R. Kinney Williams - Yennik, Inc.
R. Kinney Williams
Yennik, Inc.

Internet Banking News
Brought to you by Yennik, Inc., the acknowledged leader in Internet auditing for financial institutions.

Remote offsite and onsite FFIEC IT Security Audits

November 3, 2024

Newsletter Content FFIEC IT Security FFIEC & ADA Web Site Audits
Web Site Compliance NIST Handbook Gold Standard Penetration Testing
Does Your Financial Institution need an affordable cybersecurity Internet security audit?  Yennik, Inc. has clients in 42 states that rely on our cybersecurity audits to ensure proper Internet security settings and to meet the independent diagnostic test requirements of FDIC, OCC, FRB, and NCUA, which provides compliance with Gramm-Leach Bliley Act 501(b) as well as the penetration test complies with the FFIEC Cybersecurity Assessment Tool regarding resilience testing The cybersecurity penetration audit and Internet security testing is an affordable-sophisticated process than goes far beyond the simple scanning of ports.  The audit focuses on a hacker's perspective, which will help you identify real-world cybersecurity weaknesses.  For more information, give R. Kinney Williams a call today at Office/Cell 806-535-8300 or visit http://www.internetbankingaudits.com/.
Bank regulatory FFIEC IT audits - I perform annual IT audits required by the regulatory agencies for banks and credit unions. I am a former bank examiner over 30 years of IT auditing experience. Please contact R. Kinney Williams at examiner@yennik.com from your bank's email and I will send you information and fees. All correspondence is confidential.


MISCELLANEOUS CYBERSECURITY NEWS:

 
Third-party vendors drive 45% of breaches in US energy sector - A joint study by SecurityScorecard and KPMG found that 90% of companies in the energy sector that sustained multiple breaches had security issues caused by third-party vendors. https://www.scworld.com/news/third-party-vendors-drive-45-of-breaches-in-us-energy-sector

What does your CEO need to know about cybersecurity? - CEOs can no longer skim over their cybersecurity plans. When big incidents occur, they risk shareholder lawsuits, regulatory charges or even job loss. https://www.cybersecuritydive.com/news/ceo-cyber-security-strategy-CISO/721102/

The Global Surveillance Free-for-All in Mobile Ad Data - place of worship was considered a dangerous power that should remain only within the purview of nation states. https://krebsonsecurity.com/2024/10/the-global-surveillance-free-for-all-in-mobile-ad-data/

Tech firms to pay millions in SEC penalties for misleading SolarWinds disclosures - Four high-profile tech companies reached an agreement with the Securities and Exchange Commission to pay millions of dollars in penalties for misleading investors about their exposure to the 2020 SolarWinds hack. https://www.theregister.com/2024/10/22/sec_fines_four_tech_firms/

LinkedIn hit with $335 million fine for using member data for ad targeting without consent - Ireland’s top privacy regulator on Thursday fined social media platform LinkedIn €310 million ($335 million) for allegedly using its members' data for advertising purposes without obtaining their consent. https://therecord.media/linkedin-hit-with-335-million-fine-gdpr-ireland

Basic cyber hygiene still offers the best defense against ransomware - The recent FBI takedown of the Dispossessor ransomware gang serves as a powerful reminder that fundamental cybersecurity practices are crucial in preventing devastating attacks. https://www.scworld.com/perspective/basic-cyber-hygiene-still-offers-the-best-defense-against-ransomware

Cloud vs. datacenter: Decoding the security trade-offs - One of the first concepts that every student of economics learns about is trade-offs – if an IT department allocates more of its budget to cybersecurity, it may have less to spend on software development or hardware upgrades. https://www.scworld.com/perspective/cloud-vs-datacenter-decoding-the-security-trade-offs

CYBERSECURITY ATTACKS, INTRUSIONS, DATA THEFT & LOSS:

Change Healthcare data breach officially affects 100M people - The massive Change Healthcare cyberattack could have compromised data from 100 million people - the largest healthcare data breach ever reported to federal regulators. https://www.cybersecuritydive.com/news/change-healthcare-data-breach-exposure/731009/

Landmark, an administrator for insurance firms, says 800,000 affected by data breach - One of the biggest third-party administrators for several large insurance firms said a cyberattack in May exposed the sensitive information of more than 800,000 people. https://therecord.media/landmark-admin-data-breach-insurance-industry

Fortinet zero-day attack spree hits at least 50 customers - Active exploits of a critical vulnerability in FortiManager began in late June, Mandiant said. Firewall credentials and configuration data have been stolen. https://www.cybersecuritydive.com/news/fortinet-zero-day-attack-spree/730894/

Hospitals adopt error-prone AI transcription tools despite warnings - On Saturday, an Associated Press investigation revealed that OpenAI's Whisper transcription tool creates fabricated text in medical and business settings despite warnings against such use. https://arstechnica.com/ai/2024/10/hospitals-adopt-error-prone-ai-transcription-tools-despite-warnings/

Return to the top of the newsletter

WEB SITE COMPLIANCE - OCC - Threats from Fraudulent Bank Web Sites - Risk Mitigation and Response Guidance for Web Site Spoofing Incidents (Part 5 of 5)  Next week we will begin our series on the Guidance on Safeguarding Customers Against E-Mail and Internet-Related Fraudulent Schemes
  
  
PROCEDURES TO ADDRESS SPOOFING - Contact the OCC and Law Enforcement Authorities
  
  If a bank is the target of a spoofing incident, it should promptly notify its OCC supervisory office and report the incident to the FBI and appropriate state and local law enforcement authorities.  Banks can also file complaints with the Internet Fraud Complaint Center (see http://www.ic3.gov), a partnership of the FBI and the National White Collar Crime Center.
  
  In order for law enforcement authorities to respond effectively to spoofing attacks, they must be provided with information necessary to identify and shut down the fraudulent Web site and to investigate and apprehend the persons responsible for the attack.  The data discussed under the "Information Gathering" section should meet this need.
  
  In addition to reporting to the bank's supervisory office and law enforcement authorities, there are other less formal mechanisms that a bank can use to report these incidents and help combat fraudulent activities.  For example, banks can use "Digital Phishnet" (http://www.digitalphishnet.com/), which is a joint initiative of industry and law enforcement designed to support apprehension of perpetrators of phishing-related crimes, including spoofing.  Members of Digital Phishnet include ISPs, online auction services, financial institutions, and financial service providers.  The members work closely with the FBI, Secret Service, U.S. Postal Inspection Service, Federal Trade Commission (FTC), and several electronic crimes task forces around the country to assist in identifying persons involved in phishing-type crimes.


Return to the top of the newsletter

FFIEC IT SECURITY - We continue our series on the FFIEC interagency Information Security Booklet.  
  
  
SECURITY CONTROLS - IMPLEMENTATION - PHYSICAL SECURITY

  
  The confidentiality, integrity, and availability of information can be impaired through physical access and damage or destruction to physical components. Conceptually, those physical security risks are mitigated through zone-oriented implementations. Zones are physical areas with differing physical security requirements. The security requirements of each zone are a function of the sensitivity of the data contained or accessible through the zone and the information technology components in the zone. For instance, data centers may be in the highest security zone, and branches may be in a much lower security zone. Different security zones can exist within the same structure. Routers and servers in a branch, for instance, may be protected to a greater degree than customer service terminals. Computers and telecommunications equipment within an operations center will have a higher security zone than I/O operations, with the media used in those equipment stored at yet a higher zone.
  
  The requirements for each zone should be determined through the risk assessment. The risk assessment should include, but is not limited to, the following threats:
  
  ! Aircraft crashes
  ! Chemical effects
  ! Dust
  ! Electrical supply interference
  ! Electromagnetic radiation
  ! Explosives
  ! Fire
  ! Smoke
  ! Theft/Destruction
  ! Vibration/Earthquake
  ! Water
  ! Wireless emissions
  ! Any other threats applicable based on the entity's unique geographical location, building configuration, neighboring entities, etc.



Return to the top of the newsletter

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY - We continue the series on the National Institute of Standards and Technology (NIST) Handbook.
 
 Chapter 11 - PREPARING FOR CONTINGENCIES AND DISASTERS
 
 11.2 Step 2: Identifying the Resources That Support Critical Functions
 
 
11.2.3 Automated Applications and Data
 
 Computer systems run applications that process data. Without current electronic versions of both applications and data, computerized processing may not be possible. If the processing is being performed on alternate hardware, the applications must be compatible with the alternate hardware, operating systems and other software (including version and configuration), and numerous other technical factors. Because of the complexity, it is normally necessary to periodically verify compatibility.
 
 11.2.4 Computer-Based Services
 
 An organization uses many different kinds of computer-based services to perform its functions. The two most important are normally communications services and information services. Communications can be further categorized as data and voice communications; however, in many organizations these are managed by the same service. Information services include any source of information outside of the organization. Many of these sources are becoming automated, including on-line government and private databases, news services, and bulletin boards.
 
 11.2.5 Physical Infrastructure
 
 For people to work effectively, they need a safe working environment and appropriate equipment and utilities. This can include office space, heating, cooling, venting, power, water, sewage, other utilities, desks, telephones, fax machines, personal computers, terminals, courier services, file cabinets, and many other items. In addition, computers also need space and utilities, such as electricity. Electronic and paper media used to store applications and data also have physical requirements
 
 11.2.6 Documents and Papers
 
 Many functions rely on vital records and various documents, papers, or forms. These records could be important because of a legal need (such as being able to produce a signed copy of a loan) or because they are the only record of the information. Records can be maintained on paper, microfiche, microfilm, magnetic media, or optical disk.


PLEASE NOTE:
 
Some of the above links may have expired, especially those from news organizations.  We may have a copy of the article, so please e-mail us at examiner@yennik.com if we can be of assistance.