Blogs

Categories

Select a sub-category to view results

Icon
Films and Coatings
vail 4ml
Pharmaceutical Packaging Components
Icon
Prefillable Systems
Icon
Self Injection Devices
Icon
Vial Containment Solutions
Icon
Washing and Sterilization
Icon
Reconstitution and Transfer Devices

Select a sub-category to view results

Icon
Analytical Lab Services
Icon
Contract Manufacturing
Icon
Fill-Finish
Icon
Regulatory Support

Select a sub-category to view results

Icon
Cell and Gene Therapy Packaging
Icon
Drug Development Process
Icon
Regulatory Challenges
Icon
Transitioning to Combination Products

Select a sub-category to view results

Icon
Corporate Development
Icon
ESG/Sustainability
Icon
One West Team (Employee Culture)
Icon
Our Culture of Giving (Philanthropy)
Icon
Research and Development

Previous Blogs

Blue West logo with Diamond

By Global Information Technology

December 12, 2013

For those of us who have been using social media for a while, it’s inevitable to have received a request to connect from someone whom you don’t know. While it can be tempting to accept the request to expand your social network and open up new horizons, you could also be exposing yourself and others connected to you to a malicious social engineering risk. If you’re not familiar with the term, a social engineer runs what used to be called a “con game.” For example, a person using social engineering might try to get you to reveal sensitive information, known as phishing.