R. Kinney Williams - Yennik, Inc.®
R. Kinney Williams
Yennik, Inc.

Internet Banking News
Brought to you by Yennik, Inc. the acknowledged leader in Internet auditing for financial institutions.

June 21, 2015

Newsletter Content FFIEC IT Security Web Site Audits
Web Site Compliance
NIST Handbook
Penetration Testing
Does Your Financial Institution need an affordable cybersecurity Internet security audit?  Yennik, Inc. has clients in 42 states that rely on our cybersecurity audits to ensure proper Internet security settings and to meet the independent diagnostic test requirements of FDIC, OCC, FRB, and NCUA, which provides compliance with Gramm-Leach Bliley Act 501(b) The cybersecurity penetration audit and Internet security testing is an affordable-sophisticated process than goes far beyond the simple scanning of ports.  The audit focuses on a hacker's perspective, which will help you identify real-world cybersecurity weaknesses.  For more information, give R. Kinney Williams a call today at 806-798-7119 or visit http://www.internetbankingaudits.com/.

- Our cybersecurity testing meets the independent pen-test requirements outlined in the FFIEC Information Security booklet.  Independent pen-testing is part of any financial institution's cybersecurity defense.  To receive due diligence information, agreement and, cost saving fees, please complete the information form at https://yennik.com/forms-vista-info/external_vista_info_form.htm.  All communication is kept strictly confidential.

FYI - OPM breach diverges into finger-pointing and dispute over initial detection - First it was one colossal Office of Personnel Management (OPM) breach, and then it was two. While the U.S. government and law enforcement sort through lost data and grapple with the total breadth of the breaches, Congress has its own work ahead. http://www.scmagazine.com/opm-breach-detection-and-breadth-remains-murky/article/420788/

FYI - IRS Security Summit yields recommendations to fight fraud - Less than three months after convening a security summit that included the Internal Revenue Service (IRS), tax preparation companies, software firms and state government administrators, IRS Commissioner John Koskinen unveiled a series of recommendations and solutions proffered by the group to fight identity theft tax refund fraud. http://www.scmagazine.com/public-and-private-orgs-collaborated-to-help-irs-tighten-security/article/420502/

FYI - Stung, White House orders rapid cybersecurity fixes - The White House has ordered federal agencies to take immediate steps to make some basic cybersecurity fixes. The move follows a massive breach of government employee records. http://www.computerworld.com/article/2935990/security0/stung-white-house-orders-rapid-cybersecurity-fixes.html

FYI - Despite billions spent, US federal agencies struggle with cybersecurity - Data breaches such as the ones at the Office of Personnel Management, Internal Revenue Service, and State Department show government networks remain dangerously exposed. Federal government spending on cybersecurity has increased substantially over the past several years, but a return on that investment remains elusive. http://www.csmonitor.com/World/Passcode/2015/0610/Despite-billions-spent-US-federal-agencies-struggle-with-cybersecurity

FYI - Catching Up on the OPM Breach - What follows is a timeline that helped me get my head on straight about the events that preceded this breach, followed by some analysis and links to other perspectives on the matter. http://krebsonsecurity.com/2015/06/catching-up-on-the-opm-breach/

FYI - Attackers Stole Certificate From Foxconn to Hack Kaspersky With Duqu 2.0 - The nation-state malware used to hack the Russian security firm Kaspersky Lab, as well as hotels associated with Iranian nuclear negotiations, used a digital certificate stolen from one of the world’s top electronics makers: Foxconn. http://www.wired.com/2015/06/foxconn-hack-kaspersky-duqu-2/


FYI - None of us is safe: Major cybersecurity company hacked - Kaspersky Lab detected a sophisticated and expensive hack it says was carried out by a country. That's what Moscow-based Kaspersky Lab said Wednesday when it announced its systems had been attacked, most likely by hackers working on behalf of a country. http://www.cnet.com/news/none-of-us-are-safe-major-cybersecurity-company-hacked/

FYI - Hacked data on millions of US gov't workers was unencrypted - A union representing U.S. government workers says it believes detailed personal information on millions of current and former federal employees that was stolen by hackers was not encrypted. http://www.computerworld.com/article/2935132/cybercrime-hacking/hacked-data-on-millions-of-us-govt-workers-was-unencrypted.html

FYI - OPM hackers tried to breach other fed networks - The full scope of the massive data breach at the Office of Personnel Management might be even larger than first reported, though early indications show the attack was likely contained to OPM servers. http://www.federaltimes.com/story/government/cybersecurity/2015/06/09/opm-hack-other-networks/28749945/

FYI - Attackers stole data in Bundestag breach - Attackers stole data after they accessed the internal server of the Bundestag, Germany's lower house of parliament, according to a report from Deutsche Welle. http://www.scmagazine.com/breach-of-germanys-lower-house-of-parliament-worse-than-believed/article/420485/

FYI - Payment card breach at Holiday Valley Resort - New York-based Holiday Valley Resort announced that malware may have compromised payment cards used at any of the resort's point-of-sale (POS) devices between October 2014 and June. http://www.scmagazine.com/payment-card-breach-at-holiday-valley-resort/article/420490/

FYI - Suspicious activity on LastPass network, data compromised - LastPass announced Monday that suspicious activity was identified on its network on Friday – as a result, LastPass account email addresses, password reminders, server per user salts, and authentication hashes were compromised. http://www.scmagazine.com/lastpass-blocked-suspicious-activity-after-compromise/article/420790/

FYI - Contractor laptops stolen, data on thousands of North Shore-LIJ patients at risk - New York-based North Shore-LIJ Health System is notifying roughly 18,000 patients that five laptop computers – four of which contained their personal information – were stolen in September 2014 from the offices of Global Care Delivery (GCD), a Texas-based contractor. http://www.scmagazine.com/contractor-laptops-stolen-data-on-thousands-of-north-shore-lij-patients-at-risk/article/420755/

FYI - Confusion reigns as Bundestag malware clean-up staggers on - Watchdog fears it would be easier to throw away whole IT system and start again - A malware infestation at the Bundestag is proving harder to clean up than first predicted, with several unconfirmed local reports going as far as suggesting that techies might have to rebuild the entire network from scratch. http://www.theregister.co.uk/2015/06/12/bundestag_malware_outbreak_confusion/

FYI - FBI, Justice Department investigate Cardinals in Astros hack - The FBI and Justice Department are investigating whether employees with the St. Louis Cardinals are responsible for hacking into and stealing information from computer systems belonging to the Houston Astros, a Tuesday report posted to the Major League Baseball (MLB) website said.

FYI - North Dakota Workforce Safety Institute experiences a breach - Approximately 43,000 incident reports and 13,000 payroll reports were compromised in a breach of a North Dakota Workforce and Safety Institute (WSI) server, after the North Dakota Information Technology Department (ITD) detected unusual activity on a server. http://www.scmagazine.com/north-dakota-wsi-experiences-breach-thousands-at-risk/article/421053/

FYI - Medical Information Engineering's network breached; undisclosed number of patients compromised - Medical Information Engineering (MIE), a Fort Wayne, Ind.-based medical software company, is notifying customers of a cybersecurity incident that provided unauthorized access to its network and some patients' personal health information. http://www.scmagazine.com/personal-health-information-compromised-in-mie-breach/article/421033/

FYI - Magazine publisher loses $1.5 million in phishing attack - Bonnier Publications, the publisher behind Saveur and Popular Science, might have lost up to $1.5 million in a successful phishing attack in May. http://www.scmagazine.com/bonnier-publications-falls-victim-to-chinese-phishing-email/article/421271/

FYI - Unauthorized access gained to Heartland Dental databases - Illinois-based Heartland Dental is notifying an undisclosed number of individuals that unauthorized access was gained to a limited portion of its IT systems, and that personal data may have been compromised. http://www.scmagazine.com/unauthorized-access-gained-to-heartland-dental-databases/article/421161/

FYI - Lingerie seller's ecommerce server compromised, credit cards at risk - Lingerie seller is notifying an undisclosed number of individuals that its ecommerce server was compromised and that personal information may have been misappropriated. http://www.scmagazine.com/lingerie-sellers-ecommerce-server-compromised-credit-cards-at-risk/article/421523/

Return to the top of the newsletter

Risk Management of Outsourced Technology Services ( Part 1 of 4)
 Purpose and Background
 This statement focuses on the risk management process of identifying, measuring, monitoring, and controlling the risks associated with outsourcing technology services.1 Financial institutions should consider the guidance outlined in this statement and the attached appendix in managing arrangements with their technology service providers.  While this guidance covers a broad range of issues that financial institutions should address, each financial institution should apply those elements based on the scope and importance of the outsourced services as well as the risk to the institution from the services.
 Financial institutions increasingly rely on services provided by other entities to support an array of technology-related functions. While outsourcing to affiliated or nonaffiliated entities can help financial institutions manage costs, obtain necessary expertise, expand customer product offerings, and improve services, it also introduces risks that financial institutions should address.  This guidance covers four elements of a risk management process: risk assessment, selection of
 service providers, contract review, and monitoring of service providers.

Return to the top of the newsletter

We continue the series  from the FDIC "Security Risks Associated with the Internet." 
 Data Integrity 

 Potentially, the open architecture of the Internet can allow those with specific knowledge and tools to alter or modify data during a transmission. Data integrity could also be compromised within the data storage system itself, both intentionally and unintentionally, if proper access controls are not maintained. Steps must be taken to ensure that all data is maintained in its original or intended form.  


 Essential in electronic commerce is the need to verify that a particular communication, transaction, or access request is legitimate. To illustrate, computer systems on the Internet are identified by an Internet protocol (IP) address, much like a telephone is identified by a phone number. Through a variety of techniques, generally known as "IP spoofing" (i.e., impersonating), one computer can actually claim to be another. Likewise, user identity can be misrepresented as well. In fact, it is relatively simple to send email which appears to have come from someone else, or even send it anonymously. Therefore, authentication controls are necessary to establish the identities of all parties to a communication.

Return to the top of the newsletter

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY - We continue the series on the National Institute of Standards and Technology (NIST) Handbook.

Chapter 20 -

20.4.3 Protection Against Interruption of Operations  (2 of 2)

Division Contingency Planning

HGA's divisions also must develop and maintain their own contingency plans. The plans must identify critical business functions, the system resources and applications on which they depend, and the maximum acceptable periods of interruption that these functions can tolerate without significant reduction in HGA's ability to fulfill its mission. The head of each division is responsible for ensuring that the division's contingency plan and associated support activities are adequate.

For each major application used by multiple divisions, a chief of a single division must be designated as the application owner. The designated official (supported by his or her staff) is responsible for addressing that application in the contingency plan and for coordinating with other divisions that use the application.

If a division relies exclusively on computer resources maintained by COG (Computer Operations Group) (e.g., the LAN), it need not duplicate COG's contingency plan, but is responsible for reviewing the adequacy of that plan. If COG's plan does not adequately address the division's needs, the division must communicate its concerns to the COG Director. In either situation, the division must make known the criticality of its applications to the COG. If the division relies on computer resources or services that are not provided by COG, the division is responsible for (1) developing its own contingency plan or (2) ensuring that the contingency plans of other organizations (e.g., the WAN service provider) provide adequate protection against service disruptions.


PLEASE NOTE:  Some of the above links may have expired, especially those from news organizations.  We may have a copy of the article, so please e-mail us at examiner@yennik.com if we can be of assistance.  

Company Information
Yennik, Inc.

4409 101st Street
Lubbock, Texas 79424
Office 806-798-7119


Please visit our other web sites:
VISTA penetration-vulnerability testing
The Community Banker - Bank FFIEC & ADA Web Site Audits
Credit Union FFIEC & ADA Web Site Audits - Bank Auditing Services
US Banks on the Internet  
US Credit Unions on the Internet

All rights reserved; Our logo is registered with the United States Patent and Trademark Office.
Terms and Conditions, Privacy Statement, © Copyright Yennik, Incorporated