R. Kinney Williams - Yennik, Inc.
R. Kinney Williams
Yennik, Inc.

Internet Banking News
Brought to you by Yennik, Inc. the acknowledged leader in Internet auditing for financial institutions.

Remote offsite and Onsite FFIEC IT Audits

February 12, 2023

Newsletter Content FFIEC IT Security FFIEC & ADA Web Site Audits
Web Site Compliance NIST Handbook Penetration Testing
Does Your Financial Institution need an affordable cybersecurity Internet security audit?  Yennik, Inc. has clients in 42 states that rely on our cybersecurity audits to ensure proper Internet security settings and to meet the independent diagnostic test requirements of FDIC, OCC, FRB, and NCUA, which provides compliance with Gramm-Leach Bliley Act 501(b) as well as the penetration test complies with the FFIEC Cybersecurity Assessment Tool regarding resilience testing The cybersecurity penetration audit and Internet security testing is an affordable-sophisticated process than goes far beyond the simple scanning of ports.  The audit focuses on a hacker's perspective, which will help you identify real-world cybersecurity weaknesses.  For more information, give R. Kinney Williams a call today at Office/Cell 806-535-8300 or visit http://www.internetbankingaudits.com/.
Remote bank regulatory FFIEC IT audits - I am performing virtual/remote bank regality FFIEC IT audits for banks and credit unions.  I am a former bank examiner with years of IT auditing experience.  Please contact R. Kinney Williams at examiner@yennik.com from your bank's email and I will send you information and fees.  All correspondence is confidential.


MISCELLANEOUS CYBERSECURITY NEWS:

Lawsuit blasts GoodRx, Meta over ‘egregious’ privacy practices - A lawsuit claims GoodRx mislead users about its data sharing practices that allowed Meta's Facebook and Google to “intercept” personal and health data with no user consent. Named as defendants in suit are Meta, Google, Criteo and GoodRx. https://www.scmagazine.com/analysis/privacy/lawsuit-blasts-goodrx-meta-over-egregious-privacy-practices

Hackers are mass infecting servers worldwide by exploiting a patched hole - Servers running unpatched versions of ESXi are sitting ducks for ESXiArgs attacks.An explosion of cyberattacks is infecting servers around the world with crippling ransomware by exploiting a vulnerability that was patched two years ago, it was widely reported on Monday. https://arstechnica.com/information-technology/2023/02/hackers-are-mass-infecting-servers-worldwide-by-exploiting-a-patched-hole/

Agencies Seek Public Input on Updates to Guiding Plan for Cyber R&D - Members of the public have the opportunity to provide their insight on the newest version of the federal government’s guiding document for cybersecurity research and development. https://www.nextgov.com/cybersecurity/2023/02/agencies-seek-public-input-updates-guiding-plan-cyber-rd/382617/

Inside Walmart Global Tech: Where cybersecurity isn’t discounted - Bookended by security personnel in front and back, we were warned in no uncertain terms before entering Walmart’s East Data Center facility: Any attempt to bring an electronic device into the building would result in our immediate expulsion. https://www.scmagazine.com/feature/network-security/inside-walmart-global-tech-where-cybersecurity-isnt-discounted

Walmart’s incessant drive for intel and innovation - Walmart co-founder Sam Walton believed in constant innovation — and the IT security pros working inside Walmart Global Tech’s Bentonville, Arkansas, headquarters appear to have taken that philosophy to heart, as indicated by the wide array of cyber initiatives the retail giant has pursued. https://www.scmagazine.com/feature/network-security/walmarts-incessant-drive-for-intel-and-innovation

Auto dealers are prime targets for hackers, warn researchers - Car dealerships are prime targets for hackers eager to exploit weak security and access a treasure trove of financial data and gain access to third-party vendor supply chains. https://www.scmagazine.com/news/compliance/auto-dealers-are-prime-targets-for-hackers-warn-researchers

CYBERSECURITY ATTACKS, INTRUSIONS, DATA THEFT & LOSS:

Financial software firm Ion Group battles LockBit ransomware attack - Ion Group, a Dublin-based software company that helps financial institutions automate their critical business processes, has been hit by a ransomware attack that forced several European and U.S. banks to revert to manual processes. https://techcrunch.com/2023/02/02/ion-group-lockbit-derivatives-ransomware

Cyberattacks on Energy's National Labs Draw Lawmaker Scrutiny - The attacks, allegedly conducted by Russian-based adversaries, occurred during August and September 2022, potentially exposing sensitive U.S. scientific research. https://www.nextgov.com/cybersecurity/2023/02/cyberattacks-energys-national-labs-draw-lawmaker-scrutiny/382503/

Maryland Hospital Suffers Ransomware Attack - February 01, 2023 - Atlantic General Hospital in Maryland is recovering from a ransomware attack that was discovered early this week, local news outlet WMDT47 first reported. The hospital experienced network outages and told local outlets that patient interruption was “limited.” https://healthitsecurity.com/news/maryland-hospital-suffers-ransomware-attack

Tallahassee Memorial Health diverting patients over security issue, downtime - All emergency medical services are being diverted from Tallahassee Memorial Healthcare (TMH) due to an “IT security issue” that prompted the health system to bring its systems offline. https://www.scmagazine.com/news/incident-response/tallahassee-memorial-health-diverting-patients-over-security-issue-downtime

Return to the top of the newsletter

WEB SITE COMPLIANCE - This week begins our series on the FDIC's Supervisory Policy on Identity Theft (Part 1 of  6)
    
    
Supervisory Policy on Identity Theft
    
    Identity theft is fraud committed or attempted by using the identifying information of another person without his or her authority. Identifying information may include such things as a Social Security number, account number, date of birth, driver's license number, passport number, biometric data and other unique electronic identification numbers or codes. As more financial transactions are done electronically and remotely, and as more sensitive information is stored in electronic form, the opportunities for identity theft have increased significantly.  This policy statement describes the characteristics of identity theft and emphasizes the FDIC's well-defined expectations that institutions under its supervision detect, prevent and mitigate the effects of identity theft in order to protect consumers and help ensure safe and sound operations.


Return to the top of the newsletter

FFIEC IT SECURITY - We continue our series on the FFIEC interagency Information Security Booklet.
   
   
MONITORING AND UPDATING
   
   A static security program provides a false sense of security and will become increasingly ineffective over time. Monitoring and updating the security program is an important part of the ongoing cyclical security process. Financial institutions should treat security as dynamic with active monitoring; prompt, ongoing risk assessment; and appropriate updates to controls. Institutions should continuously gather and analyze information regarding new threats and vulnerabilities, actual attacks on the institution or others, and the effectiveness of the existing security controls. They should use that information to update the risk assessment, strategy, and implemented controls. Monitoring and updating the security program begins with the identification of the potential need to alter aspects of the security program and then recycles through the security process steps of risk assessment, strategy, implementation, and testing.


Return to the top of the newsletter

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY - We continue the series on the National Institute of Standards and Technology (NIST) Handbook.

Section I. Introduction & Overview - Chapter 1

INTRODUCTION - 1.3 Organization

The first section of the handbook contains background and overview material, briefly discusses of threats, and explains the roles and responsibilities of individuals and organizations involved in computer security. It explains the executive principles of computer security that are used throughout the handbook. For example, one important principle that is repeatedly stressed is that only security measures that are cost-effective should be implemented. A familiarity with the principles is fundamental to understanding the handbook's philosophical approach to the issue of security.

The next three major sections deal with security controls: Management Controls5(II), Operational Controls (III), and Technical Controls (IV). Most controls cross the boundaries between management, operational, and technical. Each chapter in the three sections provides a basic explanation of the control; approaches to implementing the control, some cost considerations in selecting, implementing, and using the control; and selected interdependencies that may exist with other controls. Each chapter in this portion of the handbook also provides references that may be useful in actual implementation.

!  The Management Controls section addresses security topics that can be characterized as managerial. They are techniques and concerns that are normally addressed by management in the organization's computer security program. In general, they focus on the management of the computer security program and the management of risk within the organization.

!  The Operational Controls section addresses security controls that focus on controls that are, broadly speaking, implemented and executed by people (as opposed to systems). These controls are put in place to improve the security of a particular system (or group of systems). They often require technical or specialized expertise -- and often rely upon management activities as well as technical controls.

!  The Technical Controls section focuses on security controls that the computer system executes. These controls are dependent upon the proper functioning of the system for their effectiveness. The implementation of technical controls, however, always requires significant operational considerations -- and should be consistent with the management of security within the organization.

Finally, an example is presented to aid the reader in correlating some of the major topics discussed in the handbook. It describes a hypothetical system and discusses some of the controls that have been implemented to protect it. This section helps the reader better understand the decisions that must be made in securing a system, and illustrates the interrelationships among controls.

Definition of Sensitive Information

Many people think that sensitive information only requires protection from unauthorized disclosure. However, the Computer Security Act provides a much broader definition of the term "sensitive" information:

"any information, the loss, misuse, or unauthorized access to or modification of which could adversely affect the national interest or the conduct of federal programs, or the privacy to which individuals are entitled under section 552a of title 5, United States Code (the Privacy Act), but which has not been specifically authorized under criteria established by an Executive Order or an Act of Congress to be kept secret in the interest of national defense or foreign policy."


The above definition can be contrasted with the long-standing confidentiality-based information classification system for national security information (i.e., CONFIDENTIAL, SECRET, and TOP SECRET). This system is based only upon the need to protect classified information from unauthorized disclosure; the U.S. Government does not have a similar system for unclassified information. No government wide schemes (for either classified or unclassified information) exist which are based on the need to protect the integrity or availability of information.


PLEASE NOTE:
 
Some of the above links may have expired, especially those from news organizations.  We may have a copy of the article, so please e-mail us at examiner@yennik.com if we can be of assistance.