R. Kinney Williams - Yennik, Inc.
R. Kinney Williams
Yennik, Inc.

Internet Banking News
Brought to you by Yennik, Inc. the acknowledged leader in Internet auditing for financial institutions.

Remote offsite and Onsite FFIEC IT Audits

January 29, 2023

Newsletter Content FFIEC IT Security FFIEC & ADA Web Site Audits
Web Site Compliance NIST Handbook Penetration Testing
Does Your Financial Institution need an affordable cybersecurity Internet security audit?  Yennik, Inc. has clients in 42 states that rely on our cybersecurity audits to ensure proper Internet security settings and to meet the independent diagnostic test requirements of FDIC, OCC, FRB, and NCUA, which provides compliance with Gramm-Leach Bliley Act 501(b) as well as the penetration test complies with the FFIEC Cybersecurity Assessment Tool regarding resilience testing The cybersecurity penetration audit and Internet security testing is an affordable-sophisticated process than goes far beyond the simple scanning of ports.  The audit focuses on a hacker's perspective, which will help you identify real-world cybersecurity weaknesses.  For more information, give R. Kinney Williams a call today at Office/Cell 806-535-8300 or visit http://www.internetbankingaudits.com/.
Remote bank regulatory FFIEC IT audits - I am performing virtual/remote bank regality FFIEC IT audits for banks and credit unions.  I am a former bank examiner with years of IT auditing experience.  Please contact R. Kinney Williams at examiner@yennik.com from your bank's email and I will send you information and fees.  All correspondence is confidential.


MISCELLANEOUS CYBERSECURITY NEWS:

Security pros say third parties are increasingly the cause of cybersecurity incidents - Respondents from a recent Third-Party Risk Survey believe that third parties are increasingly the cause of IT security incidents - and some say they have been the primary source of attacks in the past two years. https://www.scmagazine.com/research-article/third-party-risk/security-pros-say-third-parties-are-increasingly-the-cause-of-cybersecurity-incidents

Buying SASE: Questions to ask vendors before you commit - Choosing vendors for your secure access service edge, or SASE, solution can be difficult. https://www.scmagazine.com/resource/cloud-security/buying-sase-questions-to-ask-vendors-before-you-commit

Four lessons learned from the latest Uber breach - Uber’s recent data breach, which exposed sensitive employee and customer data to the BreachForums hacking forum, was the latest in a string of security incidents to hit the company in the last few years. https://www.scmagazine.com/perspective/breach/four-lessons-learned-from-the-latest-uber-breach

Fewer ransomware victims are paying up. But there's a catch - Cyber criminals are finding it harder to make money from ransomware attacks. But that doesn't mean ransomware is less dangerous. https://www.zdnet.com/article/fewer-ransomware-victims-are-paying-up-but-theres-a-catch/

Government watchdog: Feds fail to implement vast majority of cybersecurity recommendations - The Government Accountability Office says there's an urgent need for an updated national cybersecurity to hold federal agencies accountable. https://cyberscoop.com/government-watchdog-cybersecurity-recommendations/

Third-party risks: What organizations face - The English poet John Donne famously opined that “no man is an island entire of itself." We could just as easily say the same for today’s businesses operating in the globalized, information-rich economy. https://www.scmagazine.com/resource/cloud-security/third-party-risks-what-organizations-face

Threat intelligence: Security pros share key challenges - In today’s rapidly changing threat landscape, early actionable access to credible threat intelligence is critical. https://www.scmagazine.com/resource/threat-intelligence/threat-intelligence-security-pros-share-key-challenges

CYBERSECURITY ATTACKS, INTRUSIONS, DATA THEFT & LOSS:

Mailchimp says it was hacked - again - Email marketing and newsletter giant Mailchimp says it was hacked and that dozens of customers’ data was exposed. It’s the second time the company was hacked in the past six months. Worse, this breach appears to be almost identical to a previous incident. https://techcrunch.com/2023/01/18/mailchimp-hacked/

T-Mobile hacked to steal data of 37 million accounts in API data breach - T-Mobile disclosed a new data breach after a threat actor stole the personal information of 37 million current postpaid and prepaid customer accounts through one of its Application Programming Interfaces (APIs). https://www.bleepingcomputer.com/news/security/t-mobile-hacked-to-steal-data-of-37-million-accounts-in-api-data-breach/

Third-party administrator hack leads to theft of patient data for over 251K - Austin, Texas-based Bay Bridge Administrators, a third-party administrator of insurance products, recently began notifying more than 251,000 patients that their data was stolen after a network hack in September 2022. https://www.scmagazine.com/analysis/breach/third-party-administrator-hack-leads-to-theft-of-patient-data-for-over-251k

Canada’s largest alcohol retailer infected with card skimming malware twice since December - On January 12, Canadian alcohol retail giant LCBO announced that an “unauthorized party embedded malicious code” onto its website in order to steal information from customers in the process of checking out. Over five days in January, they wrote, customers “may have had their information compromised.” https://therecord.media/canadas-largest-alcohol-retailer-infected-with-card-skimming-malware-twice-since-december/

Royal Mail trials ‘operational workarounds’ following suspected ransomware attack - Royal Mail, the British postage and courier company, said on Wednesday evening it was “trialing operational workarounds” to get services moving again following a suspected ransomware attack. https://therecord.media/royal-mail-trials-operational-workarounds-following-suspected-ransomware-attack/

Breach notice confirms One Brooklyn Health cyberattack, outage in November - One Brooklyn Health issued a breach notice, shining a light on the reported network outages faced by the New York provider in November and December. https://www.scmagazine.com/analysis/breach/breach-notice-confirms-one-brooklyn-health-cyberattack-outage-in-november

FAA Says No Evidence of Cyberattack in NOTAM Outage - Human Error, Not Hackers, Behind Hourslong System Outage That Grounded Flights - Blame a contractor and not hackers for the hourslong nationwide pause on flights last week that grounded thousands of planes, says the Federal Aviation Administration. https://www.govinfosecurity.com/faa-says-no-evidence-cyberattack-in-notam-outage-a-20988

Citing cyberattack, COVID-19 impacts, Illinois hospital suspends operations - St. Margaret’s Health has temporarily suspended operations at its hospital in Peru, Illinois, as its leadership could not “find nor financially support” a new provider for its emergency room department. https://www.scmagazine.com/analysis/ransomware/citing-cyberattack-covid-19-impacts-illinois-hospital-suspends-operations

Logan Health agrees to $4.3M settlement after 2021 health data breach - Logan Health Medical Center has reached a $4.3 million settlement with the 213,543 patients and employees whose personal and protected health information was likely accessed during a Nov. 22, 2021, cyberattack. https://www.scmagazine.com/analysis/breach/logan-health-agrees-to-4-3m-settlement-after-2021-health-data-breach

Return to the top of the newsletter

WEB SITE COMPLIANCE - We continue our review of the FFIEC interagency statement on "Weblinking: Identifying Risks and Risk Management Techniques."
  (Part 9 of 10)
    
    B. RISK MANAGEMENT TECHNIQUES
    
    Implementing Weblinking Relationships

    
    
Customer Service Complaints
    
    
Financial institutions should have plans to respond to customer complaints, including those regarding the appropriateness or quality of content, services, or products provided or the privacy and security policies of the third-party site. The plan also should address how the financial institution will address complaints regarding any failures of linked third parties to provide agreed upon products or services.
    
    Monitoring Weblinking Relationships
    
    
The financial institution should consider monitoring the activities of linked third parties as a part of its risk management strategy. Monitoring policies and procedures should include periodic content review and testing to ensure that links function properly, and to verify that the levels of services provided by third parties are in accordance with contracts and agreements.  Website content is dynamic, and third parties may change the presentation or content of a website in a way that results in risk to the financial institution's reputation. Periodic review and testing will reduce this risk exposure. The frequency of review should be commensurate with the degree of risk presented by the linked site.


Return to the top of the newsletter

FFIEC IT SECURITY - We continue our series on the FFIEC interagency Information Security Booklet.
   

   SECURITY TESTING - KEY FACTORS
   

   Management is responsible for considering the following key factors in developing and implementing independent diagnostic tests:
   
   Personnel. Technical testing is frequently only as good as the personnel performing and supervising the test. Management is responsible for reviewing the qualifications of the testing personnel to satisfy themselves that the capabilities of the testing personnel are adequate to support the test objectives.
   
   Scope. The tests and methods utilized should be sufficient to validate the effectiveness of the security process in identifying and appropriately controlling security risks.
   
   Notifications. Management is responsible for considering whom to inform within the institution about the timing and nature of the tests. The need for protection of institution systems and the potential for disruptive false alarms must be balanced against the need to test personnel reactions to unexpected activities.
   
   Controls Over Testing. Certain testing can adversely affect data integrity, confidentiality, and availability. Management is expected to limit those risks by appropriately crafting test protocols. Examples of issues to address include the specific systems to be tested, threats to be simulated, testing times, the extent of security compromise allowed, situations in which testing will be suspended, and the logging of test activity. Management is responsible for exercising oversight commensurate with the risk posed by the testing.
   
   Frequency. The frequency of testing should be determined by the institution's risk assessment. High - risk systems should be subject to an independent diagnostic test at least once a year. Additionally, firewall policies and other policies addressing access control between the financial institution's network and other networks should be audited and verified at least quarterly.  Factors that may increase the frequency of testing include the extent of changes to network configuration, significant changes in potential attacker profiles and techniques, and the results of other testing.
   (FYI - This is exactly the type of independent diagnostic testing that we perform.  Please refer to http://www.internetbankingaudits.com/ for information.)
   
   Proxy Testing. Independent diagnostic testing of a proxy system is generally not effective in validating the effectiveness of a security process. Proxy testing, by its nature, does not test the operational system's policies and procedures, or its integration with other systems. It also does not test the reaction of personnel to unusual events. Proxy testing may be the best choice, however, when management is unable to test the operational system without creating excessive risk.


Return to the top of the newsletter

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY - This is the last Chapter on the National Institute of Standards and Technology (NIST) Handbook.  Next week we start Chapter 1.

Chapter 20 -
ASSESSING AND MITIGATING THE RISKS TO A HYPOTHETICAL COMPUTER SYSTEM (HGA)

20.7 Summary

This chapter has illustrated how many of the concepts described in previous chapters might be applied in a federal agency. An integrated example concerning a Hypothetical Government Agency (HGA) has been discussed and used as the basis for examining a number of these concepts. HGA's distributed system architecture and its uses were described. The time and attendance application was considered in some detail.

For context, some national and agency-level policies were referenced. Detailed operational policies and procedures for computer systems were discussed and related to these high-level policies. HGA assets and threats were identified, and a detailed survey of selected safeguards, vulnerabilities, and risk mitigation actions were presented. The safeguards included a wide variety of procedural and automated techniques, and were used to illustrate issues of assurance, compliance, security program oversight, and inter-agency coordination.

As illustrated, effective computer security requires clear direction from upper management. Upper management must assign security responsibilities to organizational elements and individuals and must formulate or elaborate the security policies that become the foundation for the organization's security program. These policies must be based on an understanding of the organization's mission priorities and the assets and business operations necessary to fulfill them. They must also be based on a pragmatic assessment of the threats against these assets and operations. A critical element is assessment of threat likelihoods. These are most accurate when derived from historical data, but must also anticipate trends stimulated by emerging technologies.

A good security program relies on an integrated, cost-effective collection of physical, procedural, and automated controls. Cost-effectiveness requires targeting these controls at the threats that pose the highest risks while accepting other residual risks. The difficulty of applying controls properly and in a consistent manner over time has been the downfall of many security programs. This chapter has provided numerous examples in which major security vulnerabilities arose from a lack of assurance or compliance. Hence, periodic compliance audits, examinations of the effectiveness of controls, and reassessments of threats are essential to the success of any organization's security program.


PLEASE NOTE:
 
Some of the above links may have expired, especially those from news organizations.  We may have a copy of the article, so please e-mail us at examiner@yennik.com if we can be of assistance.