R. Kinney Williams - Yennik, Inc.
R. Kinney Williams
Yennik, Inc.

Internet Banking News
Brought to you by Yennik, Inc. the acknowledged leader in Internet auditing for financial institutions.

Remote offsite and Onsite FFIEC IT Audits

June 18, 2023

Newsletter Content FFIEC IT Security FFIEC & ADA Web Site Audits
Web Site Compliance NIST Handbook Penetration Testing
Does Your Financial Institution need an affordable cybersecurity Internet security audit?  Yennik, Inc. has clients in 42 states that rely on our cybersecurity audits to ensure proper Internet security settings and to meet the independent diagnostic test requirements of FDIC, OCC, FRB, and NCUA, which provides compliance with Gramm-Leach Bliley Act 501(b) as well as the penetration test complies with the FFIEC Cybersecurity Assessment Tool regarding resilience testing The cybersecurity penetration audit and Internet security testing is an affordable-sophisticated process than goes far beyond the simple scanning of ports.  The audit focuses on a hacker's perspective, which will help you identify real-world cybersecurity weaknesses.  For more information, give R. Kinney Williams a call today at Office/Cell 806-535-8300 or visit http://www.internetbankingaudits.com/.
FFIEC IT audits - I am performing FFIEC IT audits for banks and credit unions.  I am a former bank examiner with years of IT auditing experience.  Please contact R. Kinney Williams at examiner@yennik.com from your bank's email and I will send you information and fees.  All correspondence is confidential.


MISCELLANEOUS CYBERSECURITY NEWS:

FTC to take aim at health apps with updated breach notification rules - The Federal Trade Commission is proposing to amend its Health Breach Notification Rule requiring vendors of personal health records to report data breaches to include developers of health applications. https://www.scmagazine.com/news/privacy/ftc-health-apps-breach-notification

CISA Releases Guidance For Securing Remote Access Software - CISA issued a guidance document to help organizations balance the functionality of remote access software with potential cyber risks.
https://healthitsecurity.com/news/cisa-releases-guidance-for-securing-remote-access-software
https://www.cisa.gov/sites/default/files/2023-06/Guide%20to%20Securing%20Remote%20Access%20Software_508c.pdf

Hacker attempts to exploit old and new bugs up 55% - Threat actors attempted to exploit vulnerabilities at a greater clip in 2022, according to new research. https://www.scmagazine.com/news/vulnerability-management/hacker-attempts-bugs-up

FTC to take aim at health apps with updated breach notification rules - The Federal Trade Commission is proposing to amend its Health Breach Notification Rule requiring vendors of personal health records to report data breaches to include developers of health applications. https://www.scmagazine.com/news/privacy/ftc-health-apps-breach-notification

Why security pros have to work more closely with cyber insurers - Cyber insurance must become an essential component of a company's cybersecurity strategy as it assists in mitigating financial losses resulting from cyber incidents, such as cyberattacks, data breaches, and ransomware attacks. https://www.scmagazine.com/perspective/strategy/why-security-pros-have-to-work-more-closely-with-cyber-insurers

The US Is Openly Stockpiling Dirt on All Its Citizens - A newly declassified report from the Office of the Director of National Intelligence reveals that the federal government is buying troves of data about Americans. https://www.wired.com/story/odni-commercially-available-information-report/

CYBERSECURITY ATTACKS, INTRUSIONS, DATA THEFT & LOSS:

Japanese pharma giant Eisai discloses ransomware attack - Pharmaceutical company Eisai has disclosed it suffered a ransomware incident that impacted its operations, admitting that attackers encrypted some of its servers. https://www.bleepingcomputer.com/news/security/japanese-pharma-giant-eisai-discloses-ransomware-attack/

Azure Portal outage was caused by traffic “spike” - Microsoft revealed in an update to the Azure status page that the preliminary root cause behind an outage that impacted the Azure Portal worldwide on Friday was what it described as a traffic "spike." https://www.bleepingcomputer.com/news/microsoft/microsoft-azure-portal-outage-was-caused-by-traffic-spike-/

Barracuda ESG zero-day exploit hits Australia’s ACT Government - The Australian Capital Territory Government is among an estimated 5% of Barracuda Networks’ Email Security Gateway customers who were told to rip-and-replace their appliance following a zero-day bug compromise. https://www.scmagazine.com/news/network-security/barracuda-esg-zero-day-exploit-hits-australias-act-government

Ex-Samsung executive alleged to have stolen tech to recreate chip plant in China - A former executive at Samsung Electronics has been arrested and indicted in South Korea for allegedly stealing the leading chipmaker’s technology in order to build a copycat plant in China. https://arstechnica.com/tech-policy/2023/06/ex-samsung-executive-alleged-to-have-stolen-tech-to-recreate-chip-plant-in-china/

Swiss Fear Government Data Stolen in Cyberattack - Switzerland said Thursday that government operational data might have been stolen in a cyberattack on the technology firm that provides software for several departments. https://www.securityweek.com/swiss-fear-government-data-stolen-in-cyberattack/

Zacks confirms hack, 9M accounts impacted - Zacks Investment Research confirmed Tuesday that an unconfirmed number of Zacks.com customers had their encrypted passwords stolen as part of a prior data breach by an unknown third party. https://www.scmagazine.com/news/data-security/zacks-confirms-iaccount-data-hacked

Return to the top of the newsletter

WEB SITE COMPLIANCE - Reserve Requirements of Depository Institutions (Regulation D)
   
   Pursuant to the withdrawal and transfer restrictions imposed on savings deposits, electronic transfers, electronic withdrawals (paid electronically) or payments to third parties initiated by a depositor from a personal computer are included as a type of transfer subject to the six transaction limit imposed on passbook savings and MMDA accounts.
   
   Institutions also should note that, to the extent stored value or other electronic money represents a demand deposit or transaction account, the provisions of Regulation D would apply to such obligations. 
   
   Consumer Leasing Act (Regulation M)

   
   The regulation provides examples of advertisements that clarify the definition of an advertisement under Regulation M. The term advertisement includes messages inviting, offering, or otherwise generally announcing to prospective customers the availability of consumer leases, whether in visual, oral, print, or electronic media. Included in the examples are on-line messages, such as those on the Internet. Therefore, such messages are subject to the general advertising requirements.


Return to the top of the newsletter

FFIEC IT SECURITY - We continue the series  from the FDIC "Security Risks Associated with the Internet." 
    
    SECURITY MEASURES

    
    Digital Signatures 

    
    Digital signatures authenticate the identity of a sender, through the private, cryptographic key.  In addition, every digital signature is different because it is derived from the content of the message itself. T he combination of identity authentication and singularly unique signatures results in a transmission that cannot be repudiated. 

    
    Digital signatures can be applied to any data transmission, including e-mail.  To generate a digital signature, the original, unencrypted message is run through a mathematical algorithm that generates what is known as a message digest (a unique, character representation of the data).  This process is known as the "hash."  The message digest is then encrypted with a private key, and sent along with the message.  The recipient receives both the message and the encrypted message digest.  The recipient decrypts the message digest, and then runs the message through the hash function again.  If the resulting message digest matches the one sent with the message, the message has not been altered and data integrity is verified.  Because the message digest was encrypted with a private key, the sender can be identified and bound to the specific message.  The digital signature cannot be reused, because it is unique to the message.  In the above example, data privacy and confidentiality could also be achieved by encrypting the message itself. The strength and security of a digital signature system is determined by its implementation, and the management of the cryptographic keys.


Return to the top of the newsletter

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY - We continue the series on the National Institute of Standards and Technology (NIST) Handbook.
  
  Section II. Management Controls Chapter 5
  
  COMPUTER SECURITY POLICY
  
  In discussions of computer security, the term policy has more than one meaning. Policy is senior management's directives to create a computer security program, establish its goals, and assign responsibilities. The term policy is also used to refer to the specific security rules for particular systems. Additionally, policy may refer to entirely different matters, such as the specific managerial decisions setting an organization's e-mail privacy policy or fax security policy. 
  
  Policy means different things to different people. The term "policy" is used in this chapter in a broad manner to refer to important computer security-related decisions.
  
  In this chapter the term computer security policy is defined as the "documentation of computer security decisions"-which covers all the types of policy described above. In making these decisions, managers face hard choices involving resource allocation, competing objectives, and organizational strategy related to protecting both technical and information resources as well as guiding employee behavior. Managers at all levels make choices that can result in policy, with the scope of the policy's applicability varying according to the scope of the manager's authority. In this chapter we use the term policy in a broad manner to encompass all of the types of policy described above-regardless of the level of manager who sets the particular policy.
  
  Managerial decisions on computer security issues vary greatly. To differentiate among various kinds of policy, this chapter categorizes them into three basic types:
  
  1)  Program policy is used to create an organization's computer security program.
  2)  Issue-specific policies address specific issues of concern to the organization.
  3)  System-specific policies focus on decisions taken by management to protect a particular system.
  
  Procedures, standards, and guidelines are used to describe how these policies will be implemented within an organization.
  
  Familiarity with various types and components of policy will aid managers in addressing computer security issues important to the organization. Effective policies ultimately result in the development and implementation of a better computer security program and better protection of systems and information.
  These types of policy are described to aid the reader's understanding. It is not important that one categorizes specific organizational policies into these three categories; it is more important to focus on the functions of each.


PLEASE NOTE:
 
Some of the above links may have expired, especially those from news organizations.  We may have a copy of the article, so please e-mail us at examiner@yennik.com if we can be of assistance.