Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.
At the beginning of the COVID-19 pandemic, businesses scrambled to rapidly deploy a remote workforce which created new challenges for businesses and financial institutions to continue operating and providing critical services. It also created an opportunity for malicious actors to hack into and gain access to IT systems and sensitive, personal information.
New research from VMware reveals a significant increase in cyberattacks experienced by financial institutions and banks between February and April of this year. VMware data indicates that close to a third of all cyberattacks target either banks or the healthcare sector. While some states are rescinding their stay at home orders, some companies are still erring on the side of caution by continuing to work remotely or have made the decision to work remotely indefinitely such as Twitter. As a result of the uncertain future of COVID-19, a lot of businesses will continue to work remotely and those that collect and manage financial information, including processing of payment card information, will need to assess any cybersecurity vulnerabilities, implement safeguards to protect financial information and educate and train its workforce. In response to COVID-19, many U.S. federal and state governmental agencies have issued helpful guidance for businesses to help prevent and mitigate cybersecurity incidents.
The Financial Crimes Enforcement Network (FinCEN) has issued several advisories for financial institutions to remain alert regarding malicious or fraudulent transactions. In one advisory issued on March 16, 2020, FinCEN noted that it's seeing several trends on potential illicit behavior connected to COVID-19. The most popular trend is imposter scams with bad actors trying to capitalize on individual's vulnerabilities during this pandemic by attempting to solicit donations, steal personal information, or distribute malware by impersonating government agencies (e.g., Centers for Disease Control and Prevention (CDC)), international organizations (e.g., World Health Organization (WHO). The Federal Bureau of Investigation (FBI) has reported that criminals are using fake emails that pretend to be from the CDC, ask for charitable contributions, or offer COVID-19 relief such as government checks in an effort steal personal information. The U.S. Securities and Exchange Commission (SEC) urged investors to be wary of COVID-19-related investment scams, such as promotions that falsely claim that the products or services of publicly traded companies can prevent, detect, or cure coronavirus.
The New York Department of Financial Services (NYDFS) has been proactive in responding to COVID-19 issues and released guidance on April 13 alerting covered entities to the significant increase of cyber incidents during COVID-19. The NYDFS requires all banks, insurance companies, and other financial services institutions and licensees regulated by DFS to have a robust cybersecurity program in place that is designed to protect consumers' private data, among other requirements. For regulated financial entities that must file with the NYDFS, the deadline for Certification of Compliance for calendar year 2019 had been extended from its original deadline of April 15, 2020 to June 1, 2020.
The NYDFS noted three heightened risks during COVID-19: 1) cyber criminals exploiting the physical shift to a remote working environment; 2) increased phishing and online fraud attempts; and 3) cybersecurity challenges from third party vendors who don't have adequate security measures. It's recommended that companies should implement features such as Multi-Factor Authentication and secure VPN connection to encrypt data in order to make remote access as secure as possible. Company employees are consistently identified as one of the main insider threats through which data from financial institutions or their clients are compromised. One of the main issues since the start of COVID-19 and working from home is the use of personal devices to conduct business as the devices typically lack security measures as company issued devices. According to NYDFS, businesses should be knowledgeable of the associated security risks and implement appropriate controls to mitigate those risks which may include updating current bring-your-own-device (BYOD) policies to cover mass remote working. For company issued devices, businesses should consider locking devices to prevent users from adding or deleting applications and installing appropriate security software, such as endpoint detection/response and mobile device management.
One issue that businesses have been grappling with during COVID-19 is processing financial payments outside of a secure work environment. As businesses have shifted their operations to a remote work force, businesses are facing security concerns as payment card information is now being processed outside secure work facilities and into employee homes. In order to process payment card information, most banks and major credit cards require businesses to comply with Payment Card Industry Data Security Standards (PCI DSS).
In response to COVID-19, the PCI Security Standards Council PCI SSC created a COVID-19 resource page on its website and uploaded resources and guidance reminding businesses of their PCI obligations. PCI DSS still applies during this public health emergency and businesses still need to maintain security practices to protect credit card holder data. For processing payments remotely, the PCI Security Standards Council (SSC) recommends businesses implement a security awareness program which emphasizes employee training on the business's security policies and procedures and have employees sign an acknowledgement form that they have received the training. It is a best practice to restrict physical access to media containing payment card data, such as call or screen recordings, as well as networking and communications hardware. If an employee must write down payment information on paper, then employees should understand that this information is sensitive and should be stored in a secure location. It should be shredded once it is no longer needed. Phishing emails more than quadrupled in March 2020 as hackers leveraged the outbreak to their advantage. As a result, all employees should be trained to be aware of potential phishing calls. In addition, businesses should also ensure that incident response plans are up-to-date and include how to respond to incidents from a remote work environment.
It is important for financial institutions to reassess their vulnerabilities in the current working environment, but the challenge is being able to assess those vulnerabilities while maintaining business continuity. Businesses need to consider where their data is stored on their systems and what technical controls they have in place to secure and safeguard the data. They should also consider the following:
*****
Ashley Thomas is an associate in the cybersecurity and privacy group at Morris, Manning & Martin LLP. She can be reached at [email protected] or at 202-971-4266.
|ENJOY UNLIMITED ACCESS TO THE SINGLE SOURCE OF OBJECTIVE LEGAL ANALYSIS, PRACTICAL INSIGHTS, AND NEWS IN ENTERTAINMENT LAW.
Already a have an account? Sign In Now Log In Now
For enterprise-wide or corporate acess, please contact Customer Service at [email protected] or 877-256-2473
With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.
In June 2024, the First Department decided Huguenot LLC v. Megalith Capital Group Fund I, L.P., which resolved a question of liability for a group of condominium apartment buyers and in so doing, touched on a wide range of issues about how contracts can obligate purchasers of real property.
Latham & Watkins helped the largest U.S. commercial real estate research company prevail in a breach-of-contract dispute in District of Columbia federal court.
The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.