R. Kinney Williams - Yennik, Inc.
R. Kinney Williams
Yennik, Inc.

Internet Banking News
Brought to you by Yennik, Inc. the acknowledged leader in Internet auditing for financial institutions.

Remote offsite and Onsite FFIEC IT Audits

October 4, 2020

Please stay safe - We will recover.

Newsletter Content FFIEC IT Security FFIEC & ADA Web Site Audits
Web Site Compliance NIST Handbook Penetration Testing
Does Your Financial Institution need an affordable cybersecurity Internet security audit?  Yennik, Inc. has clients in 42 states that rely on our cybersecurity audits to ensure proper Internet security settings and to meet the independent diagnostic test requirements of FDIC, OCC, FRB, and NCUA, which provides compliance with Gramm-Leach Bliley Act 501(b) as well as the penetration test complies with the FFIEC Cybersecurity Assessment Tool regarding resilience testing The cybersecurity penetration audit and Internet security testing is an affordable-sophisticated process than goes far beyond the simple scanning of ports.  The audit focuses on a hacker's perspective, which will help you identify real-world cybersecurity weaknesses.  For more information, give R. Kinney Williams a call today at Office/Cell 806-535-8300 or visit http://www.internetbankingaudits.com/.
Virtual/remote IT audits - I am performing virtual/remote FFIEC IT audits for banks and credit unions.  I am a former bank examiner with years of IT auditing experience.  Please contact R. Kinney Williams at examiner@yennik.com from your bank's email and I will send you information and fees.  All correspondence is confidential.

FYI - ‘Insensitive’ phishing test stirs debate over ethics of security training - A simulated phishing email that used the false promise of company bonuses as a lure to trick employees has ignited a debate over the ethics of security awareness testing that potentially engender distrust and hard feelings. https://www.scmagazine.com/home/security-news/phishing/insensitive-phishing-test-stirs-debate-over-ethics-of-security-training/

Build security by expanding cyber awareness - Governments and intelligence agencies are engaged in cyberwarfare on an epic scale. As issues discussed on the internet are frequently amplified in the media by organizations with vested interests, it’s become daunting for security pros to unravel the complex and constantly changing web of online allegiances. https://www.scmagazine.com/perspectives/build-security-by-expanding-cyber-awareness/

What one company’s deal with the feds tells us about the long tail of data breaches - It’s no secret that recovering from a data breach can get very expensive, very fast. In addition to lawsuits and legal costs, companies often end up hiring crisis PR firms, setting up call centers to notify affected victims, dealing with insurance costs and taking a big hit to their reputation. https://www.scmagazine.com/home/security-news/what-one-companys-deal-with-the-feds-tells-us-about-the-long-tail-of-data-breaches/

It’s finally time to go passwordless - The death of passwords has been predicted time and again. Not without good reason: passwords are a weak link and a headache from both a security and operational perspective. https://www.scmagazine.com/perspectives/its-finally-time-to-go-passwordless/

Nevada school district refuses to submit to ransomware blackmail, hacker publishes student data - A cybercriminal has published private data belonging to thousands of students following a failed attempt to extort a ransomware payment from a Nevada school district. https://www.zdnet.com/article/nevada-school-district-refuses-to-submit-to-ransomware-blackmail-hacker-responds-by-publishing-student-data/

OCR Imposes $6.85m Penalty Over Data Breach - A health insurance company in Washington state has been slapped with the second-largest ever HIPAA violation penalty. https://www.infosecurity-magazine.com/news/ocr-imposes-685m-penalty-over-data/

IT guy whose job was to stop ex-staff running amok on the network is jailed for running amok on the network - After he was demoted and fired, idiot logged into office PC from home and wiped storage systems - An IT guy, who was tasked with locking out ex-employees from the company network, has been jailed after he logged in after being fired and wiped an office's computer storage drives. https://www.theregister.com/2020/09/25/it_support_jailed_storage/

Anthem to pay $39.5 million to states in latest settlement over 2015 hack - Anthem has agreed to pay $39.5 million in penalties and fees resulting from a sweeping 2015 cyberattack on the health insurer as part of a multi-state settlement, the company announced Wednesday. https://www.cyberscoop.com/anthem-2015-hack-millions-settlement/


ATTACKS, INTRUSIONS, DATA THEFT & LOSS

FYI - Shopify breach: Help center employees are a unique breed of insider threat - A data breach at Shopify perpetrated by two “rogue employees” who worked on the e-commerce platform’s support team illustrates how certain roles within an organization may require more stringent monitoring. https://www.scmagazine.com/home/security-news/data-breach/shopify-breach-help-center-employees-are-a-unique-breed-of-insider-threat/

The Twitter hack exposed the need for more effective PAM security - The 2020 Verizon Data Breach Investigations report found that 80 percent of breaches are caused by compromised or weak credentials. This makes privileged access management (PAM) strategies a must have. https://www.scmagazine.com/perspectives/the-the-twitter-hack-exposed-the-need-for-more-effective-pam-security/

CISA says a hacker breached a federal agency - CISA didn't name the attacker but it published an in-depth incident report detailing the hacker's every step. https://www.zdnet.com/article/cisa-says-a-hacker-breached-a-federal-agency/

Cybercriminals Strike Schools Amid Pandemic - A mother walks her child to school on the first day of in-person classes in Orange County, Florida, in August. Cybercriminals have launched ransomware attacks on school districts across the country, forcing some to cancel classes. https://www.pewtrusts.org/en/research-and-analysis/blogs/stateline/2020/09/22/cybercriminals-strike-schools-amid-pandemic

Foreign Hackers Cripple Texas County’s Email System, Raising Election Security Concerns - The malware attack, which sent fake email replies to voters and businesses, spotlights an overlooked vulnerability in counties that don’t follow best practices for computer security. https://www.propublica.org/article/foreign-hackers-cripple-texas-countys-email-system-raising-election-security-concerns

Tyler Technologies confirms cyberattack was ransomware - Local-government IT services provider Tyler Technologies confirmed Thursday that a cyberattack it reported experiencing Wednesday was the result of a ransomware infection. https://statescoop.com/tyler-technologies-confirms-cyberattack-ransomware/

UHS confirms hospitals hit by cyberattack, some systems down - Universal Health Services and the George Washington University. UHS confirmed that some of its hospitals are dealing with an ongoing, unspecified cyberattack, though it did not specify which. https://www.scmagazine.com/home/security-news/uhs-confirms-hospitals-hit-by-cyber-attack-some-systems-down/

Student Arrested Over Cyber-attacks on Indiana Schools - A 13-year-old boy has been arrested in the United States after allegedly hacking into an Indiana school district's computer system. https://www.infosecurity-magazine.com/news/student-arrested-over-school/


Return to the top of the newsletter

WEB SITE COMPLIANCE -
This week begins our series on the Federal Financial Institutions Examination Council Guidance on Electronic Financial Services and Consumer Compliance.
   
   
Electronic Fund Transfer Act, Regulation E  (Part 1 of 2)
   
   Generally, when on-line banking systems include electronic fund transfers that debit or credit a consumer's account, the requirements of the Electronic Fund Transfer Act and Regulation E apply. A transaction involving stored value products is covered by Regulation E when the transaction accesses a consumer's account (such as when value is "loaded" onto the card from the consumer's deposit account at an electronic terminal or personal computer).
   
   Financial institutions must provide disclosures that are clear and readily understandable, in writing, and in a form the consumer may keep. An Interim rule was issued on March 20, 1998 that allows depository institutions to satisfy the requirement to deliver by electronic communication any of these disclosures and other information required by the act and regulations, as long as the consumer agrees to such method of delivery.
   
   Financial institutions must ensure that consumers who sign-up for a new banking service are provided with disclosures for the new service if the service is subject to terms and conditions different from those described in the initial disclosures. Although not specifically mentioned in the commentary, this applies to all new banking services including electronic financial services.


Return to the top of the newsletter

FFIEC IT SECURITY - We continue the series  from the FDIC "Security Risks Associated with the Internet." 
   
   SECURITY MEASURES

   
   Certificate Authorities and Digital Certificates 

   
   Certificate authorities and digital certificates are emerging to further address the issues of authentication, non‑repudiation, data privacy, and cryptographic key management.  A certificate authority (CA) is a trusted third party that verifies the identity of a party to a transaction . To do this, the CA vouches for the identity of a party by attaching the CA's digital signature to any messages, public keys, etc., which are transmitted.  Obviously, the CA must be trusted by the parties involved, and identities must have been proven to the CA beforehand.  Digital certificates are messages that are signed with the CA's private key.  They identify the CA, the represented party, and could even include the represented party's public key. 
   
   The responsibilities of CAs and their position among emerging technologies continue to develop.  They are likely to play an important role in key management by issuing, retaining, or distributing  public/private key pairs. 

   
   Implementation 

   
   The implementation and use of encryption technologies, digital signatures, certificate authorities, and digital certificates can vary.  The technologies and methods can be used individually, or in combination with one another.  Some techniques may merely encrypt data in transit from one location to another.  While this keeps the data confidential during transmission, it offers little in regard to authentication and non-repudiation.  Other techniques may utilize digital signatures, but still require the encrypted submission of sensitive information, like credit card numbers.  Although protected during transmission, additional measures would need to be taken to ensure the sensitive information remains protected once received and stored. 

   
   The protection afforded by the above security measures will be governed by the capabilities of the technologies, the appropriateness of the technologies for the intended use, and the administration of the technologies utilized.  Care should be taken to ensure the techniques  utilized are sufficient to meet the required needs of the institution.  All of the technical and  implementation differences should be explored when determining the most appropriate package.


Return to the top of the newsletter

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY -  We continue the series on the National Institute of Standards and Technology (NIST) Handbook.
  
  Chapter 12 - COMPUTER SECURITY INCIDENT HANDLING
  
  Computer systems are subject to a wide range of mishaps -- from corrupted data files, to viruses, to natural disasters. Some of these mishaps can be fixed through standard operating procedures. For example, frequently occurring events (e.g., a mistakenly deleted file) can usually be readily repaired (e.g., by restoration from the backup file). More severe mishaps, such as outages caused by natural disasters, are normally addressed in an organization's contingency plan. Other damaging events result from deliberate malicious technical activity (e.g., the creation of viruses or system hacking).
  
  A computer security incident can result from a computer virus, other malicious code, or a system intruder, either an insider or an outsider. It is used in this chapter to broadly refer to those incidents resulting from deliberate malicious technical activity. It can more generally refer to those incidents that, without technically expert response, could result in severe damage. This definition of a computer security incident is somewhat flexible and may vary by organization and computing environment.
  
  Malicious code include viruses as well as Trojan horses and worms. A virus is a code segment that replicates by attaching copies of itself to existing executables. A Trojan horse is a program that performs a desired task, but also includes unexpected functions. A worm is a self-replicating program.
  
  Although the threats that hackers and malicious code pose to systems and networks are well known, the occurrence of such harmful events remains unpredictable. Security incidents on larger networks (e.g., the Internet), such as break-ins and service disruptions, have harmed various organizations' computing capabilities. When initially confronted with such incidents, most organizations respond in an ad hoc manner. However recurrence of similar incidents often makes it cost-beneficial to develop a standing capability for quick discovery of and response to such events. This is especially true, since incidents can often "spread" when left unchecked thus increasing damage and seriously harming an organization.
  
  Incident handling is closely related to contingency planning as well as support and operations. An incident handling capability may be viewed as a component of contingency planning, because it provides the ability to react quickly and efficiently to disruptions in normal processing. Broadly speaking, contingency planning addresses events with the potential to interrupt system operations. Incident handling can be considered that portion of contingency planning that responds to malicious technical threats.
  This chapter describes how organizations can address computer security incidents (in the context of their larger computer security program) by developing a computer security incident handling capability.
  
  Many organizations handle incidents as part of their user support capability  or as a part of general system support.

PLEASE NOTE:
 
Some of the above links may have expired, especially those from news organizations.  We may have a copy of the article, so please e-mail us at examiner@yennik.com if we can be of assistance.