R. Kinney Williams - Yennik, Inc.®
R. Kinney Williams
Yennik, Inc.

Internet Banking News
Brought to you by Yennik, Inc. the acknowledged leader in Internet auditing for financial institutions.

April 29, 2012

CONTENT Internet Compliance Information Systems Security
IT Security
 
Internet Privacy
 
Website for Penetration Testing
 
Does Your Financial Institution need an affordable Internet security audit?  Yennik, Inc. has clients in 42 states that rely on our penetration testing audits to ensure proper Internet security settings and to meet the independent diagnostic test requirements of FDIC, OCC, FRB, and NCUA, which provides compliance with Gramm-Leach Bliley Act 501(b) The penetration audit and Internet security testing is an affordable-sophisticated process than goes far beyond the simple scanning of ports.  The audit focuses on a hacker's perspective, which will help you identify real-world weaknesses.  For more information, give R. Kinney Williams a call today at 806-798-7119 or visit http://www.internetbankingaudits.com/.


REMINDER - This newsletter is available for the Android smart phones and tablets.  Go to the Market Store and search for yennik.

FYI - Energy lab releases open-source tool for tracking cyberattacks - Researchers at an Energy Department lab have released an open-source tool to spot the source of malicious activity inside the enterprise more quickly. http://gcn.com/articles/2012/05/07/feature-1-tool-spots-net-breach-sidebar.aspx

FYI - Judges Drive Truck Through Loophole in Supreme Court GPS Ruling - A federal judge in Iowa has ruled that evidence gathered through the warrantless use of covert GPS vehicle trackers can be used to prosecute a suspected drug trafficker, despite a Supreme Court decision this year that found such tracking unconstitutional without a warrant. http://www.wired.com/threatlevel/2012/04/dea-use-of-gps-tracker/

FYI - FBI Seizes Anonymizing Email Service Server - Privacy activists criticize the FBI's anonymous remailer server takedown that resulted from a bomb threat investigation. Did an FBI server seizure go too far? http://www.informationweek.com/news/security/government/232900643

FYI - TSA Tests Identity Verification System - In wake of invalid boarding pass scares, Transportation Security Agency seeks to automate the process of authenticating travel documents and matching them to IDs. The Transportation Security Administration (TSA) has begun testing a new system that verifies an air traveler's identity by matching photo IDs to boarding passes and ensures that boarding passes are authentic. http://www.informationweek.com/news/government/security/232900686

FYI - Russian cyber crime market more organized, lucrative - When it comes to information sharing, the cyber crime community in Russia is way ahead of the game. According to a report (PDF) released Tuesday by Russian security firm Group-IB, the value of the country's cyber crime market is now $2.3 billion, nearly doubling last year's $1.2 billion total.

ATTACKS, INTRUSIONS, DATA THEFT & LOSS

FYI - Seventeen years worth of Emory patient data missing - Emory Healthcare in Atlanta lost the personal information of surgery patients treated at its three hospitals when 10 backup discs went missing. http://www.scmagazine.com/seventeen-years-worth-of-emory-patient-data-missing/article/237554/?DCMP=EMC-SCUS_Newswire

FYI - Iranian oil terminal 'offline' after 'malware attack' - Iran has been forced to disconnect key oil facilities after suffering a malware attack on Sunday, say reports. http://www.bbc.co.uk/news/technology-17811565

FYI - US charges Russian over $1.45 million hacking scheme - A Russian national has been charged in the U.S. for allegedly hacking into brokerage accounts and executing fraudulent trades. Four brokerage firms claim caused combined $1 million in losses. http://www.zdnet.com/blog/security/us-charges-russian-over-145-million-hacking-scheme/11631?tag=mantle_skin;content

FYI - Austrian police task force arrests "country's youngest hacker" - Austrian federal police have arrested a 15-year-old student who allegedly cracked the servers of 259 companies during a three-month hacking spree. http://www.h-online.com/security/news/item/Austrian-police-task-force-arrests-country-s-youngest-hacker-1541837.html

FYI - FBI suspects student candidate of hacking his own election - Campaign season can make presidential candidates do crazy things, but it's not often one resorts to hacking into a computer and stealing 700 voters' passwords and IDs to alter the electronic polling results. http://www.technolog.msnbc.msn.com/technology/technolog/fbi-suspects-student-candidate-hacking-his-own-election-726362

FYI - South Carolina Medicaid employee leaks recipient data - South Carolina Medicaid data was leaked after the information was transferred to a personal email account. http://www.scmagazine.com/south-carolina-medicaid-employee-leaks-recipient-data/article/238060/?DCMP=EMC-SCUS_Newswire

Return to the top of the newsletter

WEB SITE COMPLIANCE -
We continue covering some of the issues discussed in the "Risk Management Principles for Electronic Banking" published by the Basel Committee on Bank Supervision.

Board and Management Oversight - Principle 1: The Board of Directors and senior management should establish effective management oversight over the risks associated with e-banking activities, including the establishment of specific accountability, policies and controls to manage these risks. (Part 2 of 2)

Finally, the Board and senior management should ensure that its risk management processes for its e-banking activities are integrated into the bank's overall risk management approach. The bank's existing risk management policies and processes should be evaluated to ensure that they are robust enough to cover the new risks posed by current or planned e-banking activities. Additional risk management oversight steps that the Board and senior management should consider taking include:

1) Clearly establishing the banking organization's risk appetite in relation to e-banking.

2) Establishing key delegations and reporting mechanisms, including the necessary escalation procedures for incidents that impact the bank's safety, soundness or reputation (e.g. networks penetration, employee security infractions and any serious misuse of computer facilities).

3) Addressing any unique risk factors associated with ensuring the security, integrity and availability of e-banking products and services, and requiring that third parties to whom the banks has outsourced key systems or applications take similar measures.

4) Ensuring that appropriate due diligence and risk analysis are performed before the bank conducts cross-border e-banking activities.

The Internet greatly facilitates a bank's ability to distribute products and services over virtually unlimited geographic territory, including across national borders. Such cross-border e-banking activity, particularly if conducted without any existing licensed physical presence in the "host country," potentially subjects banks to increased legal, regulatory and country risk due to the substantial differences that may exist between jurisdictions with respect to bank licensing, supervision and customer protection requirements. Because of the need to avoid inadvertent non-compliance with a foreign country's laws or regulations, as well as to manage relevant country risk factors, banks contemplating cross-border e-banking operations need to fully explore these risks before undertaking such operations and effectively manage them.

Depending on the scope and complexity of e-banking activities, the scope and structure of risk management programs will vary across banking organizations. Resources required to oversee e-banking services should be commensurate with the transactional functionality and criticality of systems, the vulnerability of networks and the sensitivity of information being transmitted.

Return to the top of the newsletter
 
INFORMATION TECHNOLOGY SECURITY
-
We continue our series on the FFIEC interagency Information Security Booklet.  

SERVICE PROVIDER OVERSIGHT - SAS 70 REPORTS

Frequently TSPs or user groups will contract with an accounting firm to report on security using Statement on Auditing Standards 70 (SAS 70), an auditing standard developed by the American Institute of Certified Public Accountants. SAS 70 focuses on controls and control objectives. It allows for two types of reports. A SAS 70 Type I report gives the service provider's description of controls at a specific point in time, and an auditor's report. The auditor's report will provide an opinion on whether the control description fairly presents the relevant aspects of the controls, and whether the controls were suitably designed for their purpose.

A SAS 70 Type II report expands upon a Type I report by addressing whether the controls were functioning. It provides a description of the auditor's tests of the controls. It also provides an expanded auditor's report that addresses whether the controls that were tested were operating with sufficient effectiveness to provide reasonable, but not absolute, assurance that the control objectives were achieved during the specified period.

Financial institutions should carefully evaluate the scope and findings of any SAS 70 report. The report may be based on different security requirements than those established by the institution. It may not provide a thorough test of security controls unless requested by the TSP or augmented with additional coverage. Additionally, the report may not address the effectiveness of the security process in continually mitigating changing risks.  Therefore, financial institutions may require additional reports to oversee the security program of the service provider.


Return to the top of the newsletter

INTERNET PRIVACY
- We continue our series listing the regulatory-privacy examination questions.  When you answer the question each week, you will help ensure compliance with the privacy regulations.


Content of Privacy Notice

12. Does the institution make the following disclosures regarding service providers and joint marketers to whom it discloses nonpublic personal information under §13:

a. as applicable, the same categories and examples of nonpublic personal information disclosed as described in paragraphs (a)(2) and (c)(2) of section six (6) (see questions 8b and 10); and [§6(c)(4)(i)]

b. that the third party is a service provider that performs marketing on the institution's behalf or on behalf of the institution and another financial institution; [§6(c)(4)(ii)(A)] or

c. that the third party is a financial institution with which the institution has a joint marketing agreement? [§6(c)(4)(ii)(B)]

 

PLEASE NOTE:  Some of the above links may have expired, especially those from news organizations.  We may have a copy of the article, so please e-mail us at examiner@yennik.com if we can be of assistance.  



Company Information
Yennik, Inc.

4409 101st Street
Lubbock, Texas 79424
Office 806-798-7119
Examiner@yennik.com

 

Please visit our other web sites:
VISTA penetration-vulnerability testing
The Community Banker - Bank FFIEC & ADA Web Site Audits
Credit Union FFIEC & ADA Web Site Audits - Bank Auditing Services
US Banks on the Internet  
US Credit Unions on the Internet

All rights reserved; Our logo is registered with the United States Patent and Trademark Office.
Terms and Conditions, Privacy Statement, © Copyright Yennik, Incorporated