Yennik, Inc.®
Yennik, Inc.

Internet Banking News
Brought to you by Yennik, Inc. the acknowledged leader in Internet auditing for financial institutions.

July 1, 2007

CONTENT Internet Compliance Information Systems Security
IT Security Question
 
Internet Privacy
 
Website for Penetration Testing
 
Does Your Financial Institution need an affordable Internet security audit?  Yennik, Inc. has clients in 41 states that rely on our penetration testing audits to ensure proper Internet security settings and to meet the independent diagnostic test requirements of FDIC, OCC, OTS, FRB, and NCUA, which provides compliance with Gramm-Leach Bliley Act 501(b) The penetration audit and Internet security testing is an affordable-sophisticated process than goes far beyond the simple scanning of ports.  The audit focuses on a hacker's perspective, which will help you identify real-world weaknesses.  For more information, give R. Kinney Williams a call today at 806-798-7119 or visit http://www.internetbankingaudits.com/.

 

FYI - Gangs infect 10,000 websites to steal users' bank details - Hackers have launched an assault on websites in Italy and around the world dubbed the Italian Job in a move seen by internet security experts as the next step in the escalating problem of cyber crime. http://technology.guardian.co.uk/news/story/0,,2106982,00.html?gusrc=rss&feed=12

FYI - Pentagon reports cyber attack - The Defense Department took as many as 1,500 computers off line because of a cyber attack, Pentagon officials said. http://www.azstarnet.com/allheadlines/188634

FYI - GAO - Health Information Technology: Efforts Continue but Comprehensive Privacy Approach Needed for National Strategy.
Article - http://www.gao.gov/cgi-bin/getrpt?GAO-07-988T
Highlights - http://www.gao.gov/highlights/d07988thigh.pdf

FYI - ChoicePoint Details Data Breach Lessons - Few companies know as well as ChoicePoint the consequences of failing to secure the personal information of consumers. The organization's CIO explained how it recovered and offered lessons other enterprises that handle sensitive data can learn from ChoicePoint at the IDC IT Forum & Expo in Boston. http://www.pcworld.com/article/id,132795-c,cybercrime/article.html

FYI - Federal info security isn't just about FISMA compliance, auditor says - Most agencies still have security gaps, according to Gregory Wilshusen - Despite some progress in recent years, most federal agencies still have significant gaps in their information security controls, according to Gregory Wilshusen, director of information security issues at the Government Accountability Office (GAO). http://www.computerworld.com/action/article.do?command=viewArticleBasic&articleId=9024658

FYI - PayPal offers a key to secure transactions - Online payment service PayPal, a subsidiary of eBay, rolled out on Friday a second factor for authenticating users online -- a key fob that generates a pseudo random security code every 30 seconds. http://www.securityfocus.com/brief/528

FYI - IT Managers Say Risk Of Data Loss Is Bad And Getting Worse -Nearly half of IT and compliance professionals say their companies aren't doing enough to cut data loss, and many also say it's only going to get worse. http://www.informationweek.com/shared/printableArticle.jhtml?articleID=199905013

FYI - Data breaches seen to threaten IT job security - A majority of IT professionals believe they will lose their jobs if their organization suffers a security breach. Most IT professionals feel their jobs would be on the line in the event of a security breach and at the same time feel ill-equipped to prevent such corporate or personal data loss, according to a survey released this week. http://www.networkworld.com/news/2007/050207-data-breach-job-security.html

MISSING COMPUTERS/DATA

FYI - 10,000 documents leaked / Data from police officer's PC uploaded onto Internet via Winny - About 10,000 documents and images have been accidentally uploaded onto the Internet from the private computer of a senior policeman, including investigators' records and personal information of people subject to investigation, the Metropolitan Police Department said. http://www.yomiuri.co.jp/dy/national/20070614TDY01004.htm

FYI - State hires computer security expert - The state has hired a computer security expert who specializes in civil and criminal cases to determine the likelihood of someone getting access to the data on a stolen backup storage device, Gov. Ted Strickland said.
http://www.ohio.com/mld/beaconjournal/news/state/17383005.htm
http://zanesvilletimesrecorder.com/apps/pbcs.dll/article?AID=/20070616/UPDATES01/70616002/1002/NEWS01

FYI - Flash drive containing students' SSNs stolen from GVSU - A flash drive containing some confidential information was stolen from Lake Huron Hall on Grand Valley State University's Allendale Campus on May 24.
http://www.woodtv.com/Global/story.asp?S=6643715&nav=0Rce
http://www.mlive.com/news/grpress/index.ssf?/base/news-36/118173691983190.xml&coll=6

Return to the top of the newsletter

WEB SITE COMPLIANCE -
OCC - Threats from Fraudulent Bank Web Sites - Risk Mitigation and Response Guidance for Web Site Spoofing Incidents (Part 3 of 5)

PROCEDURES TO ADDRESS SPOOFING - Information Gathering

After a bank has determined that it is the target of a spoofing incident, it should collect available information about the attack to enable an appropriate response.  The information that is collected will help the bank identify and shut down the fraudulent Web site, determine whether customer information has been obtained, and assist law enforcement authorities with any investigation.  Below is a list of useful information that a bank can collect.  In some cases, banks will require the assistance of information technology specialists or their service providers to obtain this information.

*  The means by which the bank became aware that it was the target of a spoofing incident (e.g., report received through Website, fax, telephone, etc.);
*  Copies of any e-mails or documentation regarding other forms of communication (e.g., telephone calls, faxes, etc.) that were used to direct customers to the spoofed Web sites;
*  Internet Protocol (IP) addresses for the spoofed Web sites along with identification of the companies associated with the IP addresses;
*  Web-site addresses (universal resource locator) and the registration of the associated domain names for the spoofed site; and
*  The geographic locations of the IP address (city, state, and country).


Return to the top of the newsletter

INFORMATION TECHNOLOGY SECURITY
- We continue our series on the FFIEC interagency Information Security Booklet.

MONITORING AND UPDATING - MONITORING

Effective monitoring of threats includes both non - technical and technical sources. Nontechnical sources include organizational changes, business process changes, new business locations, increased sensitivity of information, or new products and services. Technical sources include new systems, new service providers, and increased access. Security personnel and financial institution management must remain alert to emerging threats and vulnerabilities. This effort could include the following security activities:

! Senior management support for strong security policy awareness and compliance. Management and employees must remain alert to operational changes that could affect security and actively communicate issues with security personnel. Business line managers must have responsibility and accountability for maintaining the security of their personnel, systems, facilities, and information.

! Security personnel should monitor the information technology environment and review performance reports to identify trends, new threats, or control deficiencies. Specific activities could include reviewing security and activity logs, investigating operational anomalies, and routinely reviewing system and application access levels.

! Security personnel and system owners should monitor external sources for new technical and nontechnical vulnerabilities and develop appropriate mitigation solutions to address them. Examples include many controls discussed elsewhere in this booklet including:

 -  Establishing an effective configuration management process that monitors for vulnerabilities in hardware and software and establishes a process to install and test security patches,

 -  Maintaining up - to - date anti - virus definitions and intrusion detection attack definitions, and

 -  Providing effective oversight of service providers and vendors to identify and react to new security issues.

! Senior management should require periodic security selfassessments and audits to provide an ongoing assessment of policy compliance and ensure prompt corrective action of significant deficiencies.

! Security personnel should have access to automated tools appropriate for the complexity of the financial institution systems. Automated security policy and security log analysis tools can significantly increase the effectiveness and productivity of security personnel.


Return to the top of the newsletter

IT SECURITY QUESTION: 
DATA SECURITY

3. Determine whether individual and group access to data is based on business needs.

Return to the top of the newsletter

INTERNET PRIVACY
- We continue our series listing the regulatory-privacy examination questions.  When you answer the question each week, you will help ensure compliance with the privacy regulations.

Financial Institution Duties ( Part 3 of 6)

Requirements for Notices

Clear and Conspicuous. Privacy notices must be clear and conspicuous, meaning they must be reasonably understandable and designed to call attention to the nature and significance of the information contained in the notice. The regulations do not prescribe specific methods for making a notice clear and conspicuous, but do provide examples of ways in which to achieve the standard, such as the use of short explanatory sentences or bullet lists, and the use of plain-language headings and easily readable typeface and type size. Privacy notices also must accurately reflect the institution's privacy practices.

Delivery Rules. Privacy notices must be provided so that each recipient can reasonably be expected to receive actual notice in writing, or if the consumer agrees, electronically. To meet this standard, a financial institution could, for example, (1) hand-deliver a printed copy of the notice to its consumers, (2) mail a printed copy of the notice to a consumer's last known address, or (3) for the consumer who conducts transactions electronically, post the notice on the institution's web site and require the consumer to acknowledge receipt of the notice as a necessary step to completing the transaction.

For customers only, a financial institution must provide the initial notice (as well as the annual notice and any revised notice) so that a customer may be able to retain or subsequently access the notice. A written notice satisfies this requirement. For customers who obtain financial products or services electronically, and agree to receive their notices on the institution's web site, the institution may provide the current version of its privacy notice on its web site.

 

PLEASE NOTE:  Some of the above links may have expired, especially those from news organizations.  We may have a copy of the article, so please e-mail us at examiner@yennik.com if we can be of assistance.  

Back Button

Company Information
Yennik, Inc.

4409 101st Street
Lubbock, Texas 79424
Office 806-798-7119
Examiner@yennik.com

 

Please visit our other web sites:
VISTA penetration-vulnerability testing
The Community Banker - Bank FFIEC & ADA Web Site Audits
Credit Union FFIEC & ADA Web Site Audits - Bank Auditing Services
US Banks on the Internet  
US Credit Unions on the Internet

All rights reserved; Our logo is registered with the United States Patent and Trademark Office.
Terms and Conditions, Privacy Statement, © Copyright Yennik, Incorporated