R. Kinney Williams - Yennik, Inc.
R. Kinney Williams
Yennik, Inc.

Internet Banking News
Brought to you by Yennik, Inc. the acknowledged leader in Internet auditing for financial institutions.

Remote offsite and Onsite FFIEC IT Audits

March 19, 2023

Newsletter Content FFIEC IT Security FFIEC & ADA Web Site Audits
Web Site Compliance NIST Handbook Penetration Testing
Does Your Financial Institution need an affordable cybersecurity Internet security audit?  Yennik, Inc. has clients in 42 states that rely on our cybersecurity audits to ensure proper Internet security settings and to meet the independent diagnostic test requirements of FDIC, OCC, FRB, and NCUA, which provides compliance with Gramm-Leach Bliley Act 501(b) as well as the penetration test complies with the FFIEC Cybersecurity Assessment Tool regarding resilience testing The cybersecurity penetration audit and Internet security testing is an affordable-sophisticated process than goes far beyond the simple scanning of ports.  The audit focuses on a hacker's perspective, which will help you identify real-world cybersecurity weaknesses.  For more information, give R. Kinney Williams a call today at Office/Cell 806-535-8300 or visit http://www.internetbankingaudits.com/.
Remote bank regulatory FFIEC IT audits - I am performing virtual/remote bank regality FFIEC IT audits for banks and credit unions.  I am a former bank examiner with years of IT auditing experience.  Please contact R. Kinney Williams at examiner@yennik.com from your bank's email and I will send you information and fees.  All correspondence is confidential.


MISCELLANEOUS CYBERSECURITY NEWS:

OIA - The FDIC's Security Controls Over Microsoft Windows Active Directory - The Federal Deposit Insurance Corporation (FDIC) relies heavily on information systems containing sensitive data to carry out its responsibilities.  Includes a Summary of the FDIC’s Corrective Actions.  https://www.fdicoig.gov/sites/default/files/reports/2023-03/AUD-23-002-Redacted.pdf

Researcher blasts Canada Revenue Agency’s questionable data policy - A security researcher is calling foul after discovering the Canada Revenue Agency appears to force users into accepting questionable terms and conditions that put their data at risk when visiting the government website. https://www.scmagazine.com/news/privacy/researcher-blasts-canada-revenue-agencys-questionable-data-policy

Blackbaud pays $3 million for misleading disclosures in 2020 ransomware attack - Blackbaud has agreed to pay the Securities and Exchange Commission $3 million to settle allegations that it made misleading disclosures about its massive 2020 ransomware attack, which impacted over 13,000 customers. https://www.scmagazine.com/news/ransomware/blackbaud-pays-3-million-misleading-disclosures-2020-ransomware-attack

Feds fine Florida children’s health insurance site for massive 2020 hack - Jelly Bean Communications Design reached a $293,771 settlement to resolve False Claims Act allegations that it knowingly provided deficient security controls to Florida Healthy Kids Corp., which caused the second largest reported healthcare data breach of 2021. https://www.scmagazine.com/news/compliance/feds-fine-florida-childrens-health-insurance-site-2020-hack

Research indicates humans are still better than ChatGPT at phishing - for now - Have we reached the point where it’s time to dial down all the fear, uncertainty, and doubt around ChatGPT? https://www.scmagazine.com/news/emerging-technology/research-indicates-humans-are-still-better-than-chatgpt-at-phishing-for-now

Lesson learned from the US Marshals Service cyber incident: we’re all targets – and the stakes are high - The cyber incident at the United States Marshals Service (USMS) last month made it abundantly clear that all organizations are at risk today. https://www.scmagazine.com/perspective/breach/lesson-learned-from-the-us-marshals-service-cyber-incident-were-all-targets-and-the-stakes-are-high

CYBERSECURITY ATTACKS, INTRUSIONS, DATA THEFT & LOSS:

DC Health Link breach includes data of House members; FBI investigating - Hundreds of congressional leaders and staff had their data stolen by threat actors through DC Health Link, the health insurance marketplace for Washington. https://www.scmagazine.com/news/ransomware/dc-health-link-breach-house-members-fbi-investigating

Acer confirms server intrusion after miscreant offers 160GB cache of stolen files - Acer has confirmed someone broke into one of its servers after a miscreant put up for sale a 160GB database of what's claimed to be the Taiwanese PC maker's confidential information. https://www.theregister.com/2023/03/08/acer_confirms_server_breach/

Mental health provider Cerebral alerts 3.1M people of data breach - Healthcare platform Cerebral is sending data breach notices to 3.18 million people who have interacted with its websites, applications, and telehealth services. https://www.bleepingcomputer.com/news/security/mental-health-provider-cerebral-alerts-31m-people-of-data-breach/

LA housing authority discloses data breach after ransomware attack - The Housing Authority of the City of Los Angeles (HACLA) is warning of a "data security event" after the LockBit ransomware gang targeted the organization and leaked data stolen in the attack. https://www.bleepingcomputer.com/news/security/la-housing-authority-discloses-data-breach-after-ransomware-attack/

Hospital in Brussels latest victim in spate of European healthcare cyberattacks - A university hospital in Brussels has become the latest institution targeted in a spate of cyberattacks against European hospitals. https://therecord.media/brussels-hospital-cyberattack-belgium-saint-pierre

Zoll Medical notifies 1M patients of data breach tied to LifeVest device - Just over 1 million patients who used or were considered for use of a Zoll product were recently notified that their data was potentially exposed after a hack of the medical device and technology solutions vendor’s internal network in early February. https://www.scmagazine.com/news/privacy/zoll-medical-notifies-1m-patients-data-breach-lifevest-device

Return to the top of the newsletter

WEB SITE COMPLIANCE - This week concludes our series on the FDIC's Supervisory Policy on Identity Theft (Part 6 of  6)
    
    President’s Identity Theft Task Force
    
    On May 10, 2006, the President issued an executive order establishing an Identity Theft Task Force (Task Force). The Chairman of the FDIC is a principal member of the Task Force and the FDIC is an active participant in its work. The Task Force has been charged with delivering a coordinated strategic plan to further improve the effectiveness and efficiency of the federal government's activities in the areas of identity theft awareness, prevention, detection, and prosecution. On September 19, 2006, the Task Force adopted interim recommendations on measures that can be implemented immediately to help address the problem of identity theft. Among other things, these recommendations dealt with data breach guidance to federal agencies, alternative methods of "authenticating" identities, and reducing access of identity thieves to Social Security numbers. The final strategic plan is expected to be publicly released soon.
    
    Conclusion
    
    Financial institutions have an affirmative and continuing obligation to protect the privacy of customers' nonpublic personal information. Despite generally strong controls and practices by financial institutions, methods for stealing personal data and committing fraud with that data are continuously evolving. The FDIC treats the theft of personal financial information as a significant risk area due to its potential to impact the safety and soundness of an institution, harm consumers, and undermine confidence in the banking system and economy. The FDIC believes that its collaborative efforts with the industry, the public and its fellow regulators will significantly minimize threats to data security and consumers.


Return to the top of the newsletter

FFIEC IT SECURITY - We continue our coverage of the FDIC's "Guidance on Managing Risks Associated With Wireless Networks and Wireless Customer Access."
   
   PART I. Risks Associated with Wireless Internal Networks
   
   
Financial institutions are evaluating wireless networks as an alternative to the traditional cable to the desktop network. Currently, wireless networks can provide speeds of up to 11 Mbps between the workstation and the wireless access device without the need for cabling individual workstations. Wireless networks also offer added mobility allowing users to travel through the facility without losing their network connection. Wireless networks are also being used to provide connectivity between geographically close locations as an alternative to installing dedicated telecommunication lines.
   
   Wireless differs from traditional hard-wired networking in that it provides connectivity to the network by broadcasting radio signals through the airways. Wireless networks operate using a set of FCC licensed frequencies to communicate between workstations and wireless access points. By installing wireless access points, an institution can expand its network to include workstations within broadcast range of the network access point.
   
   The most prevalent class of wireless networks currently available is based on the IEEE 802.11b wireless standard. The standard is supported by a variety of vendors for both network cards and wireless network access points. The wireless transmissions can be encrypted using "Wired Equivalent Privacy" (WEP) encryption. WEP is intended to provide confidentiality and integrity of data and a degree of access control over the network. By design, WEP encrypts traffic between an access point and the client. However, this encryption method has fundamental weaknesses that make it vulnerable. WEP is vulnerable to the following types of decryption attacks:
   
   1)  Decrypting information based on statistical analysis;
   
   2)  Injecting new traffic from unauthorized mobile stations based on known plain text;
   
   3)  Decrypting traffic based on tricking the access point;
   
   4)  Dictionary-building attacks that, after analyzing about a day's worth of traffic, allow real-time automated decryption of all traffic (a dictionary-building attack creates a translation table that can be used to convert encrypted information into plain text without executing the decryption routine); and
   
   5)  Attacks based on documented weaknesses in the RC4 encryption algorithm that allow an attacker to rapidly determine the encryption key used to encrypt the user's session).

Return to the top of the newsletter

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY - We continue the series on the National Institute of Standards and Technology (NIST) Handbook.
  
  Chapter 2 - ELEMENTS OF COMPUTER SECURITY
  
  2.7 Computer Security Should Be Periodically Reassessed.
  
  Computers and the environments they operate in are dynamic. System technology and users, data and information in the systems, risks associated with the system and, therefore, security requirements are ever-changing. Many types of changes affect system security: technological developments (whether adopted by the system owner or available for use by others); connecting to external networks; a change in the value or use of information; or the emergence of a new threat.
  
  In addition, security is never perfect when a system is implemented. System users and operators discover new ways to intentionally or unintentionally bypass or subvert security. Changes in the system or the environment can create new vulnerabilities. Strict adherence to procedures is rare, and procedures become outdated over time. All of these issues make it necessary to reassess the security of computer systems.
  
  2.8 Computer Security is Constrained by Societal Factors.
  
  The ability of security to support the mission of the organization(s) may be limited by various factors, such as social issues. For example, security and workplace privacy can conflict. Commonly, security is implemented on a computer system by identifying users and tracking their actions. However, expectations of privacy vary and can be violated by some security measures. (In some cases, privacy may be mandated by law.)
  
  Although privacy is an extremely important societal issue, it is not the only one. The flow of information, especially between a government and its citizens, is another situation where security may need to be modified to support a societal goal. In addition, some authentication measures, such as retinal scanning, may be considered invasive in some environments and cultures.
  
  The underlying idea is that security measures should be selected and implemented with a recognition of the rights and legitimate interests of others. This many involve balancing the security needs of information owners and users with societal goals. However, rules and expectations change with regard to the appropriate use of security controls. These changes may either increase or decrease security.
  
  The relationship between security and societal norms is not necessarily antagonistic. Security can enhance the access and flow of data and information by providing more accurate and reliable information and greater availability of systems. Security can also increase the privacy afforded to an individual or help achieve other goals set by society.


PLEASE NOTE:
 
Some of the above links may have expired, especially those from news organizations.  We may have a copy of the article, so please e-mail us at examiner@yennik.com if we can be of assistance.