MMOG/LE Assessment Tip | MMOG.np Corporate Administrators

All organizations should have at least two Corporate Administrators (C-Admins), but no more than four, assigned in the MMOG.np web portal to manage access to the MMOG/LE Assessments.


If the C-Admin has left the organization and there is not another one assigned, to get the C-Admin reassigned, you will need to contact Odette to update the primary contact on the account. To update the contact, forward the name and email address of the primary contact currently assigned to mmog@odette.org. This person is usually the employee who initially registered the account. You also need to include the name and address of the new primary contact. Odette will assign the new contact the C-Admin role, at which point they can use the Forgot login option on the MMOG.np login page to reset the password.

Once the new C-Admin is assigned, don’t forget to assign at least one additional C-Admin within the organization.


Please review MMOG/LE 2.2 to ensure that your organization has identified and documented the roles and responsibilities for primary and backup administrators for the MMOG.np web portal for the corresponding job descriptions, work instructions, and training matrices.


Contact the MMOG/LE Help Desk using the BASICS Contact Form if you need additional support with setting up, completing, or submitting your MMOG/LE Assessment.

Disclaimer:  Any MMOG/LE information published by B.A.S.I.C.S. is superseded by information published by Odette, AIAG, and customers, as applicable.  Please contact your customer to resolve any conflicts.

Featured Post | ISO 9001 A Key to Cybersecurity? (Part 1)

Periodically, you will see me give a nod to someone else’s blog post.  October is cybersecurity awareness month, so today BASICS is featuring  a blog, ISO 9001 A Key to Cybersecurity? (Part 1), posted by the Michigan Manufacturing Technology Center (MMTC), written by Andy Nichols (10/9/20).   

Not a day goes by without our news feeds sharing details of yet another cybersecurity breach. It seems large businesses tend to be the main victims, with Target, Equifax, Marriott and even the UK’s National Health System patient data recently being affected by cyberattacks. However, we rarely learn about the impact of information security attacks made on small to medium-sized businesses, partly because they aren’t given as much prominence in the media. Yet, attacks against these smaller companies can and do happen, often with disastrous consequences.

In fact, FEMA concluded that between 40 and 60% of small businesses fail within a year of any type of disaster – including cyberattacks – unless some type of continuity/resiliency plan is put in place. These business failures occur not only from the penalties of paying the ransom, but from the “hidden” costs associated with losing access to information regarding sales pipelines, accounts payable/receivable, as well as intellectual property. A simple “hack” could even change an organization’s bank account details and divert customer payments somewhere else.

So, what is needed to protect small and medium-sized businesses from such an attack? How can an organization become “cyber-resilient”?  Read more…

 


Click here to learn more about MMTC

Click here to meet the author:  Andy Nichols, CQP MCQI