R. Kinney Williams - Yennik, Inc.
R. Kinney Williams
Yennik, Inc.

Internet Banking News
Brought to you by Yennik, Inc. the acknowledged leader in Internet auditing for financial institutions.

Remote offsite and Onsite FFIEC IT Audits

February 26, 2023

Newsletter Content FFIEC IT Security FFIEC & ADA Web Site Audits
Web Site Compliance NIST Handbook Penetration Testing
Does Your Financial Institution need an affordable cybersecurity Internet security audit?  Yennik, Inc. has clients in 42 states that rely on our cybersecurity audits to ensure proper Internet security settings and to meet the independent diagnostic test requirements of FDIC, OCC, FRB, and NCUA, which provides compliance with Gramm-Leach Bliley Act 501(b) as well as the penetration test complies with the FFIEC Cybersecurity Assessment Tool regarding resilience testing The cybersecurity penetration audit and Internet security testing is an affordable-sophisticated process than goes far beyond the simple scanning of ports.  The audit focuses on a hacker's perspective, which will help you identify real-world cybersecurity weaknesses.  For more information, give R. Kinney Williams a call today at Office/Cell 806-535-8300 or visit http://www.internetbankingaudits.com/.
Remote bank regulatory FFIEC IT audits - I am performing virtual/remote bank regality FFIEC IT audits for banks and credit unions.  I am a former bank examiner with years of IT auditing experience.  Please contact R. Kinney Williams at examiner@yennik.com from your bank's email and I will send you information and fees.  All correspondence is confidential.


MISCELLANEOUS CYBERSECURITY NEWS:

Microsoft will not offer extended support for Exchange Server 2013, sets April 11 end date - Microsoft confirmed on Thursday that it will not offer extended support for Exchange Server 2013 after April 11. https://www.scmagazine.com/news/application-security/microsoft-will-not-offer-extended-support-for-exchange-server-2013-sets-april-11-end-date

DNA Diagnostics to pay $400K after breach affected 2.1 million patients - DNA Diagnostics Center has agreed to pay the states of Pennsylvania and Ohio $400,000 and improve its security practices to resolve claims it failed to use reasonable security measures to protect patient data, following a 2021 breach that impacted 2.1 million people. https://www.scmagazine.com/news/data-security/dna-diagnostics-to-pay-400k-after-breach-affected-2-1-million-patients

Open-source package with millions of downloads vulnerable to account takeover - Researchers found a popular npm software package with nearly 4 million weekly downloads that is vulnerable to account takeover attacks and could affect over 1,000 organizations. https://www.scmagazine.com/analysis/devops/open-source-package-with-millions-of-downloads-vulnerable-to-account-takeover

Computer Crime: Britain Plans to Overhaul 32-Year-Old Law - The British government is proposing to give itself more law enforcement powers against hackers in a public consultation critics say is marred by a lack of concrete proposals to shield security researchers acting in good faith. https://www.govinfosecurity.com/computer-crime-britain-plans-to-overhaul-32-year-old-law-a-21229

HHS: Healthcare continues to struggle with HIPAA compliance, IT security - Healthcare entities are continuing to struggle with meeting compliance requirements of the Health Insurance Portability and Accountability Act, particularly with securing network servers from hacking and IT risks, according to the Office for Civil Rights annual congressional report. https://www.scmagazine.com/news/compliance/hhs-healthcare-continues-to-struggle-with-hipaa-compliance-it-security

What is SASE? - Secure access service edge, or SASE for short, is a modern model of secure networking that discards the older perimeter- and data-center-based models and applies cloud- and software-based principles to move the security "center" closer to the edge user, no matter where that user may be. https://www.scmagazine.com/resource/cloud-security/what-is-sase

How to optimize for best performance - Now that you’ve configured and deployed MDR, it won’t take long to see the pay-off. With a pool of dedicated threat hunters and infosec warriors vigilantly attending to your network, your organization can expect to see dramatic improvement when it comes to discovering and eliminating potential threats. https://www.scmagazine.com/resource/ransomware/mdr-how-to-optimize-for-best-performance

CYBERSECURITY ATTACKS, INTRUSIONS, DATA THEFT & LOSS:

Atlassian confirms employee data stolen, leaked via third-party Envoy account - Australian software company Atlassian confirmed that employee data has been leaked on the web through an account they use on a third-party application. https://www.scmagazine.com/news/breach/atlassian-confirms-breach-of-third-party-app-resulted-in-leak-of-employee-data

Hyundai and Kia issue software upgrades to thwart killer TikTok car theft hack - Korean car-makers Hyundai and Kia will issue software updates to some of their models after a method of stealing them circulated on TikTok, leading to many thefts and even some deaths. https://www.theregister.com/2023/02/15/hyundai_kia_software_upgrades/

Health info for 1 million patients stolen using critical GoAnywhere vulnerability - One of the biggest hospital chains in the US said hackers obtained protected health information for 1 million patients after exploiting a vulnerability in an enterprise software product called GoAnywhere. https://arstechnica.com/information-technology/2023/02/goanywhere-vulnerability-exploit-used-to-steal-health-info-of-1-million-patients/

CommonSpirit Health cyberattack, month-long network outage cost $150M - The ransomware attack and subsequent month-long network outage at CommonSpirit Health in October cost the major health system at least $150 million to date, according to its unaudited quarterly financial report. https://www.scmagazine.com/news/ransomware/commonspirit-health-cyberattack-network-outage-cost-150m

GoDaddy: Hackers stole source code, installed malware in multi-year breach - Web hosting giant GoDaddy says it suffered a breach where unknown attackers have stolen source code and installed malware on its servers after breaching its cPanel shared hosting environment in a multi-year attack.
https://www.bleepingcomputer.com/news/security/godaddy-hackers-stole-source-code-installed-malware-in-multi-year-breach/
https://www.scmagazine.com/news/breach/godaddy-blasted-breach

Intruder alert: FBI tackles 'isolated' IT security breach - The FBI claims it has dealt with a cybersecurity "incident" that reportedly involved computer systems being used to investigate. https://www.theregister.com/2023/02/17/fbi_security_incident/

Two data centers used by major tech firms hacked - Two Asia-based data centers used by major global corporations were targeted in a series of cyberattack first identified in 2021 and as recently as January 2023. https://www.scmagazine.com/news/cloud-security/datacenters-major-firms-hacked

NPM repository flooded with 15,000 phishing packages - The battle against threat actors targeting the open-source ecosystem continues, with researchers observing a sudden surge of over 15,000 phishing packages flooding NPM, the world's largest free software registry. https://www.scmagazine.com/analysis/devops/npm-repository-15000-phishing-packages

Patient data stolen ahead of CentraState cyberattack, impacting 617K - CentraState has confirmed that threat actors stole a copy of an archived database containing patient data ahead of its reported cyberattack and subsequent network outage in December and January. https://www.scmagazine.com/news/ransomware/patient-data-stolen-centrastate-cyberattack-impacting-617k

Clop ransomware hack of Fortra GoAnywhere MFT hits 1M CHS patients - The Clop ransomware group’s compromise of a zero-day vulnerability found in the Fortra GoAnywhere MFT has compromised more than 130 organizations. https://www.scmagazine.com/news/ransomware/clop-ransomware-hack-of-fortra-goanywhere-mft-hits-1m-chs-patients

Return to the top of the newsletter

WEB SITE COMPLIANCE - This week continues our series on the FDIC's Supervisory Policy on Identity Theft (Part 3 of  6)
    
    FDIC Response to Identity Theft
    
    The FDIC's supervisory programs include many steps to address identity theft. The FDIC acts directly, often in conjunction with other Federal regulators, by promulgating standards that financial institutions are expected to meet to protect customers' sensitive information and accounts. The FDIC enforces these standards against the institutions under its supervision and encourages all financial institutions to educate their customers about steps they can take to reduce the chances of becoming an identity theft victim. The FDIC also sponsors and conducts a variety of consumer education efforts to make consumers more aware of the ways they can protect themselves from identity thieves.


Return to the top of the newsletter

FFIEC IT SECURITY - We conclude our series on the FFIEC interagency Information Security Booklet
   
   
MONITORING AND UPDATING - UPDATING
   

   Financial institutions should evaluate the information gathered to determine the extent of any required adjustments to the various components of their security program. The institution will need to consider the scope, impact, and urgency of any new threat. Depending on the new threat or vulnerability, the institution will need to reassess the risk and make changes to its security process (e.g., the security strategy, the controls implementation, or the security testing requirements).
   
   Institution management confronts routine security issues and events on a regular basis. In many cases, the issues are relatively isolated and may be addressed through an informal or targeted risk assessment embedded within an existing security control process. For example, the institution might assess the risk of a new operating system vulnerability before testing and installing the patch. More systemic events like mergers, acquisitions, new systems, or system conversions, however, would warrant a more extensive security risk assessment. Regardless of the scope, the potential impact and the urgency of the risk exposure will dictate when and how controls are changed.


Return to the top of the newsletter

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY - We continue the series on the National Institute of Standards and Technology (NIST) Handbook.
  
  Chapter 2 - ELEMENTS OF COMPUTER SECURITY
  
  2.1 Computer Security Supports the Mission of the Organization.
  
  The purpose of computer security is to protect an organization's valuable resources, such as information, hardware, and software. Through the selection and application of appropriate safeguards, security helps the organization's mission by protecting its physical and financial resources, reputation, legal position, employees, and other tangible and intangible assets. Unfortunately, security is sometimes viewed as thwarting the mission of the organization by imposing poorly selected, bothersome rules and procedures on users, managers, and systems. On the contrary, well-chosen security rules and procedures do not exist for their own sake -- they are put in place to protect important assets and thereby support the overall organizational mission.
  
  Security, therefore, is a means to an end and not an end in itself. For example, in a private- sector business, having good security is usually secondary to the need to make a profit. Security, then, ought to increase the firm's ability to make a profit. In a public-sector agency, security is usually secondary to the agency's service provided to citizens. Security, then, ought to help improve the service provided to the citizen.
  
  To act on this, managers need to understand both their organizational mission and how each information system supports that mission. After a system's role has been defined, the security requirements implicit in that role can be defined. Security can then be explicitly stated in terms of the organization's mission.
  
  The roles and functions of a system may not be constrained to a single organization. In an interorganizational system, each organization benefits from securing the system. For example, for electronic commerce to be successful, each of the participants requires security controls to protect their resources. However, good security on the buyer's system also benefits the seller; the buyer's system is less likely to be used for fraud or to be unavailable or otherwise negatively affect the seller. (The reverse is also true.)


PLEASE NOTE:
 
Some of the above links may have expired, especially those from news organizations.  We may have a copy of the article, so please e-mail us at examiner@yennik.com if we can be of assistance.