R. Kinney Williams - Yennik, Inc.®
R. Kinney Williams
Yennik, Inc.

Internet Banking News
Brought to you by Yennik, Inc. the acknowledged leader in Internet auditing for financial institutions.

June 5, 2016

Newsletter Content FFIEC IT Security Web Site Audits
Web Site Compliance
NIST Handbook
Penetration Testing
Does Your Financial Institution need an affordable cybersecurity Internet security audit?  Yennik, Inc. has clients in 42 states that rely on our cybersecurity audits to ensure proper Internet security settings and to meet the independent diagnostic test requirements of FDIC, OCC, FRB, and NCUA, which provides compliance with Gramm-Leach Bliley Act 501(b) as well as the penetration study complies with the FFIEC Cybersecurity Assessment Tool regarding resilience testing The cybersecurity penetration audit and Internet security testing is an affordable-sophisticated process than goes far beyond the simple scanning of ports.  The audit focuses on a hacker's perspective, which will help you identify real-world cybersecurity weaknesses.  For more information, give R. Kinney Williams a call today at 806-798-7119 or visit http://www.internetbankingaudits.com/.

- Beware of keystroke loggers disguised as USB phone chargers, FBI warns- Private industry notification comes 15 months after debut of KeySweeper. The author of the FBI advisory contacted Ars to say the point he wanted to convey is that threat stems not from KeySweeper itself, but from similar types of devices that could easily contain additional functionality. http://arstechnica.com/security/2016/05/beware-of-keystroke-loggers-disguised-as-usb-phone-chargers-fbi-warns/

FYI - Up to a dozen banks are reportedly investigating potential SWIFT breaches - The incidents are part of a larger trend of cybercriminals targeting financial institutions directly instead of customers - http://www.computerworld.com/article/3075450/security/up-to-a-dozen-banks-are-reportedly-investigating-potential-swift-breaches.html

FYI - Workplace security awareness programs lacking in efficacy, says study - Just because a company offers a cybersecurity awareness and training program to its employees doesn't mean it's necessarily doing enough to change workers' dangerous online behaviors, according to a new report. http://www.scmagazine.com/workplace-security-awareness-programs-lacking-in-efficacy-says-study/article/499162/

FYI - CEO sacked after aircraft company grounded by whaling attack - Following a successful whaling attack in January which cost FACC €40 million, the company has sacked both its CFO and CEO. http://www.scmagazine.com/ceo-sacked-after-aircraft-company-grounded-by-whaling-attack/article/499258/

FYI - Feinstein-Burr's bonkers backdoor crypto law is dead in the water - US senators' bill won't make it to the floor of Congress - A proposed piece of US legislation that would have required American tech companies to cripple the encryption in their products is dead in the water. http://www.theregister.co.uk/2016/05/27/backdoor_bill_dead/

FYI - Senate bill tasks FAA to oversee sharing of cyber threat information - The Federal Aviation Administration could find itself with more oversight of the cybersecurity threats facing industry if a senator’s information-sharing bill makes it through committee. http://federalnewsradio.com/legislation/2016/05/senate-bills-tasks-faa-oversee-sharing-cyber-threat-information/

FYI - Don't connect your charging cell to a computer or you may get hacked! - Connecting your mobile device to a computer using a USB cable could make you vulnerable to hackers. http://www.scmagazine.com/dont-connect-your-charging-cell-to-a-computer-or-you-may-get-hacked/article/499558/

FYI - Massive drop in cyberattacks on banks, Lloyds - Lloyds Banking Group, a London-based financial institution, claimed it's seen a substantial reduction in the number of cyberattacks it was hit with this year. http://www.scmagazine.com/massive-drop-in-cyberattacks-on-banks-lloyds/article/499566/

FYI - Appeals court: No warrant needed to access cell location data - A U.S. appeals court overturned a ruling from last year that law enforcement authorities must obtain a warrant to access a suspect's location. http://www.scmagazine.com/appeals-court-no-warrant-needed-to-access-cell-location-data/article/500255/


FYI - FOURTH bank hit by SWIFT hackers - A fourth bank, this time in the Philippines, has been attacked by hackers targeting the SWIFT inter-bank transfer system. http://www.theregister.co.uk/2016/05/27/fourth_bank_hit_by_swift_hackers/

FYI - 65M Tumblr accounts for sale after 2013 breach - More than 65 million Tumblr accounts from a 2013 breach were spotted for sale on the dark web. http://www.scmagazine.com/tumblr-accounts-from-2013-breach-for-sale-on-dark-web/article/499562/

Return to the top of the newsletter

Disclosures/Notices (Part 1 of 2)
 Several regulations require disclosures and notices to be given at specified times during a financial transaction. For example, some regulations require that disclosures be given at the time an application form is provided to the consumer. In this situation, institutions will want to ensure that disclosures are given to the consumer along with any application form. Institutions may accomplish this through various means, one of which may be through the automatic presentation of disclosures with the application form. Regulations that allow disclosures/notices to be delivered electronically and require institutions to deliver disclosures in a form the customer can keep have been the subject of questions regarding how institutions can ensure that the consumer can "keep" the disclosure. A consumer using certain electronic devices, such as Web TV, may not be able to print or download the disclosure. If feasible, a financial institution may wish to include in its on-line program the ability for consumers to give the financial institution a non-electronic address to which the disclosures can be mailed.

Return to the top of the newsletter

We continue our series on the FFIEC interagency Information Security Booklet.  

 AUTHENTICATION - Public Key Infrastructure (Part 1 of 3)
 Public key infrastructure (PKI), if properly implemented and maintained, may provide a strong means of authentication. By combining a variety of hardware components, system software, policies, practices, and standards, PKI can provide for authentication, data integrity, defenses against customer repudiation, and confidentiality. The system is based on public key cryptography in which each user has a key pair - a unique electronic value called a public key and a mathematically related private key. The public key is made available to those who need to verify the user's identity.
 The private key is stored on the user's computer or a separate device such as a smart card. When the key pair is created with strong encryption algorithms and input variables, the probability of deriving the private key from the public key is extremely remote. The private key must be stored in encrypted text and protected with a password or PIN to avoid compromise or disclosure. The private key is used to create an electronic identifier called a digital signature that uniquely identifies the holder of the private key and can only be authenticated with the corresponding public key.

Return to the top of the newsletter

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY - We continue the series on the National Institute of Standards and Technology (NIST) Handbook.
We continue the series on the National Institute of Standards and Technology (NIST) Handbook.
 A computer security contingency is an event with the potential to disrupt computer operations, thereby disrupting critical mission and business functions. Such an event could be a power outage, hardware failure, fire, or storm. If the event is very destructive, it is often called a disaster.
 To avert potential contingencies and disasters or minimize the damage they cause organizations can take steps early to control the event. Generally called contingency planning, this activity is closely related to incident handling, which primarily addresses malicious technical threats such as hackers and viruses.
 Contingency planning involves more than planning for a move offsite after a disaster destroys a data center. It also addresses how to keep an organization's critical functions operating in the event of disruptions, both large and small. This broader perspective on contingency planning is based on the distribution of computer support throughout an organization.
 This chapter presents the contingency planning process in six steps:
 1)  Identifying the mission- or business-critical functions.
 2)  Identifying the resources that support the critical functions.
 3)  Anticipating potential contingencies or disasters.
 4)  Selecting contingency planning strategies.
 5)  Implementing the contingency strategies.
 6)  Testing and revising the strategy.
 Contingency planning directly supports an organization's goal of continued operations. Organizations practice contingency planning because it makes good business sense.

Some of the above links may have expired, especially those from news organizations.  We may have a copy of the article, so please e-mail us at examiner@yennik.com if we can be of assistance.  

Company Information
Yennik, Inc.

4409 101st Street
Lubbock, Texas 79424
Office 806-798-7119


Please visit our other web sites:
VISTA penetration-vulnerability testing
The Community Banker - Bank FFIEC & ADA Web Site Audits
Credit Union FFIEC & ADA Web Site Audits - Bank Auditing Services
US Banks on the Internet  
US Credit Unions on the Internet

All rights reserved; Our logo is registered with the United States Patent and Trademark Office.
Terms and Conditions, Privacy Statement, © Copyright Yennik, Incorporated