hit and how they recover, could be of great use to the IT community.
 






In the town hall Friday, Ken Frazer stated the experts are telling Merck their IT is state of the art...can be strengthened but on par with other top companies...what a joke, blatantly false. Merck is behind most major pharma companies in technology, which can be attributed to lack of investment and sub-par IT leadership who have retained a staff with deficient and outdated skills.
 






Every CEO/CIO tells their leadership and company that their IT is state of the art. It's a bullshit story to make up for destroying their IT and running on a shoestring by downsizing and shipping jobs overseas.