R. Kinney Williams - Yennik, Inc.®
R. Kinney Williams
Yennik, Inc.

Internet Banking News
Brought to you by Yennik, Inc. the acknowledged leader in Internet auditing for financial institutions.

April 19, 2015

ewsletter Content FFIEC IT Security Web Site Audits
Web Site Compliance
 
NIST Handbook
 
Penetration Testing
 
Does Your Financial Institution need an affordable cybersecurity Internet security audit?  Yennik, Inc. has clients in 42 states that rely on our cybersecurity penetration testing audits to ensure proper Internet security settings and to meet the independent diagnostic test requirements of FDIC, OCC, FRB, and NCUA, which provides compliance with Gramm-Leach Bliley Act 501(b) The penetration audit and Internet security testing is an affordable-sophisticated process than goes far beyond the simple scanning of ports.  The audit focuses on a hacker's perspective, which will help you identify real-world weaknesses.  For more information, give R. Kinney Williams a call today at 806-798-7119 or visit http://www.internetbankingaudits.com/.


FYI
- PCI SSC updates security standards for making of payment cards - The PCI Security Standards Council (PCI SSC) has updated its security requirements to improve the security of data and other components in the making of payment cards. http://www.scmagazine.com/pci-ssc-updates-security-standards-for-making-of-payment-cards/article/409060/

FYI - After July 14, 2015 Microsoft will no longer issue security updates for any version of Windows Server 2003. http://www.microsoft.com/en-us/server-cloud/products/windows-server-2003/

FYI - Destructive hacking attempts target critical infrastructure in Americas - Hacking attacks that destroy rather than steal data or that manipulate equipment are far more prevalent than widely believed, according to a survey of critical infrastructure organizations throughout North and South America. http://www.reuters.com/article/2015/04/07/us-cybersecurity-americas-idUSKBN0MY06Z20150407

FYI - AT&T To Pay $25M To Settle Investigation Into Three Data Breaches - The Federal Communications Commission has entered a $25 million settlement with AT&T Services, Inc. to resolve an investigation into consumer privacy violations at AT&T’s call centers in Mexico, Colombia, and the Philippines. http://www.fcc.gov/document/att-pay-25m-settle-investigation-three-data-breaches-0

FYI - FBI Warns That WordPress Faces Terrorist Attack Risk - The Federal Bureau of Investigation issued an alert on April 7 about the potential danger of Islamic State (ISIS) terrorists abusing vulnerabilities in the open-source WordPress blog and content management system software. http://www.eweek.com/blogs/security-watch/fbi-warns-that-wordpress-faces-terrorist-attack-risk.html

FYI - Wall St. Is Told to Tighten Digital Security of Partners - Wall Street’s oversight of cybersecurity measures at outside firms it does business with remains a work in progress, according to a review by New York State’s top financial regulator. http://www.nytimes.com/2015/04/09/business/dealbook/wall-st-is-told-to-tighten-digital-security-of-partners.html?_r=0

FYI - U.S. secretly tracked billions of calls for decades - The U.S. government started keeping secret records of Americans' international telephone calls nearly a decade before the Sept. 11 terrorist attacks, harvesting billions of calls in a program that provided a blueprint for the far broader National Security Agency surveillance that followed. http://www.usatoday.com/story/news/2015/04/07/dea-bulk-telephone-surveillance-operation/70808616/

FYI - 65 percent of online tax filers do so on open access WiFi network - Nearly half of Americans file their taxes online, and of those who do, 65 percent file them on an open access WiFi network, according to new research from Protect Your Bubble, an identity theft protection provider. http://www.scmagazine.com/protect-your-bubble-conducts-identity-fraud-practices-survey/article/408527/

FYI - Ninety percent of companies are vulnerable to cyber attacks, security experts say. The chances of another company suffering the devastating effects of a cyberattack like the one perpetrated on Sony last year are not as remote as we would like to believe, security researchers say. http://www.cnet.com/news/thousands-could-launch-sony-style-cyber-attack-says-ex-hacker/

FYI - GAO - FAA Needs a More Comprehensive Approach to Address Cybersecurity As Agency Transitions to NextGen. http://www.gao.gov/products/GAO-15-370

FYI - Hinkley to replace founder Grossman as WhiteHat CEO - WhiteHat has named Craig Hinkley as CEO, replacing company founder, Jeremiah Grossman, who has served as interim CEO since the departure of Stephanie Fohn in 2014. http://www.scmagazine.com/craig-hinkley-takes-helm-as-whitehat-ceo/article/409050/

FYI - Whistleblowers' lawyer claims Ark. police dept. put malware on hard drive - A lawyer representing three whistleblowers – all from a police department in Fort Smith – in a case before an Arkansas circuit court has accused the department of planting malware on an external hard drive he had provided for them to populate with emails and other information he made in a discovery request. http://www.scmagazine.com/hard-drive-from-police-department-contained-four-trojans-attorney-says/article/409320/

FYI - GAO warns FAA of internet-connected systems - The Government Accountability Office (GAO) issued its second report of the year pertaining to the Federal Aviation Administration's (FAA) lacking cyber security protocol and warned the agency that its on-flight Wi-Fi, among other things, could put aircrafts and passengers at-risk. http://www.scmagazine.com/gao-issues-report-on-faa-practices/article/409315/

FYI - Target expected to pay $20 million to MasterCard for breach - Negotiations over the settlement between Target and MasterCard are expected to come to a close by the end of the week. The retailer is expected to pay the credit card company nearly $20 million to cover the costs incurred from its major data breach in 2013, the Wall Street Journal reports. http://www.scmagazine.com/target-expected-to-reach-settlement-with-mastercard-for-20-million/article/409302/

ATTACKS, INTRUSIONS, DATA THEFT & LOSS

FYI - Banking threat Emotet expands target list, evades two-factor auth - Kaspersky researchers have analyzed the latest updates to banking malware, called Emotet – which has primarily been used to target online banking customers throughout Europe through social engineering. http://www.scmagazine.com/emotet-targets-online-banking-customers-through-social-engineering/article/408508/

FYI - Bitcoin exchange compromised through SendGrid account - The SendGrid email service favored by companies like Uber and Spotify was used by hackers to worm their way into the Coinbase Bitcoin exchange. http://www.scmagazine.com/bitcoin-exchange-compromised-through-sendgrid-account/article/408515/

FYI - Biggby Coffee announces website intrusion, access gained to database - Michigan-based Biggby Coffee announced that an intruder forced their way into its systems and accessed a database containing personal information. http://www.scmagazine.com/biggby-coffee-announces-website-intrusion-access-gained-to-database/article/408510/

FYI - Hacked French network exposed its own passwords during TV interview - Post-it note on wall revealed network's passwords for YouTube, Instagram. While French authorities continued investigating how the TV5Monde network had 11 of its stations' signals interrupted the night before, one of its staffers proved just how likely a basic password theft might have led to the incident. http://arstechnica.com/security/2015/04/hacked-french-network-exposed-its-own-passwords-during-tv-interview/

FYI - 8th grader charged with felony hacking for changing teacher's digital wallpaper - A Florida middle school student pulled a 'teenage prank' on his teacher, changing the school PC desktop background image, but the 14-year-old now faces felony hacking charges. http://www.computerworld.com/article/2909321/8th-grader-charged-with-felony-hacking-for-changing-teachers-digital-wallpaper.html

FYI - California-based home care services co. notifies employees of data breach, tax fraud - California-based Homebridge, formerly In-Home Supportive Services (IHSS) Consortium, is notifying an undisclosed number of current and former employees that unauthorized access was gained to human resource records, and that the stolen personal information may have been used to file fraudulent tax return forms. http://www.scmagazine.com/california-based-home-care-services-co-notifies-employees-of-data-breach-tax-fraud/article/409006/

Return to the top of the newsletter

WEB SITE COMPLIANCE -
We conclude the series regarding FDIC Supervisory Insights regarding
Incident Response Programs.  (12 of 12)

What the Future Holds


In addition to meeting regulatory requirements and addressing applicable industry best practices, several characteristics tend to differentiate banks. The most successful banks will find a way to integrate incident response planning into normal operations and business processes. Assimilation efforts may include expanding security awareness and training initiatives to reinforce incident response actions, revising business continuity plans to incorporate security incident responses, and implementing additional security monitoring systems and procedures to provide timely incident notification. Ultimately, the adequacy of a bank's IRP reflects on the condition of the information security program along with management's willingness and ability to manage information technology risks. In essence, incident response planning is a management process, the comprehensiveness and success of which provide insight into the quality and attentiveness of management. In this respect, the condition of a bank's IRP, and the results of examiner review of the incident response planning process, fit well within the objectives of the information technology examination as described in the Information Technology-Risk Management Program. 

An IRP is a critical component of a well-formed and effective information security program and has the potential to provide tangible value and benefit to a bank. Similar to the importance of a business continuity planning program as it relates to the threat of natural and man-made disasters, sound IRPs will be necessary to combat new and existing data security threats facing the banking community. Given the high value placed on the confidential customer information held within the financial services industry, coupled with the publicized success of known compromises, one can reasonably assume that criminals will continue to probe an organization's defenses in search of weak points. The need for response programs is real and has been recognized as such by not only state and Federal regulatory agencies (through passage of a variety of legal requirements), but by the banking industry itself. The challenges each bank faces are to develop a reasonable IRP providing protections for the bank and the consumer and to incorporate the IRP into a comprehensive, enterprise-wide information security program. The most successful banks will exceed regulatory requirements to leverage the IRP for business advantages and, in turn, improved protection for the banking industry as a whole.


Return to the top of the newsletter

FFIEC IT SECURITY
-
We conclude our series on the FFIEC interagency Information Security Booklet

MONITORING AND UPDATING - UPDATING

Financial institutions should evaluate the information gathered to determine the extent of any required adjustments to the various components of their security program. The institution will need to consider the scope, impact, and urgency of any new threat. Depending on the new threat or vulnerability, the institution will need to reassess the risk and make changes to its security process (e.g., the security strategy, the controls implementation, or the security testing requirements).

Institution management confronts routine security issues and events on a regular basis. In many cases, the issues are relatively isolated and may be addressed through an informal or targeted risk assessment embedded within an existing security control process. For example, the institution might assess the risk of a new operating system vulnerability before testing and installing the patch. More systemic events like mergers, acquisitions, new systems, or system conversions, however, would warrant a more extensive security risk assessment. Regardless of the scope, the potential impact and the urgency of the risk exposure will dictate when and how controls are changed.


Return to the top of the newsletter

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY - We continue the series on the National Institute of Standards and Technology (NIST) Handbook.

Chapter 20 -
ASSESSING AND MITIGATING THE RISKS TO A HYPOTHETICAL COMPUTER SYSTEM (HGA)

20.3.1 Payroll Fraud

As for most large organizations that control financial assets, attempts at fraud and embezzlement are likely to occur. Historically, attempts at payroll fraud have almost always come from within HGA or the other agencies that operate systems on which HGA depends. Although HGA has thwarted many of these attempts, and some have involved relatively small sums of money, it considers preventing financial fraud to be a critical computer security priority, particularly in light of the potential financial losses and the risks of damage to its reputation with Congress, the public, and other federal agencies.

Attempts to defraud HGA have included the following:

  • Submitting fraudulent time sheets for hours or days not worked, or for pay periods following termination or transfer of employment. The former may take the form of overreporting compensatory or overtime hours worked, or underreporting vacation or sick leave taken. Alternatively, attempts have been made to modify time sheet data after being entered and approved for submission to payroll.
  • Falsifying or modifying dates or data on which one's "years of service" computations are based, thereby becoming eligible for retirement earlier than allowed, or increasing one's pension amount.
  • Creating employee records and time sheets for fictitious personnel, and attempting to obtain their paychecks, particularly after arranging for direct deposit.

20.3.2 Payroll Errors

Of greater likelihood, but of perhaps lesser potential impact on HGA, are errors in the entry of time and attendance data; failure to enter information describing new employees, terminations, and transfers in a timely manner; accidental corruption or loss of time and attendance data; or errors in interagency coordination and processing of personnel transfers.

Errors of these kinds can cause financial difficulties for employees and accounting problems for HGA. If an employee's vacation or sick leave balance became negative erroneously during the last pay period of the year, the employee's last paycheck would be automatically reduced. An individual who transfers between HGA and another agency may risk receiving duplicate paychecks or no paychecks for the pay periods immediately following the transfer. Errors of this sort that occur near the end of the year can lead to errors in W-2 forms and subsequent difficulties with the tax collection agencies.

 

PLEASE NOTE:  Some of the above links may have expired, especially those from news organizations.  We may have a copy of the article, so please e-mail us at examiner@yennik.com if we can be of assistance.  



Company Information
Yennik, Inc.

4409 101st Street
Lubbock, Texas 79424
Office 806-798-7119
Examiner@yennik.com

 

Please visit our other web sites:
VISTA penetration-vulnerability testing
The Community Banker - Bank FFIEC & ADA Web Site Audits
Credit Union FFIEC & ADA Web Site Audits - Bank Auditing Services
US Banks on the Internet  
US Credit Unions on the Internet

All rights reserved; Our logo is registered with the United States Patent and Trademark Office.
Terms and Conditions, Privacy Statement, © Copyright Yennik, Incorporated