R. Kinney Williams - Yennik, Inc.
R. Kinney Williams
Yennik, Inc.

Internet Banking News
Brought to you by Yennik, Inc. the acknowledged leader in Internet auditing for financial institutions.

Remote offsite and Onsite FFIEC IT Audits

May 31, 2020

Please stay safe - We will recover.

Newsletter Content FFIEC IT Security FFIEC & ADA Web Site Audits
Web Site Compliance NIST Handbook Penetration Testing
Does Your Financial Institution need an affordable cybersecurity Internet security audit?  Yennik, Inc. has clients in 42 states that rely on our cybersecurity audits to ensure proper Internet security settings and to meet the independent diagnostic test requirements of FDIC, OCC, FRB, and NCUA, which provides compliance with Gramm-Leach Bliley Act 501(b) as well as the penetration test complies with the FFIEC Cybersecurity Assessment Tool regarding resilience testing The cybersecurity penetration audit and Internet security testing is an affordable-sophisticated process than goes far beyond the simple scanning of ports.  The audit focuses on a hacker's perspective, which will help you identify real-world cybersecurity weaknesses.  For more information, give R. Kinney Williams a call today at Office/Cell 806-535-8300 or visit http://www.internetbankingaudits.com/.


Virtual IT audits - In response to the national emergency, I am now performing virtual FFIEC IT audits for insured financial institutions.  I am a former bank examiner with over 50 years IT audit experience.  Please email R. Kinney Williams at examiner@yennik.com from your bank's domain and I will email you information and fees.

FYI - Attackers’ use of virtual machine to hide ransomware is a first, say researchers - Virtual machines are an important tool for threat analysts as they debug and investigate malware. But now there is a documented case of malicious cyber actors exploiting a VM to their advantage in an attempt to hide a Ragnar Locker ransomware attack. https://www.scmagazine.com/home/security-news/ransomware/attackers-use-of-virtual-machine-to-hide-ransomware-is-a-first-say-researchers/

Rogue ADT tech spied on hundreds of customers in their homes via CCTV – including me, says teen girl - Lawsuits filed after alarm biz admits worker snooped on victims - A technician at ADT remotely accessed hundreds of customers' CCTV cameras to spy on people in their own homes, the burglar-alarm biz has admitted. https://www.theregister.co.uk/2020/05/19/adt_spying_lawsuit/

New virtual cyber school gives teens chance to try out as cyber security agents from home - Young people encouraged to join online classes to develop problem-solving and cyber skills. https://www.gov.uk/government/news/new-virtual-cyber-school-gives-teens-chance-to-try-out-as-cyber-security-agents-from-home

Verizon's data breach report highlights how unsecured cloud storage opens door to attacks - Anecdotally, it has been clear for a while that enterprises are often leaving cloud storage repositories open due to oversight or error. Now Verizon's security research shows that the "error" category is on the rise due to better reporting. https://www.zdnet.com/article/verizons-data-breach-report-highlights-how-unsecured-cloud-storage-opens-door-to-attacks/

Japan investigates potential leak of prototype missile data in Mitsubishi hack - The country is analyzing how such a leak could impact national security. Japan has launched an investigation into the potential exposure of confidential missile data in the wake of a cyberattack on Mitsubishi Electric Corp. https://www.zdnet.com/article/japan-investigates-potential-leak-of-prototype-missile-design-in-mitsubishi-hack/

How security can enable business continuity by protecting newly remote employees - The shelter-in-place orders and closure of non-essential businesses that have been implemented to slow the spread of COVID-19 have brought the need for business continuity to the forefront. https://www.scmagazine.com/home/opinion/executive-insight/how-security-can-enable-business-continuity-by-protecting-newly-remote-employees/

Cybersecurity among six sectors booming during Covid-19, with Q1 funding exceeding $1.5B - As the Covid-19 pandemic continues to hobble economies around the world, cybersecurity is one of six sectors currently booming, with first quarter funding topping $1.5 billion. https://www.scmagazine.com/home/security-news/cybersecurity-among-six-sectors-booming-during-covid-19-with-q1-funding-exceeding-1-5b/


ATTACKS, INTRUSIONS, DATA THEFT & LOSS

FYI - Colorado, Florida & Ohio become latest states to disclose PUA program data leaks - Colorado, Ohio and Florida have become the latest states to disclose the accidental exposure of information belonging to citizens who applied to the federal Pandemic Unemployment Assistance program as a means of seeking some financial security during the ongoing COVID-19 crisis. https://www.scmagazine.com/home/security-news/colorado-and-ohio-become-latest-states-to-disclose-pua-program-data-leaks/

Modular backdoor sneaked into video game developers’ servers - A suspected Chinese APT group used a newly discovered modular backdoor to infect at least one video game developer’s build orchestration server and at least one other company’s game servers, researchers have reported. https://www.scmagazine.com/home/security-news/gaming/modular-backdoor-sneaked-into-video-game-developers-servers/

Home Chef confirms data breach after eight million records sold on dark web - The recent breach of Home Chef, confirmed this week, after malicious actor Shiny Hunters sold eight million of its records on the dark web underscores the looming security challenge of managing employees who access business data from outside the confines of the secure network. https://www.scmagazine.com/home/security-news/home-chef-confirms-data-breach-after-eight-million-records-sold-on-dark-web/

Toll's stolen data finds itself on the 'dark web' - Follows the company in January revealing it would revert to manual processes following a ransomware incident. https://www.zdnet.com/article/tolls-stolen-data-finds-itself-on-the-dark-web/

EasyJet Hackers Take Off with Travel Details for 9M Customers - The vacation-centric airline is warning victims about social-engineering attacks. https://threatpost.com/easyjet-hackers-travel-details-9m-customers/155894/

Snake ransomware leaks patient data from Fresenius Medical Care - Medical data and personally identifiable information belonging to patients at a Fresenius Medical Care unit are currently available online on a paste website. https://www.bleepingcomputer.com/news/security/snake-ransomware-leaks-patient-data-from-fresenius-medical-care/

Israeli websites defaced, as more offensive cyber activity flares up in Middle East - Following a month of cyberattacks involving Iran and Israel, experts are reluctant to predict all-out digital warfare between the nation states, despite the obvious recent tit for tat that underscores age-old, religion-based tensions. https://www.scmagazine.com/home/security-news/apts-cyberespionage/israel-iran-trade-cyberattacks/

Israeli websites defaced, as more offensive cyber activity flares up in Middle East - Following a month of cyberattacks involving Iran and Israel, experts are reluctant to predict all-out digital warfare between the nation states, despite the obvious recent tit for tat that underscores age-old, religion-based tensions. https://www.scmagazine.com/home/security-news/apts-cyberespionage/israel-iran-trade-cyberattacks/

Arbonne breach of 3,500+ Calif. residents’ PII could test privacy law - The exposure of the PII of more than 3,500 California residents in the database of international multi-level marketing firm Arbonne following a breach on April 23 offers a glimpse into whether the state will enforce its new privacy statute that went into effect in January. https://www.scmagazine.com/home/security-news/privacy-compliance/arbonne-breach-of-3500-calif-residents-pii-could-test-privacy-law/


Return to the top of the newsletter

WEB SITE COMPLIANCE -
Risk Management of Outsourced Technology Services

Due Diligence in Selecting a Service Provider - Oversight of Service Provider

Assess Quality of Service and Support

• Regularly review reports documenting the service provider’s performance. Determine if the reports are accurate and allow for a meaningful assessment of the service provider’s performance.
• Document and follow up on any problem in service in a timely manner. Assess service provider plans to enhance service levels.
• Review system update procedures to ensure appropriate change controls are in effect, and ensure authorization is established for significant system changes.
• Evaluate the provider’s ability to support and enhance the institution’s strategic direction including anticipated business development goals and objectives, service delivery requirements, and technology initiatives.
• Determine adequacy of training provided to financial institution employees.
• Review customer complaints on the products and services provided by the service provider.
• Periodically meet with contract parties to discuss performance and operational issues.
• Participate in user groups and other forums.

Return to the top of the newsletter

FFIEC IT SECURITY - We continue our series on the FFIEC interagency Information Security Booklet.
  
  
MONITORING AND UPDATING - MONITORING
  
  Effective monitoring of threats includes both non - technical and technical sources. Nontechnical sources include organizational changes, business process changes, new business locations, increased sensitivity of information, or new products and services. Technical sources include new systems, new service providers, and increased access. Security personnel and financial institution management must remain alert to emerging threats and vulnerabilities. This effort could include the following security activities:
  
  ! Senior management support for strong security policy awareness and compliance. Management and employees must remain alert to operational changes that could affect security and actively communicate issues with security personnel. Business line managers must have responsibility and accountability for maintaining the security of their personnel, systems, facilities, and information.
  
  ! Security personnel should monitor the information technology environment and review performance reports to identify trends, new threats, or control deficiencies. Specific activities could include reviewing security and activity logs, investigating operational anomalies, and routinely reviewing system and application access levels.
  
  ! Security personnel and system owners should monitor external sources for new technical and nontechnical vulnerabilities and develop appropriate mitigation solutions to address them. Examples include many controls discussed elsewhere in this booklet including:
  
  
 -  Establishing an effective configuration management process that monitors for vulnerabilities in hardware and software and establishes a process to install and test security patches,
  
   -  Maintaining up - to - date anti - virus definitions and intrusion detection attack definitions, and
  
   -  Providing effective oversight of service providers and vendors to identify and react to new security issues.
  
  ! Senior management should require periodic security self-assessments and audits to provide an ongoing assessment of policy compliance and ensure prompt corrective action of significant deficiencies.
  
  ! Security personnel should have access to automated tools appropriate for the complexity of the financial institution systems. Automated security policy and security log analysis tools can significantly increase the effectiveness and productivity of security personnel.


Return to the top of the newsletter

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY - We continue the series on the National Institute of Standards and Technology (NIST) Handbook.
  
  Chapter 6 - COMPUTER SECURITY PROGRAM MANAGEMENT
  
  
6.2.2 Efficient, Economic Coordination of Information
  

  A central computer security program helps to coordinate and manage effective use of security-related resources throughout the organization. The most important of these resources are normally information and financial resources.
  
  Sound and timely information is necessary for managers to accomplish their tasks effectively. However, most organizations have trouble collecting information from myriad sources and effectively processing and distributing it within the organization. This section discusses some of the sources and efficient uses of computer security information.
  
  Within the federal government, many organizations such as the Office of Management and Budget, the General Services Administration, the National Institute of Standards and Technology, and the National Telecommunications and Information Administration, provide information on computer, telecommunications, or information resources. This information includes security-related policy, regulations, standards, and guidance. A portion of the information is channeled through the senior designated official for each agency.  Agencies are expected to have mechanisms in place to distribute the information the senior designated official receives.
  
  Computer security-related information is also available from private and federal professional societies and groups. These groups will often provide the information as a public service, although some private groups charge a fee for it. However, even for information that is free or inexpensive, the costs associated with personnel gathering the information can be high.
   
  Internal security-related information, such as which procedures were effective, virus infections, security problems, and solutions, need to be shared within an organization. Often this information is specific to the operating environment and culture of the organization.
  
  A computer security program administered at the organization level can provide a way to collect the internal security-related information and distribute it as needed throughout the organization. Sometimes an organization can also share this information with external groups.
  
  Another use of an effective conduit of information is to increase the central computer security program's ability to influence external and internal policy decisions. If the central computer security program office can represent the entire organization, then its advice is more likely to be heeded by upper management and external organizations. However, to be effective, there should be excellent communication between the system-level computer security programs and the organization level. For example, if an organization were considering consolidating its mainframes into one site (or considering distributing the processing currently done at one site), personnel at the central program could provide initial opinions about the security implications. However, to speak authoritatively, central program personnel would have to actually know the security impacts of the proposed change -- information that would have to be obtained from the system-level computer security program.
  
  An organization's components may develop specialized expertise, which can be shared among components. For example, one operating unit may primarily use UNIX and have developed skills in UNIX security. A second operating unit (with only one UNIX machine), may concentrate on MVS security and rely on the first unit's knowledge and skills for its UNIX machine.
  
  Besides being able to help an organization use information more cost effectively, a computer security program can also help an organization better spend its scarce security dollars. Organizations can develop expertise and then share it, reducing the need to contract out repeatedly for similar services. The central computer security program can help facilitate information sharing.
  
  Personnel at the central computer security program level can also develop their own areas of expertise. For example, they could sharpen their skills could in contingency planning and risk analysis to help the entire organization perform these vital security functions.
  Some Principal Security Program Interactions
  
  Besides allowing an organization to share expertise and, therefore, save money, a central computer security program can use its position to consolidate requirements so the organization can negotiate discounts based on volume purchasing of security hardware and software. It also facilitates such activities as strategic planning and organization-wide incident handling and security trend analysis.


PLEASE NOTE:
 
Some of the above links may have expired, especially those from news organizations.  We may have a copy of the article, so please e-mail us at examiner@yennik.com if we can be of assistance.