Your source for the latest technology information of interest to credit unions across America.
Subscribe to our weekly e-mail newsletter and/or our monthly newsletter and stay on top of the latest technology trends in Hardware, Software, ATMs, Biometrics, Wireless, Online Banking, Marketing, Security, Internet Access and Call Centers.
~ This Week's News is Sponsored by Better Branches ~
* Indiana Members CU Selects Symitar’s Episys
* IMM Joins Microsoft Partner Network
* Travitor Partners with California CU
* Wright-Patt CU Rolls Out NCR's Video Tellers
Jack Henry & Associates, a leading provider of technology solutions and payment processing services primarily for the financial services industry, announced that their Symitar division has signed Indiana Members Credit Union to their Episys core processing solution. The $1.3 billion credit union is based in Indianapolis and will utilize Episys for in-house core processing.
IMM, a provider of eSignature, workflow and document solutions for credit unions, is now a member of the Microsoft Partner Network. IMM’s suite of technology includes its flagship document presentment platform, TotaleAtlas, along with its cloud-based eSignature solution, Document Exchange.
Travitor, a provider of a learning management system, announced that California Credit Union is using the Travitor Learning Management Software to provide its employees with a self-service, online training resource. The platform blends instructor-led classroom training with e-learning course options.
NCR announced that Wright-Patt Credit Union has implemented live tellers via a video connection through a Personal Teller Machine (PTM). The first machines were introduced at a drive-through at WPCU’s Springfield, Ohio branch.
Credit Union InfoSecurity Conference Sponsored by
The 11th annual CU InfoSecurity Conference will be held June 5 - 7, 2013 at the Platinum Hotel in Las Vegas, NV.
This is a one-of-a-kind conference - a security conference dedicated solely to credit unions. Highly experienced, expert speakers discuss the latest security trends as they specifically apply to credit unions. Also included is a tour of InTouch Credit Union’s Lake Mead high tech branch. The CU InfoSecurity Conference is priced so that the majority of credit unions can afford it - just $395 per person and $295 for returning attendees. Topics include:
* Beyond SIEM
* Social Media Risks
* Phishing/Vishing Trends
* Cloud Backup Strategies
* Securing Mobile Banking
* Securing the Human Firewall
* Implementing & Securing IPv6
* Secure Document Management
* Information Security Programs
* Advanced Surveillance Security
* Assessments as IT Funding Tools
* Windows 7 & Windows 8 Security
Click Here for information, agenda, reservations & more.
Mention this ad and get a $100 discount!
Dell and Hewlett-Packard just introduced thin clients that have faster processors than existing thin clients as well as high-definition graphics capabilities. The desk-side thin clients also have advanced virtualization features for virtual desktops to host multiple applications in one session. Dell introduced its first quad-core thin clients called the Wyse D90Q7 and Z90Q7, and also its first dual-core thin client, the Xenith Pro 2. HP upgraded its TM40 thin client to run Advanced Micro Devices' A-series processors.
Eaton has expanded its 5P UPS product line with a compact tower and 1U models. With ENERGY STAR qualified models, the 5P's graphical LCD display allows you to view UPS status in a single glance and features an efficiency rating of up to 99%. When paired with Intelligent Power Software Suite, the 5P allows you to manage your connected equipment, even in virtualized environments.
Hardware Section Sponsored by
Millennial Vision, Inc. (MVi)
According to a study by Business Performance Innovation Network in association with Paladin fs, credit unions are overpaying for their core systems by an average of about 24% over “fair market value.” Their research shows that financial institutions in the $500 million to $1 billion range actually pay even more, overpaying by on average 29%, which amounts to roughly $1 million over the course of a typical five-year contract. They suggest that the best time to negotiate for better pricing is “around two years before a core contract expires.”
KatMouse is a free utility that allows the mouse's scroll wheel to be used in the window beneath the mouse cursor. This can be done independently of the window that is currently selected. In other words, KatMouse lets you scroll a non active window. The utility can also be used to assist with task switching. Since the wheel button is not normally used in a consistent manner, KatMouse allows it to be used for switching tasks by pushing the current window to the back of the stack of open windows. KatMouse also has the ability to assign custom scroll settings to an application.
When Microsoft Outlook causes user issues, users have little tolerance for downtime. Generally speaking, it works well, but when problems arise, IT Departments need to be prepared. We will cover some common helpful Outlook troubleshooting techniques in the June issue of Credit Union tech-talk - subscribe today.
Software Updates Sponsored by
Raddon Financial Group (RFG)
One method of battling ATM fraud is to implement terminal profiling. This technology watches for multiple transaction requests from the same machine. The system compares that incident with the protected ATM's normal activity and scores the transaction accordingly. Depending on the credit union's fraud tolerances, high scores could trigger an automatic decline or a review by a fraud analyst.
A convicted felon who provided skimming equipment to a ring of ATM thieves claims that he has invented a "theft-proof" ATM security device. Valentin Boanta states that "every ATM can be penetrated through a skimming crime. My security solution, SRS, makes an ATM unbreachable." In action, his Secure Revolving System (SRS) allows the card to be inserted longer side first and then rotates it to prevent skimmers from being able to lock on to the magnetic data strip. The system returns the card to the cardholder with a reverse rotation. He says that his invention recently won an award at the International Exhibition of Inventions in Geneva.
ATMs/Kiosks Sponsored by
Here is a chance to learn about real life credit union success stories from various technology vendors through the words of their clients. This week's vendor is:
and their client is:
The recently released 2013 Consumer Mobile Insights study shows that a whopping 83% of respondents worry about identity theft but still use mobile and online banking options for their convenience. The Jumio report noted that while one in four respondents (26%) reported being a victim of online or mobile fraud, 48% continue to conduct financial or other important activities on mobile, such as checking account statuses/balances (48%) or paying bills (32%).
There are an estimated 20 million users of mobile check capture, according to Celent, up from 10.9 million a year ago and 2.2 million in 2011. Mobile RDC is winning popularity across most demographic groups, despite a widespread perception that mobile services are used mostly by the young. Some analysts believe that the impact on branch visits may be significant, and felt sooner than many FIs had thought possible. Another consideration: mobile RDC's rapid uptake may affect credit union's decisions on buying image-enabled ATMs, if they see a rising tide of mobile capture.
Some mobile banking apps now come with "one-touch customer service." We will tell you what this entails in the June issue of Credit Union tech-talk - subscribe now.
Fraudsters have developed a variety of methods for initiating fraudulent wire transfers, many of which use a combination of banking or communications channels. Guardian Analytics has come out with a list of common schemes:
1) Online Wire Request – The most common wire scheme starts with compromising an online account. The fraudster then disables security alerts or enters a new phone number or email address for confirmation, and simply submits a wire request through the compromised online account.
2) Online Live Chat – A fraudster compromises an online banking account, gathers (or changes) personal information, and then engages in a live chat session with the call center to have the agent complete the wire request for him.
3) Funeral Scheme – A fraudster compromises an online banking account to view check images to get the victim’s signature. He then compromises the victim’s email account and sends a request to the FI’s relationship manager explaining that he is out of the country for a funeral and needs money for expenses. The FI emails the necessary Letter of Authority, which the fraudster receives, signs and faxes back, complete with an accurately forged signature.
4) Commercial Account Takeover – A fraudster will compromise an online banking administration account and then create a new user with the authority to approve wire requests. He submits a wire request from the administration account, and then signs into the newly created account and approves his own wire request.
5) Inside Access to the Wire System – Using a spear phishing scheme, malware designed to compromise the back-end payment system is installed on an employee’s computer. The malware takes over the victim’s computer, enabling the fraudster to directly initiate wire transfers.
Tripwire announced SecureCheq, a free configuration utility that helps evaluate and repair the most common, critical configuration vulnerabilities in Windows desktops and servers. SecureCheq evaluates over twenty different security configuration errors and provides a report that includes detailed remediation guidance for problems discovered in the following configuration categories:
Security Section Sponsored by
THE FINANCIAL & SECURITY PRODUCTS ASSOCIATION (FSPA)
Call Today: 800.843.6082
Visit Us Online Today: http://www.fspa1.com
Online, Mobile, Network & Physical – Securing the Spectrum
Integrated Media Management - http://www.immonline.com
Read Nish Shah's comments:
Network Box - http://www.networkboxusa.com
Read Pierluigi Stella's comments:
Not surprisingly, consumers want convenience more than any other attribute from their banking experience, according to a new online survey by Harris Interactive for Yodlee Interactive. Service and low fees ranked next behind convenience, with 48% and 42% of the vote, respectively. Meanwhile 33% of the respondents who use mobile banking said that their mobile banking experience is one of the reasons they stay with their financial institution. The survey concludes that "with the anticipated growth of mobile banking in the next four years, banks that want to boost customer loyalty should strongly consider developing apps that increase the convenience of consumer banking."
The "MyExpress Debit" is a prepaid card without monthly maintenance, deposit or other fees that is being offered by Mountain America Credit Union. The Visa card comes with no activation, maintenance, deposit or overdraft fees. The Utah-based credit union allows their members to add funds anytime via their Online Branch and Mobile Banking app.
Direct payment via ACH remains the leading consumer bill pay method according to NACHA. A survey of billers found that:
- 50 percent of consumer bills are paid via ACH
- 42 percent of consumer bills are still paid through the mail
- 11 percent are paid with credit/debit cards
Billers prefer recurring ACH payments, while consumers, on the other hand, prefer one-time ACH payments for bill pay.
The automated clearing house (ACH) network is trying to position itself as a P2P (person to person) player. The ACH governing body NACHA recently created a rule in regards to how credit unions and processors should handle ACH P2P payments. We will take a look at this new rule and how credit unions should prepare for it in the June issue of Credit Union tech-talk - subscribe today.
Many people believe that VoIP is less secure than analog-based telephony. Yet others disagree and argue that VoIP is actually more secure than analog calling, although the complexity of VoIP makes it seem like it should be easier to compromise. They note that common sense password protection schemes are highly advisable, while applying prepaid-like account limits can be another option to combat fraud, limiting the damage done if there is illegal activity. VoIP proponents also state that VoIP can be monitored at a much higher level than can analog calls. With sophisticated VoIP and unified messaging monitoring tools, users have a window into their telephony infrastructure like never before.
Talari Networks was recently awarded the title of ‘Best Of Interop 2013’ for the latest (version 3.0) release of its Adaptive Private Networking (APN) operating software, which supports its Mercury WAN appliance family. The product aggregates WAN links and continuously measures path quality in order direct traffic according to an organization's application priorities and current application demand. It ensures critical data has the best path and helps eliminate the effect of WAN outages.
Genesys says that their Mobile Engagement solution bridges the gap between the interaction a consumer has with an organization via its mobile app and what they get when they reach out to their contact center. In action, the solution forwards consumer info (e.g., the fact that they have already successfully answered security questions) from the app to the contact center right before the call so time isn’t wasted having to retell the same information. The software also gives the agent geolocation via Google Maps, caller history, authentication data and the context of the interaction. Users are presented with a number of possible options for connecting with the contact center: 1) placing a call; 2) scheduling a callback; 3) receiving a callback; 4) getting a call from a local agent when they are available; 5) chatting; 6) or sending an e-mail.
Catch Tom and Bill Rogers, Associate Editor of Credit Union tech-talk, at these upcoming conferences:
May 30 - June 1, Scottsdale - 40th Annual FSPA Conference
June 5-7, Las Vegas - Credit Union InfoSecurity Conference