Introducing secure print controls for pharmaceutical manufacturers

OpenText Information Management

Government agencies around the world, including the US Food and Drug Administration (FDA), use current Good Manufacturing Practices (cGMP) as the primary way to ensure pharmaceutical quality.

Biopharmaceutical firm Supernus Pharmaceuticals hit by Hive ransomware during an ongoing acquisition

Security Affairs

Biopharmaceutical company Supernus Pharmaceuticals discloses a ransomware attack, the Hive ransomware claims to have stolen company data. “Supernus Pharmaceuticals, Inc. SecurityAffairs – hacking, Supernus Pharmaceuticals).

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Pharmaceutical companies exploited by phishing scam targeting job seekers

IT Governance

Earlier this month, two major pharmaceutical giants issued warnings about phishing emails targeting job hunters. The post Pharmaceutical companies exploited by phishing scam targeting job seekers appeared first on IT Governance Blog. GlaxoSmithKline and AstraZeneca say they are victims of recruitment scams, in which crooks create fake job adverts to obtain people’s personal and financial details.

Why IDMP compliance requires adaptive data governance

Collibra

Pharmaceutical, biotech and medical devices firms, among others, must comply with a plethora of regulations. EMA expects pharmaceuticals to submit product data in IDMP format with a mandatory effective date of Q1 2023. This is where data cataloging and data governance come into play.

Lazarus Group Hits COVID-19 Vaccine-Maker in Espionage Attack

Threatpost

Breach Government Hacks Malware advanced persistent threat apt COVID-19 cyberattack espionage health ministry IP theft Lazarus Group North Korea pharmaceutical company supply chain attack vaccine vaccine development

Metadata Management, Data Governance and Automation

erwin

erwin released its State of Data Governance Report in February 2018, just a few months before the General Data Protection Regulation (GDPR) took effect. This research showed that the majority of responding organizations weren’t actually prepared for GDPR, nor did they have the understanding, executive support and budget for data governance – although they recognized the importance of it. Download Free GDPR Guide | Step By Step Guide to Data Governance for GDPR?.

The Value of Data Governance and How to Quantify It

erwin

erwin recently hosted the second in its six-part webinar series on the practice of data governance and how to proactively deal with its complexities. The business drivers and motivation should be the starting point for any data governance initiative. Govern PII “at rest”.

Lazarus Group Seeks Intelligence Related to COVID-19

Dark Reading

Researchers attribute attacks targeting a pharmaceutical company and a government ministry related to COVID-19 response

What’s new in OpenText Documentum for Life Sciences Cloud Edition (CE) 20.2

OpenText Information Management

Pharmaceutical and Life Sciences companies are in the public spotlight as they pursue advanced therapies and vaccines to combat the coronavirus pandemic. Productivity, flexibility and governance capabilities are more critical than ever for speeding these life-saving products to market.

Four Use Cases Proving the Benefits of Metadata-Driven Automation

erwin

As such, traditional – and mostly manual – processes associated with data management and data governance have broken down. Metadata-Driven Automation in the Pharmaceutical Industry. One global pharmaceutical giant headquartered in the United States experienced such issues until it adopted metadata-driven automation. The erwin Automation Framework is a key component of the erwin EDGE platform for comprehensive data management and data governance.

Australian government secretly releasing sensitive medical records to police

The Guardian Data Protection

Lawyers and health privacy advocates condemn laxness of privacy provisions in guidelines The Australian government is releasing highly sensitive medical records to police through a secret regime that experts say contains fundamentally flawed privacy protections.

Introducing OpenText Content Cloud for Life Sciences

OpenText Information Management

OpenText™ is thrilled to announce the launch of OpenText Content Cloud™ for Life Sciences, an innovative new offering that brings the proven productivity and governance capabilities of OpenText™ Documentum™ for Life Sciences to a cloud environment.

Cloud 69

The hidden threats facing your intellectual property

IT Governance

For life sciences and pharmaceutical companies, this includes data on the development and testing of new therapies and details of how therapies are manufactured. Cyber Resilience Healthcare Intellectual Property Life Sciences PharmaceuticalWhen we consider the damage a data breach can cause, we tend to focus on the cost of breach reporting, potential fines and loss of reputation.

IT 52

Business Process Modeling Use Cases and Definition

erwin

This also extends to industry-specific other compliance mandates such as those in healthcare, pharmaceutical and the financial services industries. The Regulatory Rationale for Integrating Data Management & Data Governance. What is business process modeling (BPM)? A visual representation of what your business does and how it does it. Why is having this picture important? According to Gartner , BPM links business strategy to IT systems development to ensure business value.

China-linked hackers target government agencies by exploiting flaws in Citrix, Pulse, and F5 systems, and MS Exchange

Security Affairs

CISA published an advisory on China-linked groups targeting government agencies by exploiting flaws in Microsoft Exchange, Citrix, Pulse, and F5 systems. Government agencies.”

List of data breaches and cyber attacks in November 2021 – 223.6 million records breached

IT Governance

If you find yourself facing a cyber security disaster, IT Governance is here to help. million records breached appeared first on IT Governance UK Blog. In November, we discovered 81 publicly disclosed cyber security incidents, accounting for 223,615,390 breached records.

Google Yanks 106 ‘Malicious’ Chrome Extensions

Threatpost

Trojan Chrome browser extensions spied on users and maintained a foothold on the networks of financial services, oil and gas, media and entertainment, healthcare and pharmaceuticals and government organizations.

List of data breaches and cyber attacks in April 2021 – 1 billion records breached

IT Governance

If you find yourself staring down disaster, IT Governance is here to help. The post List of data breaches and cyber attacks in April 2021 – 1 billion records breached appeared first on IT Governance UK Blog.

List of data breaches and cyber attacks in November 2020 – 586 million records breached

IT Governance

The post List of data breaches and cyber attacks in November 2020 – 586 million records breached appeared first on IT Governance UK Blog. We recorded 103 cyber security incidents in November, which accounted for 586,771,602 leaked records.

Today We are Launching a new Series of Information Governance Case Studies

IGI

Our first Snapshot focuses on the interplay between IG and privacy by telling the story of Sarah, an attorney in a large pharmaceutical company who leveraged GDPR compliance momentum to build a broader IG program. This Snapshot highlights ways that organizations can gain insight into unstructured data and leverage existing capabilities to bring governance to the chaos.

List of data breaches and cyber attacks in May 2021 – 116 million records breached

IT Governance

If you find yourself facing a cyber security disaster, IT Governance is here to help. The post List of data breaches and cyber attacks in May 2021 – 116 million records breached appeared first on IT Governance UK Blog.

List of data breaches and cyber attacks in October 2020 – 18.4 million records breached

IT Governance

million records breached appeared first on IT Governance UK Blog. With 117 publicly reported security incidents, October 2020 is the leakiest month we’ve ever recorded. The good news is that those data breaches and cyber attacks accounted for just 18,407,479 breached records.

List of data breaches and cyber attacks in August 2020 – 36.6 million records breached

IT Governance

million records breached appeared first on IT Governance UK Blog. There were a massive 99 data breaches and cyber attacks in August, making it the third-biggest monthly total of the year by number of security incidents.

Data Intelligence and Its Role in Combating Covid-19

erwin

Managing and Governing Data From Lots of Disparate Sources. This data will be collected from organizations such as, the World Health Organization (WHO), the Centers for Disease Control (CDC), and state and local governments across the globe.

Cambridgeshire crowned the UK’s cyber crime capital

IT Governance

For example, the pharmaceutical giant AstraZeneca, which is based in Cambridge, was last year imitated in a sophisticated phishing scam targeting job seekers. The post Cambridgeshire crowned the UK’s cyber crime capital appeared first on IT Governance UK Blog.

Implementing a real-time catalog of enterprise data assets

Information Management Resources

Beyond defining access privileges, effective data governance means that companies need to be able to document or label their data assets, much like the labels on pharmaceuticals. Data management Data visualization Data discovery

North Korea-linked Lazarus APT targets the COVID-19 research

Security Affairs

The attacks aimed at a Ministry of Health and a pharmaceutical company involved in the development of the COVID-19 vaccine. The systems at the pharmaceutical company were targeted with the BookCode malware, while in the attack against a Ministry of Health the APT group used the wAgent malware.

FAIR Data Principles in Life Sciences: A case for Data Intelligence Cloud

Collibra

By adopting FAIR Data Principles, life sciences firms (pharmaceuticals, biotech, medical device manufacturers) can accelerate data sharing, improve data literacy (understanding of data) and increase overall transparency and auditability when working with data.

Balikbayan Foxes group spoofs Philippine gov to spread RATs

Security Affairs

Experts uncovered a new threat actor, tracked as Balikbayan Foxes, that is impersonating the Philippine government to spread malware. . The group focuses on Shipping/Logistics, Manufacturing, Business Services, Pharmaceutical, and Energy entities, among others.

GwisinLocker ransomware exclusively targets South Korea

Security Affairs

The ransomware targets South Korean healthcare, industrial, and pharmaceutical companies, its name comes from the name of the author ‘Gwisin’ (ghost in Korean). Researchers spotted a new family of ransomware, named GwisinLocker, that encrypts Windows and Linux ESXi servers.

Chinese hackers stole info from Spanish centers working on Covid19 vaccine

Security Affairs

While pharmaceutical companies worldwide are working on the research of a vaccine for the ongoing COVID19 pandemic, threat actors are conducting cyber espionage campaigns in the attempt of stealing information on the work.

FBI warns US companies on the use of Chinese Tax Software

Security Affairs

The alert aims at informing US companies in the healthcare, chemical, and finance sectors of cyber espionage activity by the Chinese government against their business and branches operating in China.

Google warned users of 33,015 nation-state attacks since January

Security Affairs

Google sent 11,856 government-backed phishing warnings during Q1 2020, 11,023 in Q2 2020, and 10,136 in Q3 2020. During the last summer, Google observed threat actors from China, Russia, and Iran targeting pharmaceutical companies and researchers involved in the development of a vaccine. .

Information security and compliance training for the healthcare sector

IT Governance

Pharmacies, rehabilitation care, social care, medical research and pharmaceuticals all rely on this data being available to individuals delivering their services. IT Governance is responsible for the world’s first accredited programme of ISO 27001 education and currently offers the largest portfolio of ISO 27001 classroom and Live Online training courses in the world. Healthcare is one of the hardest-hit industries when it comes to data breaches.

Supply chain failure – the impact on the patient

IT Governance

This concern was highlighted by recent reports indicating that pharmaceutical giant Sanofi is increasing the stockpile of medicine to allow for 14 weeks’ worth of supply should there be cross-channel transport delays. Find out more about how to achieve ISO 27001 certification or take a look at IT Governance’s certified ISMS training courses. For most industries, protecting your supply chain against cyber attacks is beneficial to business operations, profits and consumers.

Financially motivated Earth Lusca threat actors targets organizations worldwide

Security Affairs

A sophisticated threat actor, tracked as Earth Lusca, is targeting government and private organizations worldwide as for financial purposes.

Data breaches: the financial cost of poor planning

IT Governance

This reflects recent figures , suggesting that NotPetya, a 2017 ransomware attack that hit organisations across the globe, cost pharmaceutical giant Merck $135 million in lost sales in the first three months after the attack. IT Governance’s ISO27001 Certified ISMS Foundation Training Course provides a complete introduction to the elements required to achieve compliance with the Standard. Data breaches can have a wide-reaching impact.

US govt agencies share details of the China-linked espionage malware Taidoor

Security Affairs

China-linked hackers carried out cyber espionage campaigns targeting governments, corporations, and think tanks with TAIDOOR malware. China has been using #Taidoor malware to conduct #cyber espionage on governments, corporations, and think tanks.

Russia-linked APT28 uses COVID-19 lures to deliver Zebrocy malware

Security Affairs

The APT28 group (aka Fancy Bear , Pawn Storm , Sofacy Group , Sednit , and STRONTIUM ) has been active since at least 2007 and it has targeted governments, militaries, and security organizations worldwide.

Three APT groups have targeted at least seven COVID-19 vaccine makers

Security Affairs

“The targets include leading pharmaceutical companies and vaccine researchers in Canada, France, India, South Korea and the United States. Several organizations targeted by the APT groups that have contracts with or investments from government agencies for Covid-19 related work.