R. Kinney Williams - Yennik, Inc.®
R. Kinney Williams
Yennik, Inc.

Internet Banking News
Brought to you by Yennik, Inc. the acknowledged leader in Internet auditing for financial institutions.

April 27, 2014

CONTENT Internet Compliance Web Site Audits
IT Security
 
Internet Privacy
 
Penetration Testing
 
Does Your Financial Institution need an affordable Internet security audit?  Yennik, Inc. has clients in 42 states that rely on our penetration testing audits to ensure proper Internet security settings and to meet the independent diagnostic test requirements of FDIC, OCC, FRB, and NCUA, which provides compliance with Gramm-Leach Bliley Act 501(b) The penetration audit and Internet security testing is an affordable-sophisticated process than goes far beyond the simple scanning of ports.  The audit focuses on a hacker's perspective, which will help you identify real-world weaknesses.  For more information, give R. Kinney Williams a call today at 806-798-7119 or visit http://www.internetbankingaudits.com/.


REMINDER -
This newsletter is available for the Android smart phones and tablets.  Go to the Market Store and search for yennik.

FYI - Why Auditors' InfoSec Advice Is Ignored - Rapid Pace of Change Makes Compliance a Big Challenge - As director of information security issues at the U.S. Government Accountability Office, Gregory Wilshusen dispenses advice to agencies to improve their security - recommendations that aren't always heeded. http://www.govinfosecurity.com/blogs/auditors-infosec-advice-ignored-p-1652

FYI - Microsoft slashes Windows XP custom support prices just days before axing public patches - Reduces after-retirement support costs for large enterprises as much as 95% - Just days before Microsoft retired Windows XP from public support, the company drastically reduced the price of custom support agreements that give large companies and government agencies another year of XP patches, experts reported today. http://www.computerworld.com/s/article/9247708/Microsoft_slashes_Windows_XP_custom_support_prices_just_days_before_axing_public_patches

FYI - Canadian mounties have arrested a teenager who, they say, used the Heartbleed Internet bug to hack into the country's tax agency. Shortly after the Internet bug was revealed to the world last week, the Canada Revenue Agency suffered a data breach that leaked the Social Insurance Numbers of about 900 taxpayers. The agency was forced to shut down its website temporarily to prevent further theft of sensitive personal information. http://money.cnn.com/2014/04/16/technology/security/canada-heartbleed/index.html

FYI - Bill would restrict Calif. retailers from storing certain payment data - Two California legislators have introduced a bill that would severely limit how sensitive card data is stored by retailers. http://www.scmagazine.com/bill-would-restrict-calif-retailers-from-storing-certain-payment-data/article/343355/

FYI - Federal watchdog says SEC security issues put financial data at risk - A congressional watchdog has tasked the U.S. Securities and Exchange Commission (SEC) with addressing a number of security weaknesses impacting its system. http://www.scmagazine.com/federal-watchdog-says-sec-security-issues-put-financial-data-at-risk/article/343345/

FYI - Research shows vulnerabilities go unfixed longer in ASP - While there is no significant difference between the number of security vulnerabilities found, on average, in widely used programming languages, like .Net, Java and ASP, the number of days it takes to make fixes can differ noticeably, a WhiteHat Security report reveals. http://www.scmagazine.com/research-shows-vulnerabilities-go-unfixed-longer-in-asp/article/343357/

FYI - Attack exercise reveals threat-sharing roadblock within health orgs - Health care participants in an industry wide attack exercise expressed concerns about effectively communicating threat intelligence within their organization. http://www.scmagazine.com/attack-exercise-reveals-threat-sharing-roadblock-within-health-orgs/article/343566/

FYI - Bank of England to helm pen-testing effort for UK's finance sector - The Bank of England, which helped oversee a cyber readiness exercise last year for London's finance sector, now plans to lead a large-scale penetration testing effort, according to reports. http://www.scmagazine.com/report-bank-of-england-to-helm-pen-testing-effort-for-uks-finance-sector/article/343946/

ATTACKS, INTRUSIONS, DATA THEFT & LOSS

FYI - POS malware risks millions of payment cards for Michaels, Aaron Brothers shoppers - Following an investigation with two independent security firms that dates back to January, arts and crafts retailer Michaels Stores confirmed on Thursday that, much like retail giant Target, its U.S. stores had experienced a payment card breach. http://www.scmagazine.com/pos-malware-risks-millions-of-payment-cards-for-michaels-aaron-brothers-shoppers/article/343180/

FYI - Hackers steal 500k details from Harley Medical Group - Names and addresses of prospective Harley Medical Group clients, as well as details of the cosmetic procedures they were considering, have been stolen by hackers - The personal details of nearly half a million people considering cosmetic surgery may have been accessed by hackers, it has emerged. http://www.telegraph.co.uk/technology/internet-security/10770922/Hackers-steal-500k-patient-records-from-Harley-Medical-Group.html

FYI - French hard-drive maker LaCie cops to YEAR LONG card data leak - And it didn't find out until the FBI broke the news - French hard drive maker LaCie has held its hands up to a year-long credit card breach. http://www.theregister.co.uk/2014/04/16/lacie_breach/

FYI - Pittsburgh hospital employees hit by tax fraud following breach - Up to 27,000 Pittsburgh hospital workers' personal information could be at-risk following a company data breach. http://www.scmagazine.com/pittsburgh-hospital-employees-hit-by-tax-fraud-following-breach/article/343336/

FYI - AOL Mail hack furthers spam campaign using spoofed accounts - AOL has confirmed that it working to address an issue impacting its Mail service, where users are being spammed by spoofed accounts. http://www.scmagazine.com/aol-mail-hack-furthers-spam-campaign-using-spoofed-accounts/article/343754/

FYI - Iowa State server breach exposes SSNs of nearly 30,000 - Nearly 30,000 current and former students of Iowa State University are being warned that their Social Security numbers were exposed due to a server breach. http://www.scmagazine.com/iowa-state-server-breach-exposes-ssns-of-nearly-30000/article/343732/

FYI - Three laptops stolen from New York podiatry office, 6,475 at risk - Nearly 6,500 patients of Sims and Associates Podiatry may have had personal information – including Social Security numbers – compromised after three laptops containing the patient data were stolen from the New York office. http://www.scmagazine.com/three-laptops-stolen-from-new-york-podiatry-office-6475-at-risk/article/343644/

FYI - Fate of unencrypted drive unknown, PHI of 5,500 in Virginia at risk - More than 5,500 patients of Virginia-based NOVA Chiropractic & Rehab Center of Sterling may have had personal information – including Social Security numbers – compromised after an unencrypted thumb drive containing the data was possibly thrown away. http://www.scmagazine.com/fate-of-unencrypted-drive-unknown-phi-of-5500-in-virginia-at-risk/article/343831/

FYI - DDoS attack almost crashes children's hospital website - Boston Children's Hospital's website almost went down earlier this week in what appears to be a distributed denial-of-service (DDoS) attack. http://www.scmagazine.com/ddos-attack-almost-crashes-childrens-hospital-website/article/344100/

FYI - Second burglary breach within a month for Coordinated Health - A password protected laptop that contained personal information - including Social Security numbers - of more than 700 Coordinated Health patients was stolen from an employee's car in Pennsylvania, making it the health group's second burglary-related data breach to occur within a month. http://www.scmagazine.com/second-burglary-breach-within-a-month-for-coordinated-health/article/344022/

Return to the top of the newsletter

WEB SITE COMPLIANCE -
We continue our review of the FDIC paper "Risk Assessment Tools and Practices or Information System Security." 

VULNERABILITY ASSESSMENT TOOLS

Vulnerability assessment tools, also called security scanning tools, assess the security of network or host systems and report system vulnerabilities. These tools can scan networks, servers, firewalls, routers, and applications for vulnerabilities. Generally, the tools can detect known security flaws or bugs in software and hardware, determine if the systems are susceptible to known attacks and exploits, and search for system vulnerabilities such as settings contrary to established security policies.

In evaluating a vulnerability assessment tool, management should consider how frequently the tool is updated to include the detection of any new weaknesses such as security flaws and bugs. If there is a time delay before a system patch is made available to correct an identified weakness, mitigating controls may be needed until the system patch is issued.

Generally, vulnerability assessment tools are not run in real-time, but they are commonly run on a periodic basis. When using the tools, it is important to ensure that the results from the scan are secure and only provided to authorized parties. The tools can generate both technical and management reports, including text, charts, and graphs. The vulnerability assessment reports can tell a user what weaknesses exist and how to fix them. Some tools can automatically fix vulnerabilities after detection.

FYI - Please remember that we perform vulnerability-penetration testing and would be happy to e-mail {custom4} a proposal. E-mail Kinney Williams at examiner@yennik.com for more information.

Return to the top of the newsletter
 
INFORMATION TECHNOLOGY SECURITY
-
We continue our series on the FFIEC interagency Information Security Booklet.  

SECURITY CONTROLS - IMPLEMENTATION - OPERATING SYSTEM ACCESS (Part 1 of 2)


Financial institutions must control access to system software within the various network clients and servers as well as stand-alone systems. System software includes the operating system and system utilities. The computer operating system manages all of the other applications running on the computer. Common operating systems include IBM OS/400 and AIX, LINUX, various versions of Microsoft Windows, and Sun Solaris. Security administrators and IT auditors need to understand the common vulnerabilities and appropriate mitigation strategies for their operating systems. Application programs and data files interface through the operating system. System utilities are programs that perform repetitive functions such as creating, deleting, changing, or copying files. System utilities also could include numerous types of system management software that can supplement operating system functionality by supporting common system tasks such as security, system monitoring, or transaction processing.

System software can provide high-level access to data and data processing. Unauthorized access could result in significant financial and operational losses. Financial institutions must restrict privileged access to sensitive operating systems. While many operating systems have integrated access control software, third - party security software is available for most operating systems. In the case of many mainframe systems, these programs are essential to ensure effective access control and can often integrate the security management of both the operating system and the applications. Network security software can allow institutions to improve the effectiveness of the administration and security policy compliance for a large number of servers often spanning multiple operating system environments. The critical aspects for access control software, whether included in the operating system or additional security software, are that management has the capability to:

! Restrict access to sensitive or critical system resources or processes and have the capability, depending on the sensitivity to extend protection at the program, file, record, or field level;
! Log user or program access to sensitive system resources including files, programs, processes, or operating system parameters; and
! Filter logs for potential security events and provide adequate reporting and alerting capabilities.


Return to the top of the newsletter

INTERNET PRIVACY
- We continue our series listing the regulatory-privacy examination questions.  When you answer the question each week, you will help ensure compliance with the privacy regulations.

46. 
Does the institution refrain from disclosing, directly or through affiliates, account numbers or similar forms of access numbers or access codes for a consumer's credit card account, deposit account, or transaction account to any nonaffiliated third party (other than to a consumer reporting agency) for telemarketing, direct mail or electronic mail marketing to the consumer, except:

a.  to the institution's agents or service providers solely to market the institution's own products or services, as long as the agent or service provider is not authorized to directly initiate charges to the account; ['12(b)(1)] or

b.  to a participant in a private label credit card program or an affinity or similar program where the participants in the program are identified to the customer when the customer enters into the program? ['12(b)(2)]

(Note: an "account number or similar form of access number or access code" does not include numbers in encrypted form, so long as the institution does not provide the recipient with a means of decryption. ['12(c)(1)] A transaction account does not include an account to which third parties cannot initiate charges. ['12(c)(2)])

 

PLEASE NOTE:  Some of the above links may have expired, especially those from news organizations.  We may have a copy of the article, so please e-mail us at examiner@yennik.com if we can be of assistance.  



Company Information
Yennik, Inc.

4409 101st Street
Lubbock, Texas 79424
Office 806-798-7119
Examiner@yennik.com

 

Please visit our other web sites:
VISTA penetration-vulnerability testing
The Community Banker - Bank FFIEC & ADA Web Site Audits
Credit Union FFIEC & ADA Web Site Audits - Bank Auditing Services
US Banks on the Internet  
US Credit Unions on the Internet

All rights reserved; Our logo is registered with the United States Patent and Trademark Office.
Terms and Conditions, Privacy Statement, © Copyright Yennik, Incorporated