Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.
At the beginning of the COVID-19 pandemic, businesses scrambled to rapidly deploy a remote workforce which created new challenges for businesses and financial institutions to continue operating and providing critical services. It also created an opportunity for malicious actors to hack into and gain access to IT systems and sensitive, personal information.
New research from VMware reveals a significant increase in cyberattacks experienced by financial institutions and banks between February and April of this year. VMware data indicates that close to a third of all cyberattacks target either banks or the healthcare sector. While some states are rescinding their stay at home orders, some companies are still erring on the side of caution by continuing to work remotely or have made the decision to work remotely indefinitely such as Twitter. As a result of the uncertain future of COVID-19, a lot of businesses will continue to work remotely and those that collect and manage financial information, including processing of payment card information, will need to assess any cybersecurity vulnerabilities, implement safeguards to protect financial information and educate and train its workforce. In response to COVID-19, many U.S. federal and state governmental agencies have issued helpful guidance for businesses to help prevent and mitigate cybersecurity incidents.
The Financial Crimes Enforcement Network (FinCEN) has issued several advisories for financial institutions to remain alert regarding malicious or fraudulent transactions. In one advisory issued on March 16, 2020, FinCEN noted that it's seeing several trends on potential illicit behavior connected to COVID-19. The most popular trend is imposter scams with bad actors trying to capitalize on individual's vulnerabilities during this pandemic by attempting to solicit donations, steal personal information, or distribute malware by impersonating government agencies (e.g., Centers for Disease Control and Prevention (CDC)), international organizations (e.g., World Health Organization (WHO). The Federal Bureau of Investigation (FBI) has reported that criminals are using fake emails that pretend to be from the CDC, ask for charitable contributions, or offer COVID-19 relief such as government checks in an effort steal personal information. The U.S. Securities and Exchange Commission (SEC) urged investors to be wary of COVID-19-related investment scams, such as promotions that falsely claim that the products or services of publicly traded companies can prevent, detect, or cure coronavirus.
The New York Department of Financial Services (NYDFS) has been proactive in responding to COVID-19 issues and released guidance on April 13 alerting covered entities to the significant increase of cyber incidents during COVID-19. The NYDFS requires all banks, insurance companies, and other financial services institutions and licensees regulated by DFS to have a robust cybersecurity program in place that is designed to protect consumers' private data, among other requirements. For regulated financial entities that must file with the NYDFS, the deadline for Certification of Compliance for calendar year 2019 had been extended from its original deadline of April 15, 2020 to June 1, 2020.
The NYDFS noted three heightened risks during COVID-19: 1) cyber criminals exploiting the physical shift to a remote working environment; 2) increased phishing and online fraud attempts; and 3) cybersecurity challenges from third party vendors who don't have adequate security measures. It's recommended that companies should implement features such as Multi-Factor Authentication and secure VPN connection to encrypt data in order to make remote access as secure as possible. Company employees are consistently identified as one of the main insider threats through which data from financial institutions or their clients are compromised. One of the main issues since the start of COVID-19 and working from home is the use of personal devices to conduct business as the devices typically lack security measures as company issued devices. According to NYDFS, businesses should be knowledgeable of the associated security risks and implement appropriate controls to mitigate those risks which may include updating current bring-your-own-device (BYOD) policies to cover mass remote working. For company issued devices, businesses should consider locking devices to prevent users from adding or deleting applications and installing appropriate security software, such as endpoint detection/response and mobile device management.
One issue that businesses have been grappling with during COVID-19 is processing financial payments outside of a secure work environment. As businesses have shifted their operations to a remote work force, businesses are facing security concerns as payment card information is now being processed outside secure work facilities and into employee homes. In order to process payment card information, most banks and major credit cards require businesses to comply with Payment Card Industry Data Security Standards (PCI DSS).
In response to COVID-19, the PCI Security Standards Council PCI SSC created a COVID-19 resource page on its website and uploaded resources and guidance reminding businesses of their PCI obligations. PCI DSS still applies during this public health emergency and businesses still need to maintain security practices to protect credit card holder data. For processing payments remotely, the PCI Security Standards Council (SSC) recommends businesses implement a security awareness program which emphasizes employee training on the business's security policies and procedures and have employees sign an acknowledgement form that they have received the training. It is a best practice to restrict physical access to media containing payment card data, such as call or screen recordings, as well as networking and communications hardware. If an employee must write down payment information on paper, then employees should understand that this information is sensitive and should be stored in a secure location. It should be shredded once it is no longer needed. Phishing emails more than quadrupled in March 2020 as hackers leveraged the outbreak to their advantage. As a result, all employees should be trained to be aware of potential phishing calls. In addition, businesses should also ensure that incident response plans are up-to-date and include how to respond to incidents from a remote work environment.
It is important for financial institutions to reassess their vulnerabilities in the current working environment, but the challenge is being able to assess those vulnerabilities while maintaining business continuity. Businesses need to consider where their data is stored on their systems and what technical controls they have in place to secure and safeguard the data. They should also consider the following:
*****
Ashley Thomas is an associate in the cybersecurity and privacy group at Morris, Manning & Martin LLP. She can be reached at [email protected] or at 202-971-4266.
|ENJOY UNLIMITED ACCESS TO THE SINGLE SOURCE OF OBJECTIVE LEGAL ANALYSIS, PRACTICAL INSIGHTS, AND NEWS IN ENTERTAINMENT LAW.
Already a have an account? Sign In Now Log In Now
For enterprise-wide or corporate acess, please contact Customer Service at [email protected] or 877-256-2473
In a profession where confidentiality is paramount, failing to address AI security concerns could have disastrous consequences. It is vital that law firms and those in related industries ask the right questions about AI security to protect their clients and their reputation.
During the COVID-19 pandemic, some tenants were able to negotiate termination agreements with their landlords. But even though a landlord may agree to terminate a lease to regain control of a defaulting tenant's space without costly and lengthy litigation, typically a defaulting tenant that otherwise has no contractual right to terminate its lease will be in a much weaker bargaining position with respect to the conditions for termination.
The International Trade Commission is empowered to block the importation into the United States of products that infringe U.S. intellectual property rights, In the past, the ITC generally instituted investigations without questioning the importation allegations in the complaint, however in several recent cases, the ITC declined to institute an investigation as to certain proposed respondents due to inadequate pleading of importation.
Practical strategies to explore doing business with friends and social contacts in a way that respects relationships and maximizes opportunities.
As the relationship between in-house and outside counsel continues to evolve, lawyers must continue to foster a client-first mindset, offer business-focused solutions, and embrace technology that helps deliver work faster and more efficiently.