Blogs

Categories

Select a sub-category to view results

Icon
Films and Coatings
vail 4ml
Pharmaceutical Packaging Components
Icon
Prefillable Systems
Icon
Self Injection Devices
Icon
Vial Containment Solutions
Icon
Washing and Sterilization
Icon
Reconstitution and Transfer Devices

Select a sub-category to view results

Icon
Analytical Lab Services
Icon
Contract Manufacturing
Icon
Fill-Finish
Icon
Regulatory Support

Select a sub-category to view results

Icon
Cell and Gene Therapy Packaging
Icon
Drug Development Process
Icon
Regulatory Challenges
Icon
Transitioning to Combination Products

Select a sub-category to view results

Icon
Corporate Development
Icon
ESG/Sustainability
Icon
One West Team (Employee Culture)
Icon
Our Culture of Giving (Philanthropy)
Icon
Research and Development

Previous Blogs

Blue West logo with Diamond

By Global Information Technology

December 12, 2013

For those of us who have been using social media for a while, it’s inevitable to have received a request to connect from someone whom you don’t know. While it can be tempting to accept the request to expand your social network and open up new horizons, you could also be exposing yourself and others connected to you to a malicious social engineering risk. If you’re not familiar with the term, a social engineer runs what used to be called a “con game.” For example, a person using social engineering might try to get you to reveal sensitive information, known as phishing.

Blue West logo with Diamond

By Global Information Technology

February 12, 2013

Beyond the challenges of ensuring that data privacy laws are observed across the globe, West IT is faced with the need to safeguard intellectual property, trade secrets, and confidential company and employee data while ensuring that we can serve our global customers. This is becoming increasingly more complex with the rapid advances in mobility and cloud computing. At West, IT is evaluating the best way to enable our employees to take advantage of these rapid advances in technology while still ensuring protection for confidential company information.