R. Kinney Williams - Yennik, Inc.
R. Kinney Williams
Yennik, Inc.

Internet Banking News
Brought to you by Yennik, Inc. the acknowledged leader in Internet auditing for financial institutions.

Onsite FFIEC IT Audits in
New Mexico, Oklahoma, Colorado, and Texas

March 8, 2020

Newsletter Content FFIEC IT Security FFIEC & ADA Web Site Audits
Web Site Compliance NIST Handbook Penetration Testing
Does Your Financial Institution need an affordable cybersecurity Internet security audit?  Yennik, Inc. has clients in 42 states that rely on our cybersecurity audits to ensure proper Internet security settings and to meet the independent diagnostic test requirements of FDIC, OCC, FRB, and NCUA, which provides compliance with Gramm-Leach Bliley Act 501(b) as well as the penetration test complies with the FFIEC Cybersecurity Assessment Tool regarding resilience testing The cybersecurity penetration audit and Internet security testing is an affordable-sophisticated process than goes far beyond the simple scanning of ports.  The audit focuses on a hacker's perspective, which will help you identify real-world cybersecurity weaknesses.  For more information, give R. Kinney Williams a call today at Office/Cell 806-535-8300 or visit http://www.internetbankingaudits.com/.


Just a Reminder - If you have not already done so, update your pandemic policy and perform a pandemic test of the policy. Help protect your customers as well as your employees.

FFIEC information technology audits - As a former bank examiner with over 40 years IT audit experience, I will bring an examiner's perspective to the FFIEC information technology audit for your bank in Texas, New Mexico, Colorado, and Oklahoma.  Please email R. Kinney Williams at examiner@yennik.com from your bank's domain and I will email you information and fees.

FYI - Banning end-to-end encryption sounds authoritarian, warns social scientist - Proposals for a U.S. federal law that would require tech companies to build backdoors into their end-to-end encrypted communications services sound like they are lifted from an authoritarian country’s playbook, warned Dr. Andrea Little Limbago, chief social scientist at Virtru, in a podcast interview with SC Media. https://www.scmagazine.com/home/security-news/podcasts/sc-podcast-investigating-the-human-side-of-cybersecurity/

GAO: Critical Infrastructure Must Adopt NIST Cyber Framework - According to a report from the Government Accountability Office (GAO), federal agencies that have the lead in protecting critical infrastructure sectors (sector specific agencies, or SSAs) have for the most part not taken adequate steps to ensure that the sectors they oversee have adopted the National Institute of Standards and Security’s (NIST’s) Framework for Improving Critical Infrastructure Cybersecurity. https://www.gao.gov/assets/710/704808.pdf

ACMA mandates stronger identity checks when porting Australian mobile numbers - The Australian Communications and Media Authority (ACMA) has moved to make telcos seek further approval from customers before a mobile number can be ported from one mobile provider to another. https://www.zdnet.com/article/acma-mandates-stronger-identity-checks-when-porting-australian-mobile-numbers/

Ransomware victims are paying out millions a month. One particular version has cost them the most - Ransomware victims have paid out more than $140 million to crooks over the last six-and-a-half years, according to calculations by the FBI. https://www.zdnet.com/article/fbi-ransomware-victims-have-paid-out-140-million-one-version-has-cost-them-the-most/


ATTACKS, INTRUSIONS, DATA THEFT & LOSS

FYI - Ryuk ransomware shuts down New Mexico school district a second time - For the second time in less than a year, ransomware forced Gadsden Independent School District in Las Cruces, New Mexico, to take its systems offline Monday. https://edscoop.com/ryuk-ransomware-shuts-down-new-mexico-school-district-second-time/

DoppelPaymer Hacked Bretagne Télécom Using the Citrix ADC Flaw - Cloud services provider Bretagne Télécom was hacked by the threat actors behind the DoppelPaymer Ransomware using an exploit that targeted servers unpatched against the CVE-2019-19781 vulnerability. https://www.bleepingcomputer.com/news/security/doppelpaymer-hacked-bretagne-t-l-com-using-the-citrix-adc-flaw/

Customer data stolen in data breach of facial recognition company Clearview AI - Controversial facial recognition company Clearview AI Inc. has suffered a data breach, and the company’s advising customers that an intruder “gained unauthorized access” to its list of customers. https://siliconangle.com/2020/02/26/customer-data-stolen-data-breach-facial-recognition-company-clearview-ai/

Walgreens mobile app leaked PII, PHI on ‘small percentage’ of customers - A leak in the Walgreens mobile app’s messaging service exposed personal information – including what the company said was “limited health-related data” – on a “small percentage” of customers who used the app between Jan. 9-15. https://www.scmagazine.com/home/security-news/walgreens-mobile-app-leaked-pii-phi-on-small-percentage-of-customers/

Data-stealing ransomware hits parts maker for Tesla, Boeing and Lockheed Martin - Visser Precision, a parts maker and manufacturing solutions provider for the aerospace, automotive, industrial and manufacturing industries, has reportedly suffered a combination ransomware attack and data breach that has compromised files pertaining to multiple business partners, including Tesla, SpaceX, Boeing and Lockheed Martin. https://www.scmagazine.com/home/security-news/cybercrime/data-stealing-ransomware-hits-parts-maker-for-tesla-boeing-and-lockheed-martin/

Redcar & Cleveland Council confirms ransomware attack - Redcar & Cleveland Borough Council in northern England has confirmed it has fallen victim to a ransomware attack targeting its server estate, which has kept it offline since the weekend of 8 February. https://www.computerweekly.com/news/252479241/Redcar-Cleveland-Council-confirms-ransomware-attack

RailWorks Corporation Disclosed Catastrophic Ransomware Infection - RailWorks Corporation has disclosed a ransomware attack that has resulted in the exposure of PII (personally identifiable information) of current and former employees, as well as their beneficiaries and dependents. https://www.technadu.com/railworks-corporation-disclosed-catastrophic-ransomware-infection/94045/

Rail station wi-fi provider exposed traveller data - Network Rail and the service provider C3UK confirmed the incident three days after being contacted by BBC News about the matter. https://www.bbc.com/news/technology-51682280


Return to the top of the newsletter

WEB SITE COMPLIANCE -
Risk Management of Outsourced Technology Services ( Part 4 of 4)
   
   Service Provider Oversight
   
   Institutions should implement an oversight program to monitor each service provider’s controls, condition, and performance. Responsibility for the administration of the service provider relationship should be assigned to personnel with appropriate expertise to monitor and manage the relationship. The number of personnel, functional responsibilities, and the amount of time devoted to oversight activities will depend, in part, on the scope and complexity of the services outsourced. Institutions should document the administration of the service provider relationship. Documenting the process is important for contract negotiations, termination issues, and contingency planning.
   
   Summary
   
   The board of directors and management are responsible for ensuring adequate risk mitigation practices are in place for effective oversight and management of outsourcing relationships. Financial institutions should incorporate an outsourcing risk management process that includes a risk assessment to identify the institution’s needs and requirements; proper due diligence to identify and select a provider; written contracts that clearly outline duties, obligations and responsibilities of the parties involved; and ongoing oversight of outsourcing technology services.


Return to the top of the newsletter

FFIEC IT SECURITY - We continue our series on the FFIEC interagency Information Security Booklet.  
  
  
INTRUSION DETECTION AND RESPONSE
  
  INTRUSION RESPONSE
  (Part 1 of 2)
  
  Intrusion detection by itself does not mitigate risks of an intrusion. Risk mitigation only occurs through an effective and timely response. The goal of the response is to minimize damage to the institution and its customers through containment of the intrusion, and restoration of systems.
  
  The response primarily involves people rather then technologies. The quality of intrusion response is a function of the institution's culture, policies and procedures, and training.
  
  Preparation determines the success of any intrusion response. Preparation involves defining the policies and procedures that guide the response, assigning responsibilities to individuals and providing appropriate training, formalizing information flows, and selecting, installing, and understanding the tools used in the response effort. Key considerations that directly affect the institution's policies and procedures include the following:
  
  ! How to balance concerns regarding availability, confidentiality, and integrity, for devices and data of different sensitivities. This consideration is a key driver for a containment strategy and may involve legal and liability considerations. An institution may decide that some systems must be disconnected or shut down at the first sign of intrusion, while others must be left on line.
  ! When and under what circumstances to invoke the intrusion response activities, and how to ensure the proper personnel are available and notified.
  ! How to control the frequently powerful intrusion identification and response tools.
  ! When to involve outside experts and how to ensure the proper expertise will be available when needed. This consideration addresses both the containment and the restoration strategy.
  ! When and under what circumstances to involve regulators, customers, and law enforcement. This consideration drives certain monitoring decisions, decisions regarding evidence-gathering and preservation, and communications considerations.
  ! Which personnel have authority to perform what actions in containment of the intrusion and restoration of the systems. This consideration affects the internal communications strategy, the commitment of personnel, and procedures that escalate involvement and decisionswithin the organization.
  ! How and what to communicate outside the organization, whether to law enforcement, customers, service providers, potential victims, and others. This consideration drives the communication strategy, and is a key component in mitigating reputation risk.
  ! How to document and maintain the evidence, decisions, and actions taken.
  ! What criteria must be met before compromised services, equipment and software are returned to the network.
  ! How to learn from the intrusion and use those lessons to improve the institution's security.
  ! How and when to prepare and file a Suspicious Activities Report (SAR).


Return to the top of the newsletter

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY - We continue the series on the National Institute of Standards and Technology (NIST) Handbook.
 
 Section II. Management Controls Chapter 5
 
 COMPUTER SECURITY POLICY
 
 In discussions of computer security, the term policy has more than one meaning. Policy is senior management's directives to create a computer security program, establish its goals, and assign responsibilities. The term policy is also used to refer to the specific security rules for particular systems. Additionally, policy may refer to entirely different matters, such as the specific managerial decisions setting an organization's e-mail privacy policy or fax security policy. 
 
 Policy means different things to different people. The term "policy" is used in this chapter in a broad manner to refer to important computer security-related decisions.
 
 In this chapter the term computer security policy is defined as the "documentation of computer security decisions"-which covers all the types of policy described above. In making these decisions, managers face hard choices involving resource allocation, competing objectives, and organizational strategy related to protecting both technical and information resources as well as guiding employee behavior. Managers at all levels make choices that can result in policy, with the scope of the policy's applicability varying according to the scope of the manager's authority. In this chapter we use the term policy in a broad manner to encompass all of the types of policy described above-regardless of the level of manager who sets the particular policy.
 
 Managerial decisions on computer security issues vary greatly. To differentiate among various kinds of policy, this chapter categorizes them into three basic types:
 
 1)  Program policy is used to create an organization's computer security program.
 2)  Issue-specific policies address specific issues of concern to the organization.
 3)  System-specific policies focus on decisions taken by management to protect a particular system.
 
 Procedures, standards, and guidelines are used to describe how these policies will be implemented within an organization.
 
 Familiarity with various types and components of policy will aid managers in addressing computer security issues important to the organization. Effective policies ultimately result in the development and implementation of a better computer security program and better protection of systems and information.
 These types of policy are described to aid the reader's understanding. It is not important that one categorizes specific organizational policies into these three categories; it is more important to focus on the functions of each.


PLEASE NOTE:
 
Some of the above links may have expired, especially those from news organizations.  We may have a copy of the article, so please e-mail us at examiner@yennik.com if we can be of assistance.