R. Kinney Williams - Yennik, Inc.
R. Kinney Williams
Yennik, Inc.

Internet Banking News
Brought to you by Yennik, Inc. the acknowledged leader in Internet auditing for financial institutions.

Remote offsite and Onsite FFIEC IT Audits

September 19, 2021

Newsletter Content FFIEC IT Security FFIEC & ADA Web Site Audits
Web Site Compliance NIST Handbook Penetration Testing
Does Your Financial Institution need an affordable cybersecurity Internet security audit?  Yennik, Inc. has clients in 42 states that rely on our cybersecurity audits to ensure proper Internet security settings and to meet the independent diagnostic test requirements of FDIC, OCC, FRB, and NCUA, which provides compliance with Gramm-Leach Bliley Act 501(b) as well as the penetration test complies with the FFIEC Cybersecurity Assessment Tool regarding resilience testing The cybersecurity penetration audit and Internet security testing is an affordable-sophisticated process than goes far beyond the simple scanning of ports.  The audit focuses on a hacker's perspective, which will help you identify real-world cybersecurity weaknesses.  For more information, give R. Kinney Williams a call today at Office/Cell 806-535-8300 or visit http://www.internetbankingaudits.com/.
FYI - Younger remote workers see security as a hindrance - The hybrid workplace model that many organizations undertook during the COVID-19 pandemic isn’t going away anytime soon. https://www.scmagazine.com/news/training/younger-remote-workers-see-security-as-a-hindrance

SEC sanctions financial firms for cybersecurity failures - The U.S. Securities and Exchange Commission charged three financial services companies for failing to uphold cybersecurity procedures, which resulted in the exposure of thousands of customers' personal information. https://searchsecurity.techtarget.com/news/252506068/SEC-sanctions-financial-firms-for-cybersecurity-failures

ProtonMail CEO says services must comply with laws unless based 15 miles offshore - After ProtoMail gave a climate activist's IP address to French authorities under court order, the individual was identified and arrested shortly after. https://www.zdnet.com/article/protonmail-ceo-says-services-must-comply-with-laws-unless-based-15-miles-offshore/

How the Biden administration is structured to respond to threats in cyberspace - The onset of the Biden administration has brought big changes to the way cybersecurity roles and authorities are dispersed and coordinated throughout the federal government, and not just because of the usual turnover that happens when the White House switches parties. https://www.scmagazine.com/analysis/policy/how-the-biden-administration-is-structured-to-respond-to-threats-in-cyberspace

Nebraska pediatric provider to pay OCR $80K for HIPAA Right of Access failure - The Department of Health and Human Services Office for Civil Rights announced it reached a settlement with Children's Hospital & Medical Center to resolve potential violations of The Health Insurance Portability and Accountability Act Privacy Rule’s Right of Access standard. https://www.scmagazine.com/analysis/privacy/nebraska-pediatric-provider-to-pay-ocr-80k-for-hipaa-right-of-access-failure

Why ransomware attacks in healthcare remain a problem – and how to stop them - If data has value, then electronic health records are a treasure trove. Today’s emboldened and ever-more-sophisticated cyber criminals know this. https://www.scmagazine.com/perspective/phishing/why-ransomware-attacks-in-healthcare-remains-a-problem-and-how-to-stop-them

University of Minnesota launches Center for Medical Device Cybersecurity - The University of Minnesota is proud to announce its new Center for Medical Device Cybersecurity (CMDC). The center will foster university-industry-government collaborations to ensure that medical devices are both safe and secure from the growing number of cybersecurity threats. https://twin-cities.umn.edu/news-events/university-minnesota-launches-center-medical-device-cybersecurity

New online marketplace helps companies improve their eligibility for cyber insurance - Cyber insurance firm Cowbell Cyber today launched what it is billing as the first-ever cyber risk exchange marketplace, designed to help companies find solutions that reduce their risk and thus make them more easily insurable. https://www.scmagazine.com/analysis/network-security/new-online-marketplace-helps-companies-improve-their-eligibility-for-cyber-insurance


ATTACKS, INTRUSIONS, DATA THEFT & LOSS

FYI - Malicious Actor Discloses FortiGate SSL-VPN Credentials - Fortinet has become aware that a malicious actor has recently disclosed SSL-VPN access information to 87,000 FortiGate SSL-VPN devices. While they may have since been patched, if the passwords were not reset, they remain vulnerable. https://www.fortinet.com/blog/psirt-blogs/malicious-actor-discloses-fortigate-ssl-vpn-credentials

ANZ New Zealand back online after outage from DDoS attack - ANZ New Zealand's website is still facing an outage while other affected websites have slowly come back online. https://www.zdnet.com/article/anz-new-zealand-back-online-after-outage-from-ddos-attack/

UN Computer Networks Breached by Hackers Earlier This Year - Hackers breached the United Nations’ computer networks earlier this year and made off with a trove of data that could be used to target agencies within the intergovernmental organization. https://www.bloomberg.com/news/articles/2021-09-09/united-nations-computers-breached-by-hackers-earlier-this-year

LifeLong Medical informs 115K patients of Netgain data breach 6 months later - Approximately 115,448 patients of LifeLong Medical are just now being notified that their data was accessed and stolen during a series of ransomware-related intrusions at one of its third-party vendors, Netgain. However, the Netgain incident occurred in September 2020 and providers were notified in February, more than six months ago. https://www.scmagazine.com/analysis/breach/lifelong-medical-informs-115k-patients-of-netgain-data-breach-6-months-later

Olympus investigating reported ransomware attack with BlackMatter hallmarks - A Japanese technology manufacturer confirmed it is investigating a reported ransomware attack affecting business units in Europe, the Middle East and Africa dating back to Sept. 8. https://www.cyberscoop.com/olympus-ransomware-blackmatter-attack-camera/

KrebsOnSecurity Hit By Huge New IoT Botnet “Meris” - On Thursday evening, KrebsOnSecurity was the subject of a rather massive (and mercifully brief) distributed denial-of-service (DDoS) attack. https://krebsonsecurity.com/2021/09/krebsonsecurity-hit-by-huge-new-iot-botnet-meris/

Unsecured fitness app database leaks 61M records, highlights health app privacy risks - An unsecured database containing IoT health and fitness tracking device data was found exposing more than 61 million records tied to fitness app users from across the globe. https://www.scmagazine.com/analysis/application-security/unsecured-fitness-app-database-leaks-61m-records-highlights-health-app-privacy-risks

Lubbock lawyers warned sealed records revealed - Lubbock County defense attorneys are saying hundreds of criminal records that were supposed to be sealed have been made public after the county switched to a new electronic records system last month. https://www.lubbockonline.com/story/news/2021/09/14/lubbock-defense-lawyers-say-countys-new-court-records-system-revealing-sealed-records/8338261002/


Return to the top of the newsletter

WEB SITE COMPLIANCE -
We continue covering some of the issues discussed in the "Risk Management Principles for Electronic Banking" published by the Basel Committee on Bank Supervision.
   
   
Risk Management Principles for Electronic Banking
   
   
The e-banking risk management principles identified in this Report fall into three broad, and often overlapping, categories of issues. However, these principles are not weighted by order of preference or importance. If only because such weighting might change over time, it is preferable to remain neutral and avoid such prioritization.
   
   A. Board and Management Oversight (Principles 1 to 3): 
   
   1. Effective management oversight of e-banking activities. 
   2. Establishment of a comprehensive security control process. 
   3. Comprehensive due diligence and management oversight process for outsourcing relationships and other third-party dependencies. 
   
   B. Security Controls (Principles 4 to 10):
   
   4. Authentication of e-banking customers. 
   5. Non-repudiation and accountability for e-banking transactions. 
   6. Appropriate measures to ensure segregation of duties. 
   7. Proper authorization controls within e-banking systems, databases and applications. 
   8. Data integrity of e-banking transactions, records, and information. 
   9. Establishment of clear audit trails for e-banking transactions. 
   10. Confidentiality of key bank information.
   
   C. Legal and Reputational Risk Management (Principles 11 to 14):
   
   11. Appropriate disclosures for e-banking services. 
   12. Privacy of customer information. 
   13. Capacity, business continuity and contingency planning to ensure availability of e-banking systems and services. 
   14. Incident response planning.
   
   Each of the above principles will be cover over the next few weeks, as they relate to e-banking and the underlying risk management principles that should be considered by banks to address these issues.

Return to the top of the newsletter

FFIEC IT SECURITY - We continue our series on the FFIEC interagency Information Security Booklet.  
   
   SECURITY CONTROLS - IMPLEMENTATION
   

   LOGICAL AND ADMINISTRATIVE ACCESS CONTROL 
   
   AUTHENTICATION - Public Key Infrastructure (Part 1 of 3)
   
   Public key infrastructure (PKI), if properly implemented and maintained, may provide a strong means of authentication. By combining a variety of hardware components, system software, policies, practices, and standards, PKI can provide for authentication, data integrity, defenses against customer repudiation, and confidentiality. The system is based on public key cryptography in which each user has a key pair - a unique electronic value called a public key and a mathematically related private key. The public key is made available to those who need to verify the user's identity.
   
   The private key is stored on the user's computer or a separate device such as a smart card. When the key pair is created with strong encryption algorithms and input variables, the probability of deriving the private key from the public key is extremely remote. The private key must be stored in encrypted text and protected with a password or PIN to avoid compromise or disclosure. The private key is used to create an electronic identifier called a digital signature that uniquely identifies the holder of the private key and can only be authenticated with the corresponding public key.


Return to the top of the newsletter

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY - We continue the series on the National Institute of Standards and Technology (NIST) Handbook.
  
  Chapter 16 - TECHNICAL CONTROLS - IDENTIFICATION AND AUTHENTICATION
  
  16.2.2 Smart Tokens (2 of 2)
   
  
There are other types of protocols, some more sophisticated and some less so. The three types described above are the most common.
  
  Benefits of Smart Tokens
  
  Smart tokens offer great flexibility and can be used to solve many authentication problems. The benefits of smart tokens vary, depending on the type used. In general, they provide greater security than memory cards. Smart tokens can solve the problem of electronic monitoring even if the authentication is done across an open network by using one-time passwords.
  
  1)  One-time passwords. Smart tokens that use either dynamic password generation or challenge-response protocols can create one-time passwords. Electronic monitoring is not a problem with one-time passwords because each time the user is authenticated to the computer, a different "password" is used. (A hacker could learn the one-time password through electronic monitoring, but would be of no value.)
  
  2)  Reduced risk of forgery. Generally, the memory on a smart token is not readable unless the PIN is entered. In addition, the tokens are more complex and, therefore, more difficult to forge.
  
  3)  Multi-application. Smart tokens with electronic interfaces, such as smart cards, provide a way for users to access many computers using many networks with only one log-in. This is further discussed in the Single Log-in section of this chapter. In addition, a single smart card can be used for multiple functions, such as physical access or as a debit card.
  
  Problems with Smart Tokens
  
  Like memory tokens, most of the problems associated with smart tokens relate to their cost, the administration of the system, and user dissatisfaction. Smart tokens are generally less vulnerable to the compromise of PINs because authentication usually takes place on the card. (It is possible, of course, for someone to watch a PIN being entered and steal that card.) Smart tokens cost more than memory cards because they are more complex, particularly challenge-response calculators.
  
  Need reader/writers or human intervention. Smart tokens can use either an electronic or a human interface. An electronic interface requires a reader, which creates additional expense. Human interfaces require more actions from the user. This is especially true for challenge-response tokens with a manual interface, which require the user to type the challenge into the smart token and the response into the computer. This can increase user dissatisfaction.
  
  Substantial Administration. Smart tokens, like passwords and memory tokens, require strong administration. For tokens that use cryptography, this includes key management.
  
  Electronic reader/writers can take many forms, such as a slot in a PC or a separate external device. Most human interfaces consist of a keypad and display.

PLEASE NOTE:
 
Some of the above links may have expired, especially those from news organizations.  We may have a copy of the article, so please e-mail us at examiner@yennik.com if we can be of assistance.