Hackers

Discussion in 'Merck' started by anonymous, Jun 27, 2017 at 12:13 PM.

Tags: Add Tags
  1. anonymous

    anonymous Guest

    Thank you hackers... I have a lot of crap to do before the holiday.

    FU and FU MERCK IT !!!!
     

  2. anonymous

    anonymous Guest

    Any word when able to get back online?
     
  3. anonymous

    anonymous Guest

    Site will be back up half past the monkeys ass.
     
  4. anonymous

    anonymous Guest

    Last HQ told ctl's it will be back up MAYBE eod Thursday.
     
  5. anonymous

    anonymous Guest

    Ridiculous! Cannot believe Merck mandates reps send constant field emails and fast sampling. We are exposing ourselves to attacks further whilst pissing off the very customers we serve. It doesn't make internet security sense to keep sending out these crap emails to thousands of emails. Blame the useless CTL's who mandate the use of these tools to justify their overpaid babysitter jobs!
     
  6. anonymous

    anonymous Guest


    Didn't Merck outsource their IT to Russia or something?
     
  7. anonymous

    anonymous Guest

    No Hiliary the beast ran the server in her crapper while bill raped the maid.
     
  8. anonymous

    anonymous Guest

    Kind of ironic, isn't it? A company run by a liberal, trial lawyer, complaining about Russian hacking into our elections(proof that even if they did it had an effect?)now has his companys computer system hacked. I love it. Kenny boy, and trial lawyers come through again. Keep up the good work boys.
     
  9. anonymous

    anonymous Guest

    Ken Frazier is an imbecile.
     
  10. anonymous

    anonymous Guest

    Time to ditch the computers and use the old paper forms for samples. it is much safer that way.
     
  11. anonymous

    anonymous Guest

    Dork
     
  12. anonymous

    anonymous Guest

    Life was good pre computers. If you operated sans comp you know that very well. There were less useless exercises of turning around a email request within minutes versus days via regular mail. Those were the days! If you worked then only you remember that quality of life that is now lost forever.
     
  13. anonymous

    anonymous Guest

    Almost as good as a snow day
     
  14. anonymous

    anonymous Guest

    Merck computers geeks suck ass
     
  15. anonymous

    anonymous Guest

    You get what you pay for.
     
  16. anonymous

    anonymous Guest

    Clark Golestani will be fired by Ken Frazier....

    Clark failed to make sure Merck's systems had a critical updated patch that was out months ago.

    EOM
     
  17. anonymous

    anonymous Guest

    The Real Story of True Arrogance & Stupidly .Real Great Idea to Fire all IT people & Outsource to eastern.

    Merck missed two critical opportunities earlier this year to inoculate themselves from the vicious cyberattack they suffered this week, roiling operations and raising questions about their lack of preparation to defend themselves.

    The June 27 “Petya/NotPetya” cyberattack hit the multinational Merck and several other companies, such as the law firm DLA Piper, shipping giant Maersk, and even a West Virginia hospital, which was forced to scrap its electronic medical records in favor of paper.

    The core technology in Petya is called ETERNALBLUE and it was developed by American spy agencies, the Washington Post previously reported. Obviously, it was never intended for wide distribution. It relied on bugs in Windows that Microsoft presumably wasn’t aware of until earlier this year, when a group of still-unknown hackers calling themselves ShadowBrokers allegedly broke into the US NSA and demanded payment in exchange not releasing the ultra-secret exploits.

    The stolen tools were eventually dumped on the internet.

    In March, Microsoft quickly issued a critical bulletin advising IT administrators of the precise steps needed to patch their systems to prevent hackers — ranging from the state-sponsored to lone-wolves — in using the ETERNALBLUE technology to gain unauthorized access to their networks. Experts recommend critical bulletins be installed immediately, versus merely recommended ones, which large companies sometimes test out before deploying to a large network.

    Then in May, the first global attack based on this exploit, dubbed WannaCry, spread widely, notably shutting down sixteen hospitals in the UK.

    Microsoft issued yet another patch in the aftermath, and along with the most prominent security firms worldwide, began pleading with companies to immediately employ these crucial patches to prevent unauthorized access to private networks.

    So after continuous warnings from Microsoft starting in March, with two critical software updates, and a global cyberattack in May which showed the potential impacts on the healthcare industry, Merck still neglected to update their systems.

    Repeated attempts to contact Merck have been unsuccessful.
     
  18. anonymous

    anonymous Guest

    Want the real story of how Merck brought this upon themselves ...go to "ENDPOINTS" Guess the outsourcing to Eastern Europe was good move
     
  19. anonymous

    anonymous Guest

    Own up, which one of you Sales r*****s opened the email?
     
  20. anonymous

    anonymous Guest

    Arrogant Merck IT Leadership. Hope you get the pink slip