Citing “escalating global conflict,” the New York Department of Financial Services issued an alert on Monday, June 22, 2025, to its regulated covered entities, urging them to be vigilant against potential security threats, particularly ransomware and phishing attacks. NYDFS recommended covered entities assess their current cybersecurity programs, including by:
- Testing and updating incident response and business continuity plans, especially the ability to restore backup data.
- Providing refresher cybersecurity training to employees and contractors, making them aware of recent threats.
- Reviewing all vulnerability management tools, including endpoint detection protocols, to ensure they are equipped to detect unauthorized activity and new threats.
- Ensuring that they have robust access management controls in place, particularly around privileged access, operationalizing multifactor authentication and having the ability to disable or secure remote desktop protocol sessions.
- Reviewing their risk assessments to ensure it aligns with cyber-risk landscape changes.
The alert also reiterated reporting requirements under NYDFS Part 500 Cybersecurity Regulation (to report any security incidents within 72 hours, via the secure Department Portal, which can be accessed from the Cybersecurity Resource Center), as well as notifying relevant law enforcement agencies.
NYDFS issued the alert as companies are also in the final stages of implementing the requirements of the Part 500 amendment that was finalized and approved in November 2023. Since then, new rules that are part of the amendment have gone into effect in scheduled phases, focused on a number of topics, including: cybersecurity policies; incident response and business continuity plans; security office and board responsibilities; vulnerability management practices; and risk assessment procedures. In November 2025, the final set of rules go into effect, including requirements for:
- The implementation of multifactor authentication for any individuals accessing any of the covered entities’ information systems, unless an entity’s chief information security officer approves the equivalent of alternative compensating controls.
- Maintaining an updated asset inventory that contains key information for all hardware and software assets, including:
- Asset owners
- Asset locations
- Classification of data held on the assets
- Asset expiration data
- Asset recovery time objectives