R. Kinney Williams - Yennik, Inc.
R. Kinney Williams
Yennik, Inc.

Internet Banking News
Brought to you by Yennik, Inc. the acknowledged leader in Internet auditing for financial institutions.

Remote offsite and Onsite FFIEC IT Audits

March 20, 2022

Newsletter Content FFIEC IT Security FFIEC & ADA Web Site Audits
Web Site Compliance NIST Handbook Penetration Testing
Does Your Financial Institution need an affordable cybersecurity Internet security audit?  Yennik, Inc. has clients in 42 states that rely on our cybersecurity audits to ensure proper Internet security settings and to meet the independent diagnostic test requirements of FDIC, OCC, FRB, and NCUA, which provides compliance with Gramm-Leach Bliley Act 501(b) as well as the penetration test complies with the FFIEC Cybersecurity Assessment Tool regarding resilience testing The cybersecurity penetration audit and Internet security testing is an affordable-sophisticated process than goes far beyond the simple scanning of ports.  The audit focuses on a hacker's perspective, which will help you identify real-world cybersecurity weaknesses.  For more information, give R. Kinney Williams a call today at Office/Cell 806-535-8300 or visit http://www.internetbankingaudits.com/.
Remote bank regulatory FFIEC IT audits - I am performing virtual/remote bank regality FFIEC IT audits for banks and credit unions.  I am a former bank examiner with years of IT auditing experience.  Please contact R. Kinney Williams at examiner@yennik.com from your bank's email and I will send you information and fees.  All correspondence is confidential.


MISCELLANEOUS CYBERSECURITY NEWS:

SEC proposes four-day rule for public companies to report cyberattacks - A new rule proposed by the US Securities and Exchange Commission (SEC) would force public companies to disclose cyberattacks within four days along with periodic reports about their cyber-risk management plans. https://www.theregister.com/2022/03/09/sec_cyberattack_disclosure/

CISA official: Lower reporting thresholds for cyber incidents and get your CEO and board invested in security - A top official at the Cybersecurity and Infrastructure Security Agency cited increased visibility over cyber intrusions in the private sector, cultivating a stronger digital security workforce and making cybersecurity a top-of-mind issue for corporate board rooms as priorities. https://www.scmagazine.com/analysis/cloud-security/cisa-official-lower-reporting-thresholds-for-cyber-incidents-and-get-your-ceo-and-board-invested-in-security

Managed service providers more often the targets of cyberattacks versus their customers - A new report released Thursday found that managed service providers (MSPs) often find themselves the target for cyberattacks, rather than the organizations they were hired to protect. https://www.scmagazine.com/news/managed-security/managed-service-providers-more-often-the-targets-of-cyberattacks-versus-their-customers

Majority of IT pros view the hybrid cloud as a permanent destination - Monday it was reported that 67% of IT professionals surveyed view a hybrid cloud solution as a permanent destination. https://www.scmagazine.com/news/cloud/majority-of-it-pros-view-the-hybrid-cloud-as-a-permanent-destination

Hit by ransomware or paid a ransom? Now some companies will have to tell the government - Owners and operators of US critical infrastructure will now in some cases be legally required to report cyberattacks and ransomware payments to the Cybersecurity and Infrastructure Security Agency (CISA). https://www.zdnet.com/article/hit-by-ransomware-or-paid-a-ransom-now-some-companies-will-have-to-tell-the-government/

Data centres are still a tempting target for hackers. Here's how to improve your security - Even if cloud computing is on the rise, there are still a lot of corporate data centres around and these are a very tempting target for cyber criminals and malicious hackers. https://www.zdnet.com/article/data-centres-are-still-a-tempting-target-for-hackers-heres-how-to-improve-your-security/

German government warns against using Kaspersky products - Germany’s Office for Information Security (BSI) recommended users find alternatives for Kaspersky products, saying the antivirus software company could be forced to carry out attacks or spy on behalf of the Russian government. https://www.scmagazine.com/news/cyberespionage/german-government-warns-against-using-kaspersky-products

New SEC cybersecurity reporting mandates put more pressure on investment firms - In the wake of ongoing cyber threats from Russia, the U.S. Securities and Exchange Commission (SEC) is proposing new cybersecurity rules to amp up cyber-incident reporting. https://www.scmagazine.com/analysis/regulation/new-sec-cybersecurity-reporting-mandates-put-more-pressure-on-investment-firms

Smaller financial firms face big challenges as cyberattacks increase - In the wake of pandemic lockdowns, with more people working from home and using online services for the most basic activities, cybercriminals have swooped in to take advantage of those customers who are new to digital financial services or those just overwhelmed by changes. https://www.scmagazine.com/analysis/data-security/smaller-financial-firms-face-big-challenges-as-cyberattacks-increase

CYBERSECURITY ATTACKS, INTRUSIONS, DATA THEFT & LOSS:

Cyberattack on Norwood Clinic compromises data tied to 228K patients - Alabama-based Norwood Clinic notified 228,103 patients that their data was potentially accessed or acquired after a cyberattack in October 2021. https://www.scmagazine.com/analysis/breach/cyberattack-on-norwood-clinic-compromises-data-tied-to-228k-patients

New narrative forms on Russia-Ukraine cyberwar as Viasat outage investigated - Global spy agencies are reportedly investigating what appears to be a late-February cyberattack on satellite internet provider Viasat that may change the narrative on whether Russia's Ukrainian invasion was light on cyberwar. https://www.scmagazine.com/analysis/cyberespionage/new-narrative-forms-on-russia-ukraine-cyberwar-as-viasat-outage-investigated

Finnish govt agency warns of unusual aircraft GPS interference - Finland's Transport and Communications Agency, Traficom, has issued a public announcement informing of an unusual spike in GPS interference near the country's eastern border. https://www.bleepingcomputer.com/news/technology/finnish-govt-agency-warns-of-unusual-aircraft-gps-interference/

Cyberattack on Norwood Clinic compromises data tied to 228K patients - Alabama-based Norwood Clinic notified 228,103 patients that their data was potentially accessed or acquired after a cyberattack in October 2021. https://www.scmagazine.com/analysis/breach/cyberattack-on-norwood-clinic-compromises-data-tied-to-228k-patients

The Kronos effect: Addressing mission-critical processes for healthcare continuity - Early this year, healthcare’s frontline workers began reporting disruptions to their paychecks stemming from a cyberattack and outage on HR and payroll vendor Kronos. https://www.scmagazine.com/analysis/business-contunuity/the-kronos-effect-addressing-mission-critical-processes-for-healthcare-continuity

‘Security issue’ at East Tennessee Children’s Hospital disrupts services - East Tennessee Children’s Hospital in Knoxville is currently facing disruptions to several key care services at its downtown location, including email, after a “security issue,” according to multiple social media posts and a website notice. https://www.scmagazine.com/analysis/incident-response/security-issue-at-east-tennessee-childrens-hospital-disrupts-services

Return to the top of the newsletter

WEB SITE COMPLIANCE - We continue our series on the FFIEC interagency Information Security Booklet.  
  
  
MALICIOUS CODE
  
  Malicious code is any program that acts in unexpected and potentially damaging ways. Common types of malicious code are viruses, worms, and Trojan horses. The functions of each were once mutually exclusive; however, developers combined functions to create more powerful malicious code. Currently malicious code can replicate itself within a computer and transmit itself between computers. Malicious code also can change, delete, or insert data, transmit data outside the institution, and insert backdoors into institution systems. Malicious code can attack institutions at either the server or the client level. It can also attack routers, switches, and other parts of the institution infrastructure. Malicious code can also monitor users in many ways, such as logging keystrokes, and transmitting screenshots to the attacker.
  
  Typically malicious code is mobile, using e - mail, Instant Messenger, and other peer-to-peer (P2P) applications, or active content attached to Web pages as transmission mechanisms. The code also can be hidden in programs that are downloaded from the Internet or brought into the institution on diskette. At times, the malicious code can be created on the institution's systems either by intruders or by authorized users. The code can also be introduced to a Web server in numerous ways, such as entering the code in a response form on a Web page.
  
  Malicious code does not have to be targeted at the institution to damage the institution's systems or steal the institution's data. Most malicious code is general in application, potentially affecting all Internet users with whatever operating system or application the code needs to function.


Return to the top of the newsletter

FFIEC IT SECURITY - We continue our series on the FFIEC interagency Information Security Booklet.  
  
  SECURITY CONTROLS - IMPLEMENTATION - APPLICATION ACCESS (Part 1 of 2)

  
  Sensitive or mission - critical applications should incorporate appropriate access controls that restrict which application functions are available to users and other applications. The most commonly referenced applications from an examination perspective support the information processing needs of the various business lines. These computer applications allow authorized users or other applications to interface with the related database. Effective application access control can enforce both segregation of duties and dual control. Access rights to sensitive or critical applications and their database should ensure that employees or applications have the minimum level of access required to perform their business functions. Effective application access control involves a partnership between the security administrators, the application programmers (including TSPs and vendors), and the business owners.
  
  Some security software programs will integrate access control for the operating system and some applications. That software is useful when applications do not have their own access controls, and when the institution wants to rely on the security software instead of the application's access controls. Examples of such security software products for mainframe computers include RACF, CA - ACF2, and CA - TopSecret. Institutions should understand the functionality and vulnerabilities of their application access control solutions and consider those issues in their risk assessment process.


Return to the top of the newsletter

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY - We continue the series on the National Institute of Standards and Technology (NIST) Handbook.
 
 Chapter 18 - AUDIT TRAILS
 
 18.2 Audit Trails and Logs
 
 18.2.2.1 System-Level Audit Trails
 
 If a system-level audit capability exists, the audit trail should capture, at a minimum, any attempt to log on (successful or unsuccessful), the log-on ID, date and time of each log-on attempt, date and time of each log-off, the devices used, and the function(s) performed once logged on (e.g., the applications that the user tried, successfully or unsuccessfully, to invoke). System-level logging also typically includes information that is not specifically security-related, such as system operations, cost-accounting charges, and network performance.
 
 A system audit trail should be able to identify failed log-on attempts, especially if the system does not limit the number of failed log-on attempts. Unfortunately, some system-level audit trails cannot detect attempted log-ons, and therefore, cannot log them for later review. These audit trails can only monitor and log successful log-ons and subsequent activity. To effectively detect intrusion, a record of failed log-on attempts is required.


PLEASE NOTE:
 
Some of the above links may have expired, especially those from news organizations.  We may have a copy of the article, so please e-mail us at examiner@yennik.com if we can be of assistance.