R. Kinney Williams - Yennik, Inc.
R. Kinney Williams
Yennik, Inc.

Internet Banking News
Brought to you by Yennik, Inc. the acknowledged leader in Internet auditing for financial institutions.

Remote offsite and Onsite FFIEC IT Audits

July 11, 2021

Newsletter Content FFIEC IT Security FFIEC & ADA Web Site Audits
Web Site Compliance NIST Handbook Penetration Testing
Does Your Financial Institution need an affordable cybersecurity Internet security audit?  Yennik, Inc. has clients in 42 states that rely on our cybersecurity audits to ensure proper Internet security settings and to meet the independent diagnostic test requirements of FDIC, OCC, FRB, and NCUA, which provides compliance with Gramm-Leach Bliley Act 501(b) as well as the penetration test complies with the FFIEC Cybersecurity Assessment Tool regarding resilience testing The cybersecurity penetration audit and Internet security testing is an affordable-sophisticated process than goes far beyond the simple scanning of ports.  The audit focuses on a hacker's perspective, which will help you identify real-world cybersecurity weaknesses.  For more information, give R. Kinney Williams a call today at Office/Cell 806-535-8300 or visit http://www.internetbankingaudits.com/.
Virtual/remote IT audits - I am performing virtual/remote FFIEC IT audits for banks and credit unions.  I am a former bank examiner with 40 years of IT auditing experience.  Please contact R. Kinney Williams at examiner@yennik.com from your bank's email and I will send you information and fees.  All correspondence is confidential.

FYI - New data security rules instituted for US payment processing system - New data security rules governing how money changes hands in the US have gone into effect today, forcing major digital money processors to render deposit account information unreadable in electronic storage.
https://www.nacha.org/rules/supplementing-data-security-requirements-phase-1
https://www.zdnet.com/article/new-data-security-rules-instituted-for-us-payment-processing-system/

Ransomware: To pay or not to pay - As ransomware attacks continue to plague organizations at an increasing and alarming rate, business leaders are faced with an impossible challenge. https://www.scmagazine.com/perspectives/ransomware-to-pay-or-not-to-pay-2/

Health care organizations struggle to balance breach notification requirements with customer expectations - Navigating a breach response, managing the public relations crisis that often results, and eradicating hackers from the network takes a careful balance of requirements and a capable incident response team. https://www.scmagazine.com/home/security-news/data-breach/health-care-organizations-struggle-to-balance-breach-notification-requirements-with-customer-expectations/

Research partnership to examine how fraudsters abuse financial tech innovations - Financial tech innovations such as peer-to-peer (P2P) payment apps and digital wallets have introduced convenient new ways to execute financial transactions, but they have also opened up new doors for cybercriminals to take advantage. https://www.scmagazine.com/home/finance/research-partnership-to-examine-how-fraudsters-abuse-financial-tech-innovations/

Feds file new charges against Amazon employee that leveraged server access to hack Capital One - The accused hacker and former Amazon employee who now stands charged of breaking into Capital One accounts and stealing the personal data of some 100 million of the company’s customers. https://www.scmagazine.com/home/security-news/feds-file-new-charges-against-amazon-employee-that-leveraged-server-access-to-hack-capital-one/

New data security rules instituted for US payment processing system - New data security rules governing how money changes hands in the US have gone into effect today, forcing major digital money processors to render deposit account information unreadable in electronic storage.
https://www.nacha.org/rules/supplementing-data-security-requirements-phase-1
https://www.zdnet.com/article/new-data-security-rules-instituted-for-us-payment-processing-system/

Ransomware: This new free tool lets you test if your cybersecurity is strong enough to stop an attack - ISA's Ransomware Readiness Assessment allows organisations to test how well their networks can protect against and recover from ransomware attacks - and provides advice on improvements. https://www.zdnet.com/article/ransomware-this-new-free-tool-lets-you-test-if-your-cybersecurity-is-strong-enough-to-stop-an-attack/

1 in 4 employees say they still have access to accounts from past jobs, survey finds - Nearly half of professionals also admit to sharing passwords and more than a third say they write them on paper, according to Beyond Identity. https://www.techrepublic.com/article/1-in-4-employees-say-they-still-have-access-to-accounts-from-past-jobs-survey-finds/

Cybersecurity companies are selling like hotcakes in post-pandemic investment market - For many industries, the pandemic was a time of economic uncertainty, great technological change and reflection about where they and their services fit into a post-COVID reality. https://www.scmagazine.com/home/security-news/corporate-news/investment/cybersecurity-companies-are-selling-like-hotcakes-in-post-pandemic-investment-market/


ATTACKS, INTRUSIONS, DATA THEFT & LOSS

FYI - Dominion National reaches $2M settlement over nine-year data breach - Insurance giant Dominion National reached a $2 million settlement with the 2.9 million patients affected by its nine-year data breach, first reported in 2019. https://www.scmagazine.com/home/health-care/dominion-national-reaches-2m-settlement-over-nine-year-data-breach/

As Kaseya works to bring SaaS servers online, experts laud precautionary measures as ‘opposite of complacency’ - Kaseya began the technical work for deployment of the company’s servers that support the software-as-a-service VSA product, configuring an additional layer of security to the SaaS infrastructure. https://www.scmagazine.com/home/security-news/as-kaseya-works-to-bring-servers-online-experts-laud-precautionary-measures-taken-as-opposite-of-complacency

Phishing attack targets DocuSign and SharePoint users - Researchers reported on Friday that cybercriminals are mimicking legitimate correspondence to actively target popular cloud applications DocuSign and SharePoint in phishing attacks designed to steal user log-in credentials. https://www.scmagazine.com/home/security-news/phishing-attack-targets-docusign-and-sharepoint-users/

NewsBlur restores service in 10 hours after ransomware attack - Turns out the recent story about the personal news reader NewsBlur being down for several hours last week following a data exposure has a happy ending: the owner retained an original copy of the database that was compromised and restored the service in 10 hours. https://www.scmagazine.com/home/security-news/ransomware/newsblur-hit-by-ransomware-because-of-docker-glitch-but-restores-service-in-10-hours/


Return to the top of the newsletter

WEB SITE COMPLIANCE - We continue our review of the FDIC paper "Risk Assessment Tools and Practices or Information System Security." 
   
   INTRUSION DETECTION SYSTEMS
   
   Vulnerability assessments and penetration analyses help ensure that appropriate security precautions have been implemented and that system security configurations are appropriate. The next step is to monitor the system for intrusions and unusual activities. Intrusion detection systems (IDS) may be useful because they act as a burglar alarm, reporting potential intrusions to appropriate personnel. By analyzing the information generated by the systems being guarded, IDS help determine if necessary safeguards are in place and are protecting the system as intended. In addition, they can be configured to automatically respond to intrusions.
   
   Computer system components or applications can generate detailed, lengthy logs or audit trails that system administrators can manually review for unusual events. IDS automate the review of logs and audit data, which increases the reviews' overall efficiency by reducing costs and the time and level of skill necessary to review the logs.
   
   Typically, there are three components to an IDS. First is an agent, which is the component that actually collects the information. Second is a manager, which processes the information collected by the agents. Third is a console, which allows authorized information systems personnel to remotely install and upgrade agents, define intrusion detection scenarios across agents, and track intrusions as they occur. Depending on the complexity of the IDS, there can be multiple agent and manager components.
   
   Generally, IDS products use three different methods to detect intrusions. First, they can look for identified attack signatures, which are streams or patterns of data previously identified as an attack. Second, they can look for system misuse such as unauthorized attempts to access files or disallowed traffic inside the firewall. Third, they can look for activities that are different from the users or systems normal pattern. These "anomaly-based" products (which use artificial intelligence) are designed to detect subtle changes or new attack patterns, and then notify appropriate personnel that an intrusion may be occurring. Some anomaly-based products are created to update normal use patterns on a regular basis. Poorly designed anomaly-based products can trigger frequent false-positive responses.
   
   Although IDS may be an integral part of an institutions overall system security, they will not protect a system from previously unknown threats or vulnerabilities. They are not self-sufficient and do not compensate for weak authentication procedures (e.g., when an intruder already knows a password to access the system). Also, IDS often have overlapping features with other security products, such as firewalls. IDS provide additional protections by helping to determine if the firewall programs are working properly and by helping to detect internal abuses. Both firewalls and IDS need to be properly configured and updated to combat new types of attacks. In addition, management should be aware that the state of these products is highly dynamic and IDS capabilities are evolving.
   
   IDS tools can generate both technical and management reports, including text, charts, and graphs. The IDS reports can provide background information on the type of attack and recommend courses of action. When an intrusion is detected, the IDS can automatically begin to collect additional information on the attacker, which may be needed later for documentation purposes.
   
   FYI - Please remember that we perform vulnerability-penetration studies and would be happy to e-mail your company a proposal. E-mail Kinney Williams at examiner@yennik.com for more information.

Return to the top of the newsletter

FFIEC IT SECURITY - We continue our series on the FFIEC interagency Information Security Booklet.  
   
   SECURITY CONTROLS - IMPLEMENTATION
   

   LOGICAL AND ADMINISTRATIVE ACCESS CONTROL 
   
   The goal of logical and administrative access control is to restrict access to system resources. Access should be provided only to authorized individuals whose identity is established, and their activities should be limited to the minimum required for business purposes. Authorized individuals (users) may be employees, TSP employees, vendors, contractors, customers, or visitors.
   
   An effective control mechanism includes numerous controls to safeguard and limit access to key information system assets. This section addresses logical and administrative controls, including access rights administration and authentication through network, operating system, application, and remote access. A subsequent section addresses physical security controls.
   
   ACCESS RIGHTS ADMINISTRATION (1 of 5)
   
   Action Summary - Financial institutions should have an effective process to administer access rights. The process should include the following controls:
   
   1)  Assign users and system resources only the access required to perform their required functions,
   
   2)  Update access rights based on personnel or system changes,
   
   3)  Periodically review users' access rights at an appropriate frequency based on the risk to the application or system, and
   
   4)  Design appropriate acceptable-use policies and require users to sign them.


Return to the top of the newsletter

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY - We continue the series on the National Institute of Standards and Technology (NIST) Handbook.
  
  Chapter 15 - PHYSICAL AND ENVIRONMENTAL SECURITY
  
  15.3 Failure of Supporting Utilities
   
  Systems and the people who operate them need to have a reasonably well-controlled operating environment. Consequently, failures of heating and air-conditioning systems will usually cause a service interruption and may damage hardware. These utilities are composed of many elements, each of which must function properly.
  
  For example, the typical air-conditioning system consists of (1) air handlers that cool and humidify room air, (2) circulating pumps that send chilled water to the air handlers, (3) chillers that extract heat from the water, and (4) cooling towers that discharge the heat to the outside air. Each of these elements has a mean-time-between-failures (MTBF) and a mean-time-to-repair (MTTR). Using the MTBF and MTTR values for each of the elements of a system, one can estimate the occurrence rate of system failures and the range of resulting service interruptions.
  
  This same line of reasoning applies to electric power distribution, heating plants, water, sewage, and other utilities required for system operation or staff comfort. By identifying the failure modes of each utility and estimating the MTBF and MTTR, necessary failure threat parameters can be developed to calculate the resulting risk. The risk of utility failure can be reduced by substituting units with lower MTBF values. MTTR can be reduced by stocking spare parts on site and training maintenance personnel. And the outages resulting from a given MTBF can be reduced by installing redundant units under the assumption that failures are distributed randomly in time. Each of these strategies can be evaluated by comparing the reduction in risk with the cost to achieve it.
  
  15.4 Structural Collapse
  
  A building may be subjected to a load greater than it can support. Most commonly this is a result of an earthquake, a snow load on the roof beyond design criteria, an explosion that displaces or cuts structural members, or a fire that weakens structural members. Even if the structure is not completely demolished, the authorities may decide to ban its further use, sometimes even banning entry to remove materials. This threat applies primarily to high-rise buildings and those with large interior spaces without supporting columns.


PLEASE NOTE:
 
Some of the above links may have expired, especially those from news organizations.  We may have a copy of the article, so please e-mail us at examiner@yennik.com if we can be of assistance.