R. Kinney Williams - Yennik, Inc.
R. Kinney Williams
Yennik, Inc.

Internet Banking News
Brought to you by Yennik, Inc. the acknowledged leader in Internet auditing for financial institutions.

September 1, 2019

wsletter Content FFIEC IT Security FFIEC & ADA Web Site Audits
Web Site Compliance NIST Handbook Penetration Testing
Does Your Financial Institution need an affordable cybersecurity Internet security audit?  Yennik, Inc. has clients in 42 states that rely on our cybersecurity audits to ensure proper Internet security settings and to meet the independent diagnostic test requirements of FDIC, OCC, FRB, and NCUA, which provides compliance with Gramm-Leach Bliley Act 501(b) as well as the penetration test complies with the FFIEC Cybersecurity Assessment Tool regarding resilience testing The cybersecurity penetration audit and Internet security testing is an affordable-sophisticated process than goes far beyond the simple scanning of ports.  The audit focuses on a hacker's perspective, which will help you identify real-world cybersecurity weaknesses.  For more information, give R. Kinney Williams a call today at Office/Cell 806-535-8300 or visit http://www.internetbankingaudits.com/.

- Lack of cyber investment could spell trouble for smart cities: report - A lack of investment in cybersecurity protections could imperil the future of smart cities and the Internet of Things devices on which they run, a new report from ABI Research warns. https://www.scmagazine.com/home/security-news/lack-of-cyber-investment-could-spell-trouble-for-smart-cities-report/

Nowhere to turn for middle market companies decimated by cybercrime - Middle-market companies are facing the bleak reality that they must increasingly combat cyber threats on their own – with little help and fewer resources than their larger counterparts. https://www.scmagazine.com/home/opinion/executive-insight/nowhere-to-turn-for-middle-market-companies-decimated-by-cybercrime/

While one Texas county shook off ransomware, small cities took full punch - Lubbock County managed to isolate the attack quickly. Others, not so much. Few details have emerged about the coordinated ransomware attack that struck 22 local governments in Texas last week. But five local governments affected by the attack have been identified. https://arstechnica.com/information-technology/2019/08/while-one-texas-county-shook-off-ransomware-small-cities-took-full-punch/

When Ransomware Cripples a City, Who’s to Blame? This I.T. Chief Is Fighting Back - The former information technology director of Lake City, the northern Florida city that was forced to pay out nearly half a million dollars after a ransomware attack this summer, was blamed for the breach, and for the long time it took to recover. https://www.nytimes.com/2019/08/22/us/florida-ransomware-hacking-it.html

Rockville Center School District pays $88,000 ransom - files that had been encrypted by Ryuk ransomware. http://www.scmagazine.com/home/security-news/ransomware/rockville-center-school-district-pays-100000-ransom/

Seven best practices for an effective phishing simulation program - You are well aware of the risks you face as a security professional—after all, they’re numerous, constantly evolving and ever present. https://www.scmagazine.com/home/opinion/executive-insight/seven-best-practices-for-an-effective-phishing-simulation-program/


FYI - MoviePass database exposes 161 million records - An exposed database on a MoviePass subdomain housing 161 million records was left unsecured and exposed credit card and customer card information on at least 60,000 of the ticket service’s customers. https://www.scmagazine.com/home/security-news/moviepass-database-exposes-161-million-records/

Mass. General breach exposes private info on 9,900 in research programs - A data breach in the neurology department of Massachusetts General Hospital (MGH) exposed private data, including genetic information, on 9,900 people participating in research programs, the hospital said, placing the blame on an “unauthorized third party” who gained access between June 10 and June 16. https://www.scmagazine.com/home/security-news/data-breach/mass-general-breach-exposes-private-info-on-9900-in-research-programs/

Mastercard says German Priceless Specials loyalty program breached - Mastercard Inc. has confirmed its German loyalty program partner Priceless Specials has been breached, exposing information from the accounts of 90,000 consumer customers. https://www.scmagazine.com/home/security-news/mastercard-says-german-priceless-specials-loyalty-program-breached/

Rockville Center School District pays $88,000 ransom - The Rockville Center, N.Y. School District paid an $88,000 ransom to regain access to files that had been encrypted by Ryuk ransomware. https://www.scmagazine.com/home/security-news/ransomware/rockville-center-school-district-pays-100000-ransom/

Data breach of Hostinger exposes 14 million users - Web hosting provider and Internet domain registrar Hostinger International, Ltd. has disclosed that an unauthorized third party breached its internal system API last Friday and gained access to data belonging to roughly 14 million users. https://www.scmagazine.com/home/security-news/data-breach/data-breach-of-hostinger-exposes-14-million-users/

Mastercard says German Priceless Specials loyalty program breached - Mastercard Inc. has confirmed its German loyalty program partner Priceless Specials has been breached, exposing information from the accounts of 90,000 consumer customers. https://www.scmagazine.com/home/security-news/mastercard-says-german-priceless-specials-loyalty-program-breached/

Almost 200K affected by Presbyterian Healthcare Services data breach - Presbyterian Healthcare Services is informing 183,000 of its patients and health plan members that their PII was compromised after an employee fell victim to a phishing scam. https://www.scmagazine.com/home/security-news/data-breach/almost-200k-affected-by-presbyterian-healthcare-services-data-breach/

Breach exposes data associated with customers of Imperva’s Cloud WAF product - Cybersecurity company Imperva today disclosed a data breach that impacts certain customers of its Cloud Web Application Firewall (WAF) product who had accounts through Sept. 15, 2017. https://www.scmagazine.com/home/security-news/data-breach/breach-exposes-data-associated-with-customers-of-impervas-cloud-waf-product/

Return to the top of the newsletter

We continue covering some of the issues discussed in the "Risk Management Principles for Electronic Banking" published by the Basel Committee on Bank Supervision.
  Sound Audit Trail Practices for E-Banking Systems

  1. Sufficient logs should be maintained for all e-banking transactions to help establish a clear audit trail and assist in dispute resolution.
  2. E-banking systems should be designed and installed to capture and maintain forensic evidence in a manner that maintains control over the evidence, and prevents tampering and the collection of false evidence.
  3. In instances where processing systems and related audit trails are the responsibility of a third-party service provider:
  a)   The bank should ensure that it has access to relevant audit trails maintained by the service provider.
  b)   Audit trails maintained by the service provider meet the bank's standards.

Return to the top of the newsletter

FFIEC IT SECURITY - We continue our series on the FFIEC interagency Information Security Booklet.  
  Since security is primarily based on the encryption keys, effective key management is crucial. Effective key management systems are based on an agreed set of standards, procedures, and secure methods that address
  ! Generating keys for different cryptographic systems and different applications;
  ! Generating and obtaining public keys;
  ! Distributing keys to intended users, including how keys should be activated when received;
  ! Storing keys, including how authorized users obtain access to keys;
  ! Changing or updating keys including rules on when keys should be changed and how this will be done;
  ! Dealing with compromised keys;
  ! Revoking keys and specifying how keys should be withdrawn or deactivated;
  ! Recovering keys that are lost or corrupted as part of business continuity management;
  ! Archiving keys;
  ! Destroying keys;
  ! Logging the auditing of key management - related activities; and
  ! Instituting defined activation and deactivation dates, limiting the usage period of keys.
  Secure key management systems are characterized by the following precautions.
  ! Key management is fully automated (e.g. personnel do not have the opportunity to expose a key or influence the key creation).
  ! No key ever appears unencrypted.
  ! Keys are randomly chosen from the entire key space, preferably by hardware.
  ! Key - encrypting keys are separate from data keys. No data ever appears in clear text that was encrypted using a key - encrypting key. (A key - encrypting key is used to encrypt other keys, securing them from disclosure.)
  ! All patterns in clear text are disguised before encrypting.
  ! Keys with a long life are sparsely used. The more a key is used, the greater the opportunity for an attacker to discover the key.
  ! Keys are changed frequently. The cost of changing keys rises linearly while the cost of attacking the keys rises exponentially. Therefore, all other factors being equal, changing keys increases the effective key length of an algorithm.
  ! Keys that are transmitted are sent securely to well - authenticated parties.
  ! Key generating equipment is physically and logically secure from construction through receipt, installation, operation, and removal from service.

Return to the top of the newsletter

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY - We continue the series on the National Institute of Standards and Technology (NIST) Handbook.

Chapter 20 -

20.5.2 Vulnerabilities Related to Payroll Errors

HGA's management has established procedures for ensuring the timely submission and interagency coordination of paperwork associated with personnel status changes. However, an unacceptably large number of troublesome payroll errors during the past several years has been traced to the late submission of personnel paperwork. The risk assessment documented the adequacy of HGA's safeguards, but criticized the managers for not providing sufficient incentives for compliance.

20.5.3 Vulnerabilities Related to Continuity of Operations

COG Contingency Planning

The risk assessment commended HGA for many aspects of COG's contingency plan, but pointed out that many COG personnel were completely unaware of the responsibilities the plan assigned to them. The assessment also noted that although HGA's policies require annual testing of contingency plans, the capability to resume HGA's computer-processing activities at another cooperating agency has never been verified and may turn out to be illusory.

Division Contingency Planning

The risk assessment reviewed a number of the application-oriented contingency plans developed by HGA's divisions (including plans related to time and attendance). Most of the plans were cursory and attempted to delegate nearly all contingency planning responsibility to COG. The assessment criticized several of these plans for failing to address potential disruptions caused by lack of access to (1) computer resources not managed by COG and (2) nonsystem resources, such as buildings, phones, and other facilities. In particular, the contingency plan encompassing the time and attendance application was criticized for not addressing disruptions caused by WAN and mainframe outages.

Virus Prevention

The risk assessment found HGA's virus-prevention policy and procedures to be sound, but noted that there was little evidence that they were being followed. In particular, no COG personnel interviewed had ever run a virus scanner on a PC on a routine basis, though several had run them during publicized virus scares. The assessment cited this as a significant risk item.

Accidental Corruption and Loss of Data

The risk assessment concluded that HGA's safeguards against accidental corruption and loss of time and attendance data were adequate, but that safeguards for some other kinds of data were not. The assessment included an informal audit of a dozen randomly chosen PCs and PC users in the agency. It concluded that many PC users store significant data on their PC's hard disks, but do not back them up. Based on anecdotes, the assessment's authors stated that there appear to have been many past incidents of loss of information stored on PC hard disks and predicted that such losses would continue.

Some of the above links may have expired, especially those from news organizations.  We may have a copy of the article, so please e-mail us at examiner@yennik.com if we can be of assistance.