FYI - Data losses push
businesses to encrypt backup tapes - The loss of personal data of
millions of consumers is prompting companies to embrace security
technology they have neglected.
http://www.usatoday.com/tech/news/2005-06-13-encrypt-usat_x.htm
FYI - Two PCs with
Motorola staff data stolen - Two computers containing personal
information on Motorola employees were stolen from the mobile phone
maker's human resources services provider, Affiliated Computer
Services, the latest in a series of incidents of companies losing
control of employee data.
http://news.com.com/2102-1029_3-5743173.html?tag=st.util.print
http://www.computerworld.com/printthis/2005/0,4814,102458,00.html
FYI - Feds miss mark on
security reporting - Federal agencies need more detailed
instructions to handle and report computer security threats, such as
phishing, spyware and hacking, government auditors said in a report
released today.
http://www.fcw.com/article89234-06-13-05-Web
FYI - GAO - Information
Security: Emerging Cybersecurity Issues Threaten Federal Information
Systems.
Report -
http://www.gao.gov/cgi-bin/getrpt?GAO-05-231
Highlights -
http://www.gao.gov/highlights/d05231high.pdf
FYI - Password safety
'foreign' to most staff - Nearly half of all IT managers have major
concerns about the level of password management within their
company, a report has revealed.
http://www.scmagazine.com/news/index.cfm?fuseaction=newsDetails&newsUID=9b0ef21e-c102-4950-bda4-f7302c8625c4&newsType=Latest%20News&s=n
FYI -
How to Protect Against Anonymous User Connections - Developing an
audit program that monitors anonymous connections can help prevent
external threats to computer systems. Many organizations may not be
aware they are leaving their networks open to hackers, virus
writers, and unauthorized insiders. The culprit: anonymous user
connections.
http://www.theiia.org/itaudit/index.cfm?fuseaction=forum&fid=5622
FYI -
Utah bank says big breach put its data at risk - A small bank in
Utah is the latest company to become entangled in the controversy
over a security breach that has put personal data on 40 million
cardholders at risk for fraud.
http://news.com.com/2102-1029_3-5758882.html?tag=st.util.print
FYI -
Details emerge on credit card breach - More details emerged Monday
on the cyberbreak-in at a payment processing company that exposed
more than 40 million credit card accounts to fraud.
http://news.com.com/2102-7349_3-5754661.html?tag=st.util.print
Return to the top
of the newsletter
WEB SITE COMPLIANCE -
Reserve
Requirements of Depository Institutions (Regulation D)
Pursuant to the withdrawal and transfer restrictions imposed on
savings deposits, electronic transfers, electronic withdrawals (paid
electronically) or payments to third parties initiated by a
depositor from a personal computer are included as a type of
transfer subject to the six transaction limit imposed on passbook
savings and MMDA accounts.
Institutions also should note that, to the extent stored value or
other electronic money represents a demand deposit or transaction
account, the provisions of Regulation D would apply to such
obligations.
Consumer Leasing Act (Regulation M)
The regulation provides examples of advertisements that clarify the
definition of an advertisement under Regulation M. The term
advertisement includes messages inviting, offering, or otherwise
generally announcing to prospective customers the availability of
consumer leases, whether in visual, oral, print, or electronic
media. Included in the examples are on-line messages, such as those
on the Internet. Therefore, such messages are subject to the general
advertising requirements.
Return to
the top of the newsletter
INFORMATION TECHNOLOGY SECURITY - We
continue the series
from the FDIC "Security Risks Associated with the
Internet."
SECURITY MEASURES
System Architecture and Design
Measures to address access control and system security start with
the appropriate system architecture. Ideally, if an Internet
connection is to be provided from within the institution, or a Web
site established, the connection should be entirely separate from
the core processing system. If the Web site is placed on its own
server, there is no direct connection to the internal computer
system. However, appropriate firewall technology may be necessary to
protect Web servers and/or internal systems.
Placing a "screening router" between the firewall and other
servers provides an added measure of protection, because requests
could be segregated and routed to a particular server (such as a
financial information server or a public information server).
However, some systems may be considered so critical, they should be
completely isolated from all other systems or networks.
Security can also be enhanced by sending electronic
transmissions from external sources to a machine that is not
connected to the main operating system.
Return to
the top of the newsletter
IT SECURITY QUESTION:
IT insurance maintained:
a. Blanket bond
b. Equipment and Facilities insurance
c. Media Reconstruction insurance
d. Electronic Funds Transfer insurance
e. Business Interruptions insurance
f. Errors and Omissions insurance
g. Extra Expense and/or Backup Site Expense insurance
h. Items in Transit insurance
i. Internet banking coverage
Return to the top of
the newsletter
INTERNET PRIVACY - We continue our
series listing the regulatory-privacy examination questions.
When you answer the question each week, you will help ensure
compliance with the privacy regulations.
27. If each joint consumer may
opt out separately, does the institution permit:
a. one joint consumer to opt out on behalf of all of the joint
consumers; [§7(d)(3)]
b. the joint consumers to notify the institution in a single
response; [§7(d)(5)] and
c. each joint consumer to opt out either for himself or herself,
and/or for another joint consumer? [§7(d)(5)]
VISTA - Does
{custom4} need an affordable Internet security
penetration-vulnerability test?
Our clients in 41 states rely on
VISTA
to ensure their IT security settings, as well as
meeting the independent diagnostic test
requirements of FDIC, OCC, OTS, FRB, and NCUA, which provides
compliance with
Gramm-Leach Bliley Act 501(b).
The VISTA penetration study and
Internet security test is an affordable-sophisticated process than
goes far beyond the simple
scanning of ports and
testing focuses on
a hacker's perspective, which will help
you identify real-world weaknesses. For more information, give Kinney Williams a call
today at 806-798-7119 or visit
http://www.internetbankingaudits.com/. |