R. Kinney Williams - Yennik, Inc.®
R. Kinney Williams
Yennik, Inc.

Internet Banking News
Brought to you by Yennik, Inc. the acknowledged leader in Internet auditing for financial institutions.

September 14, 2014

CONTENT Internet Compliance Web Site Audits
IT Security
 
Internet Privacy
 
Penetration Testing
 
Does Your Financial Institution need an affordable Internet security audit?  Yennik, Inc. has clients in 42 states that rely on our penetration testing audits to ensure proper Internet security settings and to meet the independent diagnostic test requirements of FDIC, OCC, FRB, and NCUA, which provides compliance with Gramm-Leach Bliley Act 501(b) The penetration audit and Internet security testing is an affordable-sophisticated process than goes far beyond the simple scanning of ports.  The audit focuses on a hacker's perspective, which will help you identify real-world weaknesses.  For more information, give R. Kinney Williams a call today at 806-798-7119 or visit http://www.internetbankingaudits.com/.


REMINDER -
This newsletter is available for the Android smart phones and tablets.  Go to the Market Store and search for yennik.

FYI - OpenSSL to prenotify distros of severe security fixes - The OpenSSL project has unveiled its first security policy on how the project will handle security fixes, and to whom it will disclose vulnerabilities prior to releases. Given the blowback from the Heartbleed vulnerability revealed earlier this year, the OpenSSL project has released its first security policy that details how the project handles security issues. http://www.zdnet.com/openssl-to-prenotify-distros-of-severe-security-fixes-7000033409/

FYI - Current Awareness of the Cybersecurity Framework - Recognizing the critical importance of widespread voluntary usage of the Framework in order to achieve the goals of the Executive Order, and that usage initially depends upon awareness, NIST solicits information about awareness of the Framework and its intended uses among organizations. https://www.federalregister.gov/articles/2014/08/26/2014-20315/experience-with-the-framework-for-improving-critical-infrastructure-cybersecurity#h-9

FYI - FCC fines Verizon for violating customers' privacy - Verizon is in hot water with federal regulators for showing customers ads based on their personal information without first obtaining consent. http://money.cnn.com/2014/09/03/technology/mobile/verizon-fcc/index.html

FYI - Home Depot is sued following payment card breach - An Illinois Home Depot shopper is suing the home improvement retailer following a breach of its customer payment information. http://www.scmagazine.com/home-depot-is-sued-following-payment-card-breach/article/370853/

ATTACKS, INTRUSIONS, DATA THEFT & LOSS

FYI - Home Depot investigates possible payment card breach - “At this point, I can confirm that we're looking into some unusual activity and we are working with our banking partners and law enforcement to investigate,” according to a statement emailed to SCMagazine.com on Tuesday by Paula Drake, a Home Depot spokesperson.
http://www.scmagazine.com/home-depot-investigates-possible-payment-card-breach/article/369366/
http://arstechnica.com/security/2014/09/home-depot-confirms-breach-but-stays-mum-as-to-size/

FYI - Goodwill announces breach, more than 800K payment cards compromised - In a letter to customers dated Tuesday, Jim Gibbons, president and CEO of Goodwill Industries International (GII), announced that payment card data was accessed following a malware attack on a third-party vendor used in about 10 percent of stores. http://www.scmagazine.com/goodwill-announces-breach-more-than-800k-payment-cards-compromised/article/369837/

FYI - Is Apple Telling All It Knows? - Recently the entire social network world, the general print media, entertainment news TV, and, really, almost every outlet that feels it is in the news business has been awash in articles about the leak of nude and compromising photographs of a large group of celebrities. http://www.darkreading.com/attacks-breaches/celeb-hack-is-apple-telling-all-it-knows/a/d-id/1306923

FYI - Unencrypted thumb drive containing patient data stolen from Duke University Health System - Duke University Health System (DUHS) is notifying an undisclosed number of patients that their personal information was on an unencrypted thumb drive that was stolen from an administrative office on July 1. http://www.scmagazine.com/unencrypted-thumb-drive-containing-patient-data-stolen-from-duke-university-health-system/article/370033/

FYI - Access gained to California university web server storing personal information - More than 6,000 individuals are being notified by California State University, East Bay, that their personal information – including Social Security numbers – may have been compromised by an unknown third-party. http://www.scmagazine.com/access-gained-to-california-university-web-server-storing-personal-information/article/370206/

FYI - National Research Council breached - Canada's National Research Council has written to partner companies informing them of a breach of its cybersecurity systems. http://www.scmagazine.com/national-research-council-breached/article/370202/

FYI - Payment card breach possibly tied to Florida Beef 'O' Brady's locations - The North Port Police Department stated that unauthorized payment card purchases made in Massachusetts, New York and Texas may be tied to Beef ‘O' Brady's sports bar locations in Florida, according to a Tuesday abc-7.com report. http://www.scmagazine.com/payment-card-breach-possibly-tied-to-florida-beef-o-bradys-locations/article/370850/

FYI - Computer hardware containing patient data stolen from Ohio plastic surgery office - More than 6,000 patients of Beachwood-Westlake Plastic Surgery and Medical Spa in Ohio are being notified that their personal information was on computer hardware that was stolen during an office burglary. http://www.scmagazine.com/computer-hardware-containing-patient-data-stolen-from-ohio-plastic-surgery-office/article/370808/

FYI - Google says Gmail credential dump not result of company breach - After Gmail usernames and passwords for nearly five million accounts were leaked online, Google quickly moved to calm user concerns and confirmed that the majority of the credentials wouldn't be very useful to those aiming to hijack accounts with the information. http://www.scmagazine.com/google-says-gmail-credential-dump-not-result-of-company-breach/article/371092/

FYI - Canadian computer dealer claims Ernst & Young breach - While a used computer dealer based in Canada has accused Ernst & Young of a data breach, legal documents filed by the company in court indicate that the company is uncertain that the breach is real, according to a report in Network World. http://www.scmagazine.com/canadian-computer-dealer-claims-ernst-young-breach/article/371104/

FYI - Central Utah Clinic notifies over 30K patients of potential HIPAA breach - More than 30,000 patients of the Central Utah Clinic in Provo, Utah might have had their personal health information viewed by an unauthorized intruder who broke into one of the clinic's servers. http://www.scmagazine.com/central-utah-clinic-notifies-over-30k-patients-of-potential-hipaa-breach/article/370959/

FYI - National Research Council breached - Canada's National Research Council has written to partner companies informing them of a breach of its cybersecurity systems. http://www.scmagazine.com/national-research-council-breached/article/370202/

Return to the top of the newsletter

WEB SITE COMPLIANCE -
We continue covering some of the issues discussed in the "Risk Management Principles for Electronic Banking" published by the Basel Committee on Bank Supervision.
 
 While the Board of Directors has the responsibility for ensuring that appropriate security control processes are in place for e-banking, the substance of these processes needs special management attention because of the enhanced security challenges posed by e-banking.
  Over the next number of weeks we will cover the principles of Security Controls.
 
 Security Controls - P
rinciple 1: Banks should take appropriate measures to authenticate the identity and authorization of customers with whom it conducts business over the Internet. (Part 1 of 2)
 
 It is essential in banking to confirm that a particular communication, transaction, or access request is legitimate. Accordingly, banks should use reliable methods for verifying the identity and authorization of new customers as well as authenticating the identity and authorization of established customers seeking to initiate electronic transactions.
 
 Customer verification during account origination is important in reducing the risk of identity theft, fraudulent account applications and money laundering. Failure on the part of the bank to adequately authenticate customers could result in unauthorized individuals gaining access to e-banking accounts and ultimately financial loss and reputational damage to the bank through fraud, disclosure of confidential information or inadvertent involvement in criminal activity.
 
 Establishing and authenticating an individual's identity and authorization to access banking systems in a purely electronic open network environment can be a difficult task. Legitimate user authorization can be misrepresented through a variety of techniques generally known as "spoofing." Online hackers can also take over the session of a legitimate authorized individual through use of a "sniffer" and carry out activities of a mischievous or criminal nature. Authentication control processes can in addition be circumvented through the alteration of authentication databases.
 
 Accordingly, it is critical that banks have formal policy and procedures identifying appropriate methodology(ies) to ensure that the bank properly authenticates the identity and authorization of an individual, agent or system by means that are unique and, as far as practical, exclude unauthorized individuals or systems. Banks can us a variety of methods to establish authentication, including PINs, passwords, smart cards, biometrics, and digital certificates. These methods can be either single factor or multi-factor (e.g. using both a password and biometric technology to authenticate). Multi-factor authentication generally provides stronger assurance.

Return to the top of the newsletter

INFORMATION TECHNOLOGY SECURITY
-
We continue our series on the FFIEC interagency Information Security Booklet.  
 
 
SYSTEMS DEVELOPMENT, ACQUISITION, AND MAINTENANCE - SOFTWARE DEVELOPMENT AND ACQUISITION
 
 Outsourced Development
 
 Many financial institutions outsource software development to third parties. Numerous vendor management issues exist when outsourcing software development. The vendor management program established by management should address the following:
 
 ! Verifying credentials and contracting only with reputable providers;
 ! Evaluating the provider's secure development environment, including background checks on its employees and code development and testing processes;
 ! Obtaining fidelity coverage;
 ! Requiring signed nondisclosure agreements to protect the financial institution's rights to source code and customer data as appropriate;
 ! Establishing security requirements, acceptance criterion, and test plans;
 ! Reviewing and testing source code for security vulnerabilities, including covert channels or backdoors that might obscure unauthorized access into the system;
 ! Restricting any vendor access to production source code and systems and monitoring their access to development systems; and
 ! Performing security tests to verify that the security requirements are met before implementing the software in production.


Return to the top of the newsletter

INTERNET PRIVACY
We continue our series listing the regulatory-privacy examination questions.  When you answer the question each week, you will help ensure compliance with the privacy regulations.
 
 Examination Procedures (Part 1 of 3)
 
 
A. Through discussions with management and review of available information, identify the institution's information sharing practices (and changes to those practices) with affiliates and nonaffiliated third parties; how it treats nonpublic personal information; and how it administers opt-outs. Consider the following as appropriate:
 
 1)  Notices (initial, annual, revised, opt out, short-form, and simplified);
 
 2)  Institutional privacy policies and procedures, including those to: 
      a)  process requests for nonpublic personal information, including requests for aggregated data; 
      b)  deliver notices to consumers; manage consumer opt out directions (e.g., designating files, allowing a reasonable time to opt out, providing new opt out and privacy notices when necessary, receiving opt out directions, handling joint account holders); 
      c)  prevent the unlawful disclosure and use of the information received from nonaffiliated financial institutions; and 
      d)  prevent the unlawful disclosure of account numbers;
 
 3)  Information sharing agreements between the institution and affiliates and service agreements or contracts between the institution and nonaffiliated third parties either to obtain or provide information or services;
 
 4)  Complaint logs, telemarketing scripts, and any other information obtained from nonaffiliated third parties (Note: review telemarketing scripts to determine whether the contractual terms set forth under section 13 are met and whether the institution is disclosing account number information in violation of section 12);
 
 5)  Categories of nonpublic personal information collected from or about consumers in obtaining a financial product or service (e.g., in the application process for deposit, loan, or investment products; for an over-the-counter purchase of a bank check; from E-banking products or services, including the data collected electronically through Internet cookies; or through ATM transactions);
 
 6)  Categories of nonpublic personal information shared with, or received from, each nonaffiliated third party; and
 
 7)  Consumer complaints regarding the treatment of nonpublic personal information, including those received electronically.
 
 8)  Records that reflect the bank's categorization of its information sharing practices under Sections 13, 14, 15, and outside of these exceptions.
 
 9)  Results of a 501(b) inspection (used to determine the accuracy of the institution's privacy disclosures regarding data security).

 

PLEASE NOTE:  Some of the above links may have expired, especially those from news organizations.  We may have a copy of the article, so please e-mail us at examiner@yennik.com if we can be of assistance.  



Company Information
Yennik, Inc.

4409 101st Street
Lubbock, Texas 79424
Office 806-798-7119
Examiner@yennik.com

 

Please visit our other web sites:
VISTA penetration-vulnerability testing
The Community Banker - Bank FFIEC & ADA Web Site Audits
Credit Union FFIEC & ADA Web Site Audits - Bank Auditing Services
US Banks on the Internet  
US Credit Unions on the Internet

All rights reserved; Our logo is registered with the United States Patent and Trademark Office.
Terms and Conditions, Privacy Statement, © Copyright Yennik, Incorporated