New York Department of Financial Services Announces New Guidance on Ransomware Prevention
On June 30, 2021, the New York Department of Financial Services ("NYDFS") identified key cybersecurity measures to prevent and prepare for ransomware attacks.
The NYDFS announced new guidance that it recommends regulated financial entities implement to reduce the risk of ransomware attacks. The guidance is in response to a significant increase of ransomware attacks reported by regulated entities to the NYDFS since January 2020. According to the NYDFS, ransomware attacks increased by 300% in 2020.
Specifically, the NYDFS recommends that entities implement seven measures to manage the risk of ransomware attacks:
- Train employees on cybersecurity awareness and anti-phishing and conduct periodic phishing exercises;
- Implement a vulnerability and patch management program that includes periodic penetration testing, timely application of security patches, and automatic updates;
- Use multi-factor authentication ("MFA") for remote access to the network and all externally exposed enterprise and third-party applications;
- Disable remote desktop access wherever possible, and if deemed necessary, use MFA and strong passwords where remote access is needed from approved originating sources;
- Require strong, unique passwords of at least 16 characters. Larger entities should strongly consider a password vaulting privilege access management solution which requires employees to check out passwords;
- Implement privileged access management based on the principle of least privileged access;
- Monitor systems for intruders, respond to suspicious activity, and consider an Endpoint Detection and Response solution. Larger entities should implement lateral movement detection and a Security Information and Event Management solution.
In preparation for a ransomware attack the NYDFS recommends that entities test and maintain comprehensive, segregated, and offline backups to allow for recovery in case of a successful attack. The guidance also recommends that entities implement an incident response plan that explicitly addresses ransomware attacks, and that senior leadership test the plan.
Not surprisingly, the NYDFS recommends against paying a ransom. Because ransomware attacks can present significant risks to the confidentiality, integrity, and availability of regulated companies’ data, the NYDFS directs regulated companies to assume that a successful deployment of ransomware on their internal network should be reported to the NYDFS within 72 hours. Entities also should report intrusions in which hackers gain access to privileged accounts.
Davis Wright, in the Atlanta Office, assisted in the preparation of this Alert.
Jones Day publications should not be construed as legal advice on any specific facts or circumstances. The contents are intended for general information purposes only and may not be quoted or referred to in any other publication or proceeding without the prior written consent of the Firm, to be given or withheld at our discretion. To request reprint permission for any of our publications, please use our “Contact Us” form, which can be found on our website at www.jonesday.com. The mailing of this publication is not intended to create, and receipt of it does not constitute, an attorney-client relationship. The views set forth herein are the personal views of the authors and do not necessarily reflect those of the Firm.