R. Kinney Williams - Yennik, Inc.
R. Kinney Williams
Yennik, Inc.

Internet Banking News
Brought to you by Yennik, Inc. the acknowledged leader in Internet auditing for financial institutions.

Remote offsite and Onsite FFIEC IT Audits

July 2, 2023

Newsletter Content FFIEC IT Security FFIEC & ADA Web Site Audits
Web Site Compliance NIST Handbook Penetration Testing
Does Your Financial Institution need an affordable cybersecurity Internet security audit?  Yennik, Inc. has clients in 42 states that rely on our cybersecurity audits to ensure proper Internet security settings and to meet the independent diagnostic test requirements of FDIC, OCC, FRB, and NCUA, which provides compliance with Gramm-Leach Bliley Act 501(b) as well as the penetration test complies with the FFIEC Cybersecurity Assessment Tool regarding resilience testing The cybersecurity penetration audit and Internet security testing is an affordable-sophisticated process than goes far beyond the simple scanning of ports.  The audit focuses on a hacker's perspective, which will help you identify real-world cybersecurity weaknesses.  For more information, give R. Kinney Williams a call today at Office/Cell 806-535-8300 or visit http://www.internetbankingaudits.com/.
FFIEC IT audits - I am performing FFIEC IT audits for banks and credit unions.  I am a former bank examiner with years of IT auditing experience.  Please contact R. Kinney Williams at examiner@yennik.com from your bank's email and I will send you information and fees.  All correspondence is confidential.


MISCELLANEOUS CYBERSECURITY NEWS:

Malicious USB drives part of new self-propagating malware campaign - Researchers discovered a new variant of a self-propagating malware actively being spread via USB drives by what they say are China state-backed advanced persistent threat (APT) operation dubbed Camaro Dragon. https://www.scmagazine.com/news/threat-intelligence/usb-drives-self-propagating-malware

JP Morgan accidentally deletes evidence in multi-million record retention screwup - JP Morgan has been fined $4 million by America's securities watchdog, the SEC, for deleting millions of email records dating from 2018 relating to its Chase Bank subsidiary. https://www.theregister.com/2023/06/26/jp_morgan_fined_for_deleting/

SEC Alleges SolarWinds CFO, CISO Violated US Securities Laws - The Austin, Texas-based IT infrastructure management vendor revealed late Friday that "certain current and former executive officers and employees" targeted by the SEC for their role in responding to the Russian hack of the Orion network monitoring product. https://www.govinfosecurity.com/sec-alleges-solarwinds-cfo-ciso-violated-us-securities-laws-a-22367

Hundreds of federal network devices fail new CISA security requirements - U.S. federal agencies are running hundreds of remotely accessible management interfaces that don’t meet recently mandated security requirements, according to Censys researchers. https://www.scmagazine.com/news/critical-infrastructure/federal-network-fail-cisa-security-requirements

CYBERSECURITY ATTACKS, INTRUSIONS, DATA THEFT & LOSS:

Oreo cookie maker says crooks gobbled up staff info - Mondelez International has warned 51,000 of its past and present employees that their personal information has been stolen from a law firm hired by the Oreo and Ritz cracker giant. https://www.theregister.com/2023/06/20/mondelez_third_party_breach/

Data leak at major law firm sets Australia's government and elites scrambling - An infosec incident at a major Australian law firm has sparked fear among the nation's governments, banks and businesses – and a free speech debate. https://www.theregister.com/2023/06/20/hwl_ebsworth_cyber_incident/

Norton Parent Says Employee Data Stolen in MOVEit Ransomware Attack - Gen Digital, the company behind known cybersecurity brands such as Avast, Avira, AVG, Norton, and LifeLock, has confirmed that employee’s personal information was compromised in the recent MOVEit ransomware attack. https://www.securityweek.com/norton-parent-says-employee-data-stolen-in-moveit-ransomware-attack/

SolarWinds CISO and CFO are focus of SEC’s Orion investigation - SolarWinds’ chief financial officer and chief information security officer have been told they—along with the company—could face civil enforcement action in the wake of the notorious 2020 Orion breach. https://www.scmagazine.com/news/leadership/solarwinds-ciso-and-cfo-are-focus-of-secs-orion-investigation

Suncor Energy cyberattack impacts Petro-Canada gas stations - Petro-Canada gas stations across Canada are impacted by technical problems preventing customers from paying with credit card or rewards points as its parent company, Suncor Energy, discloses they suffered a cyberattack.https://www.bleepingcomputer.com/news/security/suncor-energy-cyberattack-impacts-petro-canada-gas-stations/
 
American and Southwest Airlines pilot candidate data exposed - A vendor that operates a pilot recruitment platform used by major airlines exposed the personal files of more than 8,000 pilot and cadet applicants at American Airlines and Southwest Airlines. https://www.theregister.com/2023/06/26/american_southwest_airline_breach/

Biggest Healthcare Data Breaches Reported This Year, So Far - The biggest healthcare data breaches reported this year so far have impacted more than 39 million individuals collectively. https://healthitsecurity.com/features/biggest-healthcare-data-breaches-reported-this-year-so-far

Hackers steal data of 45,000 New York City students in MOVEit breach - The New York City Department of Education (NYC DOE) says hackers stole documents containing the sensitive personal information of up to 45,000 students from its MOVEit Transfer server. https://www.bleepingcomputer.com/news/security/hackers-steal-data-of-45-000-new-york-city-students-in-moveit-breach/

CISOs say they’re concerned with lawsuits, supply chain and API security in survey - The rapid adoption of digitization for online and mobile services has created unforeseen security risks, said nearly 90% of the 300 cybersecurity leaders surveyed worldwide in a new report. https://www.scmagazine.com/news/business-continuity/cisos-say-theyre-concerned-with-lawsuits-supply-chain-and-api-security-in-survey

Return to the top of the newsletter

WEB SITE COMPLIANCE - "Member FDIC" Logo - When is it required?
   

   The FDIC believes that every bank's home page is to some extent an advertisement. Accordingly, bank web site home pages should contain the official advertising statement unless the advertisement is subject to exceptions such as advertisements for loans, securities, trust services and/or radio or television advertisements that do not exceed thirty seconds. 
   
   Whether subsidiary web pages require the official advertising statement will depend upon the content of the particular page.  Subsidiary web pages that advertise deposits must contain the official advertising statement.  Conversely, subsidiary web pages that relate to loans do not require the official advertising statement.


Return to the top of the newsletter

FFIEC IT SECURITY - We continue the series  from the FDIC "Security Risks Associated with the Internet." 
    
    SECURITY MEASURES

    
    System Architecture and Design 

    
    Measures to address access control and system security start with the appropriate system architecture. Ideally, if an Internet connection is to be provided from within the institution, or a Web site established, the connection should be entirely separate from the core processing system. If the Web site is placed on its own server, there is no direct connection to the internal computer system. However, appropriate firewall technology may be necessary to protect Web servers and/or internal systems. 

    
    Placing a "screening router" between the firewall and other servers provides an added measure of protection, because requests could be segregated and routed to a particular server (such as a financial information server or a public information server). However, some systems may be considered so critical, they should be completely isolated from all other systems or networks.  Security can also be enhanced by sending electronic transmissions from external sources to a machine that is not connected to the main operating system.


Return to the top of the newsletter

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY - We continue the series on the National Institute of Standards and Technology (NIST) Handbook.
 
 Section II. Management Controls Chapter 5 - COMPUTER SECURITY POLICY
 
 5.1 Program Policy
 
 A management official, normally the head of the organization or the senior administration official, issues program policy to establish (or restructure) the organization's computer security program and its basic structure. This high-level policy defines the purpose of the program and its scope within the organization; assigns responsibilities (to the computer security organization) for direct program implementation, as well as other responsibilities to related offices (such as the Information Resources Management [IRM] organization); and addresses compliance issues.
 
 Program policy sets organizational strategic directions for security and assigns resources for its implementation.
 
 5.1.1 Basic Components of Program Policy
 
 Components of program policy should address:
 
 Purpose. Program policy normally includes a statement describing why the program is being established. This may include defining the goals of the program. Security-related needs, such as integrity, availability, and confidentiality, can form the basis of organizational goals established in policy. For instance, in an organization responsible for maintaining large mission-critical databases, reduction in errors, data loss, data corruption, and recovery might be specifically stressed. In an organization responsible for maintaining confidential personal data, however, goals might emphasize stronger protection against unauthorized disclosure.
 
 Scope. Program policy should be clear as to which resources-including facilities, hardware, and software, information, and personnel - the computer security program covers. In many cases, the program will encompass all systems and organizational personnel, but this is not always true. In some instances, it may be appropriate for an organization's computer security program to be more limited in scope.
 
 Responsibilities. Once the computer security program is established, its management is normally assigned to either a newly-created or existing office.
 
 Program policy establishes the security program and assigns program management and supporting responsibilities
 
 The responsibilities of officials and offices throughout the organization also need to be addressed, including line managers, applications owners, users, and the data processing or IRM organizations. This section of the policy statement, for example, would distinguish between the responsibilities of computer services providers and those of the managers of applications using the provided services. The policy could also establish operational security offices for major systems, particularly those at high risk or most critical to organizational operations. It also can serve as the basis for establishing employee accountability.
 
 At the program level, responsibilities should be specifically assigned to those organizational elements and officials responsible for the implementation and continuity of the computer security policy.
 
 Compliance. Program policy typically will address two compliance issues:
 
 1)  General compliance to ensure meeting the requirements to establish a program and the responsibilities assigned therein to various organizational components. Often an oversight office (e.g., the Inspector General) is assigned responsibility for monitoring compliance, including how well the organization is implementing management's priorities for the program.
 
 2)  The use of specified penalties and disciplinary actions. Since the security policy is a high-level document, specific penalties for various infractions are normally not detailed here; instead, the policy may authorize the creation of compliance structures that include violations and specific disciplinary action(s).
 
 Those developing compliance policy should remember that violations of policy can be unintentional on the part of employees. For example, nonconformance can often be due to a lack of knowledge or training.


PLEASE NOTE:
 
Some of the above links may have expired, especially those from news organizations.  We may have a copy of the article, so please e-mail us at examiner@yennik.com if we can be of assistance.