{"id":4325,"date":"2021-02-15T08:47:43","date_gmt":"2021-02-15T08:47:43","guid":{"rendered":"https:\/\/stash.global\/?page_id=4325"},"modified":"2021-12-23T14:51:48","modified_gmt":"2021-12-23T14:51:48","slug":"bio-tech","status":"publish","type":"page","link":"https:\/\/stash.global\/industries\/bio-tech\/","title":{"rendered":"Life Sciences Cybersecurity"},"content":{"rendered":"\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t

BIO TECH<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t\t
\n\t\t\t\t

The medical research and pharmaceutical community is transforming our lives and our future through dedication to the advancement of knowledge and the discovery of new medicines and treatments for diseases.<\/strong><\/p>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t

\n\t\t\t
\n\t\t\t\t\t\t\t
\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t\t
\n\t\t\t\t

Biotech companies are piling up data by the petabyte. New regulations require the Life Sciences sector to keep genetic and medical product data for decades and maintain its viability.<\/p>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t

\n\t\t\t\t\t\t
\n\t\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t

STASH\u00ae is an essential partner for the data integrity challenges of the Life Sciences sector.<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t\t
\n\t\t\t\t

New regulations require the Life Sciences sector to keep genetic and medical product data for decades and maintain its viability.<\/span><\/p>

Life science organizations are reliant on a large number of third parties, including IT providers, data collection, external advisors and analytic firms as well as contract manufacturing organisations (CMOS) and clinical research organisations (CROS) The use of third parties means that businesses rely on systems and data over which they don’t have complete control, making them even more susceptible to a cyber event. Hackers fraudulently gain access to prescriptions, medical treatment or government benefits. <\/span>
[read_more id=”1″ more=”Read more” less=”Read less”]

The Medical Research and Pharmaceutical Community is transforming our lives and our future through dedication to the advancement of knowledge and the discovery of new medicines and treatments for diseases. But the life sciences sector is particularly vulnerable to adversaries (including insiders) using cyber attacks to steal its intellectual property, degrade the integrity of its research and trial data, and interrupt the safe operation of its manufacturing and supply chains. Furthermore, new regulations require the Life Science sector to keep genetic and medical product data for decades and maintain its viability. STASH\u00ae will bolster your current security stack, and can also replace dozens of legacy or redundant tools.<\/span> Its unique authentication and encryption processes slash the risk of insider access to key data.

STASH\u00ae has developed the most effective, simple to activate solution to keep data safe wherever it is, wherever it goes. Your most valuable business assets are protected for decades, retrievable no matter how technology changes over time.<\/span><\/p>[\/read_more]\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t

\n\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\tREQUEST A DEMO<\/span>\n\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t\t
\n\t\t\t\t
STASH\u00ae is an essential partner \nfor the data integrity challenges\nof the Life Sciences sector.<\/blockquote>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t\t
\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t\t
\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t\t
\n\t\t\t\t\t\t\t\t\t\t\t\t\"\"\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t\t
\n\t\t\t\t

US-FDA requires medical product companies to retain all (100%) of physical\/digital data and information of their medical products from discovery, manufacturing and distribution for the life of the product and two years after the last product is distributed. Other Nations have similar edicts.<\/p>

HHS-HIPAA is requiring electronic medical records be retained for the life of the patient.\u00a0The Genetic Information Nondiscrimination Act of 2008 (GINA) is requiring that a patient\u2019s genetic data be maintained for the life of the individual and 50 years after their death (for family use).
<\/span><\/p>

“Nothing is more valuable to a pharmaceutical company than the formula for one of its new drugs. Reports of hackers breaking into all sorts of firms and stealing their trade secrets is of enormous concern. Equally troubling, experts warn that theft of trade secrets by company insiders is a larger problem\u2026 Many of the victims of cyber theft find themselves the target of class action lawsuits and regulatory actions. A quick look at data breach shows a rapidly changing regulatory environment, growing risks of litigation, and some important insurance implications for companies and their top management.”
<\/span>– Deloitte<\/i><\/b><\/span><\/p>

“The UK Government identified pharmaceutical companies as the primary target of cyber criminals bent on stealing IP. It estimated cyber-theft of IP cost the UK \u20a49.2b, of which it attributed \u20a41.8b to theft of pharmaceutical, biotechnology, and healthcare IP. Surveys of US Cyber-attacks consistently find that pharmaceutical IP is a major target of sophisticated cyber gangs\u2026 Attacks against major US pharmaceutical companies\u2026 include medical device-maker, Boston Scientific, Abbott Laboratories, and Wyeth, the drug maker acquired by Pfizer Inc.”
<\/span>– Deloitte<\/b><\/p>

With the advance of biotechnology, biological information, rather than biological materials, is increasingly the object of principal security concern. We argue that both in theory and in practice, existing security approaches in biology are poorly suited to manage hazardous biological information, and use the cases of Mousepox, H5N1 gain of function, and Botulinum toxin H to highlight these ongoing challenges. We suggest that mitigation of these hazards can be improved if one can: (1) anticipate hazard potential before scientific work is performed; (2) consider how much the new information would likely help both good and bad actors; and (3) aim to disclose information in the manner that maximally disadvantages bad actors versus good ones.”
– Society for Risk Analysis<\/strong><\/span><\/p>

\u00a0<\/span><\/p>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t

\n\t\t\t\t\t\t
\n\t\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t\t
\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t\t
\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t\t
\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t
\n\t\t\t\t\t\t\t
<\/div>\n\t\t\t\t\t\t\t
\n\t\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
\n\t\t\t\t
\n\t\t\t
the shift from defense to proactive<\/span><\/div>

Cyber Talk<\/span><\/h3><\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
\n\t\t\t\t
\n\t\t\t