R. Kinney Williams - Yennik, Inc.
R. Kinney Williams
Yennik, Inc.

Internet Banking News
Brought to you by Yennik, Inc. the acknowledged leader in Internet auditing for financial institutions.

September 19, 2010

CONTENT Internet Compliance Information Systems Security
IT Security Question
 
Internet Privacy
 
Website for Penetration Testing
 
Does Your Financial Institution need an affordable Internet security audit?  Yennik, Inc. has clients in 42 states that rely on our penetration testing audits to ensure proper Internet security settings and to meet the independent diagnostic test requirements of FDIC, OCC, OTS, FRB, and NCUA, which provides compliance with Gramm-Leach Bliley Act 501(b) The penetration audit and Internet security testing is an affordable-sophisticated process than goes far beyond the simple scanning of ports.  The audit focuses on a hacker's perspective, which will help you identify real-world weaknesses.  For more information, give R. Kinney Williams a call today at 806-798-7119 or visit http://www.internetbankingaudits.com/.


FYI - The ISACA Information Security and Risk Management Conference in Las Vegas last week was a great success.  I enjoyed seeing old friends and meeting new ones.  I look forward to seeing you all next year.

FYI - Conn. Gets Tough on Insurance Breaches - Insurers Must Report Incidents Within 5 Days - All insurance companies doing business in Connecticut now must report information breaches to state authorities within five calendar days, even if the data involved was encrypted. http://www.govinfosecurity.com/articles.php?art_id=2880&rf=2010-09-01-eg

FYI - Discover to get $5M from Heartland for '08 data breach - Settlement marks final agreement with a card-brand, Heartland says - Heartland Payment Systems has agreed to pay $5 million to Discover to settle claims arising from the massive data breach disclosed by the payment processor last year. http://www.computerworld.com/s/article/9183259/Discover_to_get_5M_from_Heartland_for_08_data_breach?taxonomyId=17

FYI - Certain HP scanners can permit snooping and spying - Certain models of HP combination printer and scanner devices contain a feature that could allow for corporate espionage, according to researchers at web security firm. http://www.scmagazineus.com/certain-hp-scanners-can-permit-snooping-and-spying/article/178164/?DCMP=EMC-SCUS_Newswire

FYI - Feds Issue Smart Grid Cybersecurity Guidelines - Stuxnet served to catalyze concerns about smart grid security, which the 537-page "Guidelines for Smart Grid Cyber Security strives to address by providing security requirements and a risk assessment framework.  http://www.informationweek.com/news/government/security/showArticle.jhtml?articleID=227300159

ATTACKS, INTRUSIONS, DATA THEFT & LOSS

FYI - Russian cops cuff 10 ransomware Trojan suspects - Cybercrime gang allegedly raked in $16m - Russian police have arrested 10 suspected members of a ransomware gang who allegedly made millions via a locked computer malware scam. http://www.theregister.co.uk/2010/09/01/ransomware_trojan_suspects_cuffed/

FYI - Church Latest Victim of ACH Fraud - Over a weekend in August, the Catholic Diocese of Des Moines, Iowa, fell victim to a $600,000 ACH fraud theft and becomes another in the growing list of businesses and entities that have suffered huge losses as a result of these crimes. http://www.bankinfosecurity.com/articles.php?art_id=2888

FYI - USB stick with anti-terror training found outside police station - A memory stick containing anti-terror training manuals and other sensitive material was reportedly found on a street outside a Manchester police station. http://www.theregister.co.uk/2010/09/06/anti_terror_usb_stick_dumped/

FYI - Fifa in spotlight over passport identity theft claims - Newspaper claims fans' details were sold on to touts - An investigation is under way into allegations that the passport details of thousands of football fans were sold on the black market by an official linked to Fifa. http://www.guardian.co.uk/football/2010/sep/05/fifa-passports-claims

Return to the top of the newsletter

WEB SITE COMPLIANCE - This week begins our series on the Federal Financial Institutions Examination Council Guidance on Electronic Financial Services and Consumer Compliance.

Electronic Fund Transfer Act, Regulation E  (Part 1 of 2)

Generally, when on-line banking systems include electronic fund transfers that debit or credit a consumer's account, the requirements of the Electronic Fund Transfer Act and Regulation E apply. A transaction involving stored value products is covered by Regulation E when the transaction accesses a consumer's account (such as when value is "loaded" onto the card from the consumer's deposit account at an electronic terminal or personal computer).

Financial institutions must provide disclosures that are clear and readily understandable, in writing, and in a form the consumer may keep. An Interim rule was issued on March 20, 1998 that allows depository institutions to satisfy the requirement to deliver by electronic communication any of these disclosures and other information required by the act and regulations, as long as the consumer agrees to such method of delivery.

Financial institutions must ensure that consumers who sign-up for a new banking service are provided with disclosures for the new service if the service is subject to terms and conditions different from those described in the initial disclosures. Although not specifically mentioned in the commentary, this applies to all new banking services including electronic financial services.

Return to the top of the newsletter
 
INFORMATION TECHNOLOGY SECURITY
-
We continue our review of the FDIC paper "Risk Assessment Tools and Practices or Information System Security." 

VULNERABILITY ASSESSMENT TOOLS

Vulnerability assessment tools, also called security scanning tools, assess the security of network or host systems and report system vulnerabilities. These tools can scan networks, servers, firewalls, routers, and applications for vulnerabilities. Generally, the tools can detect known security flaws or bugs in software and hardware, determine if the systems are susceptible to known attacks and exploits, and search for system vulnerabilities such as settings contrary to established security policies.

In evaluating a vulnerability assessment tool, management should consider how frequently the tool is updated to include the detection of any new weaknesses such as security flaws and bugs. If there is a time delay before a system patch is made available to correct an identified weakness, mitigating controls may be needed until the system patch is issued.

Generally, vulnerability assessment tools are not run in real-time, but they are commonly run on a periodic basis. When using the tools, it is important to ensure that the results from the scan are secure and only provided to authorized parties. The tools can generate both technical and management reports, including text, charts, and graphs. The vulnerability assessment reports can tell a user what weaknesses exist and how to fix them. Some tools can automatically fix vulnerabilities after detection.

FYI - Please remember that we perform vulnerability-penetration studies and would be happy to e-mail R Kinney Williams & Associates a proposal. E-mail Kinney Williams at examiner@yennik.com for more information.


Return to the top of the newsletter

INTERNET PRIVACY
- We continue our series listing the regulatory-privacy examination questions.  When you answer the question each week, you will help ensure compliance with the privacy regulations.

Initial Privacy Notice

3)  Does the institution provide to existing customers, who obtain a new financial product or service, an initial privacy notice that covers the customer's new financial product or service, if the most recent notice provided to the customer was not accurate with respect to the new financial product or service? [4(d)(1)]

 

PLEASE NOTE:  Some of the above links may have expired, especially those from news organizations.  We may have a copy of the article, so please e-mail us at examiner@yennik.com if we can be of assistance.  

IT Security Checklist
A weekly email that provides an effective
method to prepare for your IT examination.


Company Information
Yennik, Inc.

4409 101st Street
Lubbock, Texas 79424
Office 806-798-7119
Examiner@yennik.com

 

Please visit our other web sites:
VISTA penetration-vulnerability testing
The Community Banker - Bank FFIEC & ADA Web Site Audits
Credit Union FFIEC & ADA Web Site Audits - Bank Auditing Services
US Banks on the Internet  
US Credit Unions on the Internet

All rights reserved; Our logo is registered with the United States Patent and Trademark Office.
Terms and Conditions, Privacy Statement, Copyright Yennik, Incorporated