Your source for the latest technology information of interest to credit unions across America.

Subscribe to our weekly e-mail newsletter and/or our monthly newsletter and stay on top of the latest technology trends in Hardware, Software, ATMs, Biometrics, Wireless, Online Banking, Marketing, Security, Internet Access and Call Centers.

Credit Union Technology Talk Logo

January 6, 2014

~ This Week's News is Sponsored by Better Branches ~


General News  

* Sharetec Adds 15 New CUs in 2013
* OnPoint Community CU Selects Fiserv Digital Banking
* CU*Answers Converts New Michigan CU
* San Diego County CU Supports Presents for Paws

Sharetec System, one of the fastest growing core systems, announced another strong year for 2013. During 2013, Sharetec System welcomed 15 new credit union clients. The company said that these new credit union clients were not a result from mergers, but credit unions changing their core system.

Fiserv, a leading global provider of financial services technology solutions, announced that OnPoint Community Credit Union, a $3.2 billion asset, 260,000 member credit union, has chosen their suite of digital banking services. The Portland, OR-based credit union will deploy: Corillian Online, Mobiliti, AllData, CheckFree RXP, TransferNow and Popmoney.

CU*Answers, the West Michigan-based core data processing cooperative, announced that it recently completed converting Village Community Credit Union (Dearborn, MI) to its CU*BASE processing platform. Village Community Credit Union represents approximately 3,800 members and $18 million in assets, and represents its third new client conversion to CU*BASE for its 2014 fiscal year, which started October 1, 2013.

San Diego County Credit Union, San Diego’s largest locally-owned financial institution, participated in “Presents for Paws,” a special holiday fundraising campaign benefitting the San Diego Humane Society and SPCA. Last year, SDCCU’s Presents for Paws campaign exceeded their $10,000 goal, raising a total of $12,584.




Credit Union InfoSecurity Conference Sponsored by
imsmartin consulting

The 12th annual CU InfoSecurity Conference will be held May 21 - 23, 2014 at the Red Rock Resort in Las Vegas, NV.

This is a one-of-a-kind conference - a security conference dedicated solely to credit unions. Highly experienced, expert speakers discuss the latest security trends as they specifically apply to credit unions. Also included is a virtual tour of The Partnership FCU and a Case Study of First Tech FCU. The CU InfoSecurity Conference is priced so that the majority of credit unions can afford it - just $395 per person and $295 for returning attendees. Topics include:


* Phishing 2.0 Exploits
* Anti-money Laundering
* DDoS Mitigation Strategies
* Advanced Log Management
* Effectively Using Data Feeds
* Owning Credit Union Networks
* Tuning Your Fight Against Fraud
* New Ways to Eliminate Malware
* Credit Union Virtual Security Tour
* Cyber Criminal Intelligence Programs
* Legal versus Enforceable eSignatures
* Building a Secure E-mail Infrastructure
* Next Generation Authentication Techniques
* Successful Security Awareness Training Programs

Click Here for information, agenda, reservations & more.

Hardware News

LenovoEMC has launched its px4-400r network storage array designed for small- to mid-sized businesses and branch offices. The single rack unit has four bays and serves as a network attached storage array. It includes LenovoEMC's LifeLine operating system and has 7200rpm SATA-III drives that add up to 16TB of capacity.

Dell has introduced their new Dell Wyse D10D which is a high-performance thin client based on Dell Wyse ThinOS. The computer giant claims that the unit comes with a virus-immune firmware base that is designed for optimal thin client security, performance, and ease-of-use. The machine features a dual-core AMD 1.4 GHz processor and Dell says that you can take the machine from box to productivity in minutes with auto configuration. 


Hardware Section Sponsored by
Millennial Vision, Inc. (MVi)


Back to Top

Software Updates

DeskPDF is a utility for creating, editing, and even signing PDF files. It costs $79.95, but a free 10-day trial version is available for download. The software allows PDFs to be created from just about any type of file, and you can also convert PDFs to Microsoft office documents, HTML, XML, or to various image formats. The software also contains functionality that allows you to create PDF forms containing interactive objects, such as check boxes.

ManageEngine announced enhancements to its firewall security and configuration management software, Firewall Analyzer, and to EventLog Analyzer, its log management and IT compliance software for SIEM. Now, Firewall Analyzer provides security policy management for Cisco and FortiNet firewalls as well as reporting on used and unused firewall policies and policy objects. EventLog Analyzer can now manage event logs from a much wider range of systems. The new features have been incorporated into Firewall Analyzer 8.0 and EventLog Analyzer 8.6.



Software Updates Sponsored by
Raddon Financial Group (RFG)


Back to Top


According to the BBC, USB-based malware has been used in Europe to siphon money from several unpatched ATMs. The criminals manually cut holes in the machines to plug in USB sticks that then installed malware on the system. The software allowed them to create a unique interface on the ATMs by typing in a 12-digit code. This interface allowed for withdrawals and also showed the criminals the amount of money and each bill denomination inside the machines. Many security experts were surprised that these ATMs were not configured to disable the "boot from USB" functionality.

While the migration from Windows XP to Windows 7 on ATMs will certainly be time-consuming and costly for ATM deployers, there are certainly advantages in performing the upgrade. Windows 7 offers a more sophisticated user interface that enables ATMs to offer support for the latest touchscreen technology and iPad-style interactions. Windows 7 also has several built-in features that make it more secure than XP, such as Session Zero Isolation.


ATMs/Kiosks Sponsored by
Heritage Industries

Back to Top

CU Success Stories  


Here is a chance to learn about real life credit union success stories from various technology vendors through the words of their clients. This week's vendor is:


Harland Financial Solutions


and their client is:

Bellco Credit Union

Credit Unions - if you have a vendor that you are happy with then please This email address is being protected from spambots. You need JavaScript enabled to view it.!

Vendors - if you have a credit union that is happy with your solutions then please This email address is being protected from spambots. You need JavaScript enabled to view it. and we will give you a $100 discount on your Case Study!


Back to Top

Wireless World

In their new report "Remote Deposit Capture Solutions 2013: ABCD Vendor View," Celent notes that barely 10% of US financial institutions offer mobile RDC (mRDC) to consumers. However they predict rapid expansion in 2014 because they believe that RDC - particularly mobile RDC - can be a consumer and deposit acquisition tool. They also note that current solutions offer powerful risk and compliance management capabilities that earlier products lacked.

Accellion offers secure mobile file sharing solutions to enable users to access, create, edit and share content securely on their mobile devices. The company provides secure mobile file sharing solutions via private, public, and hybrid cloud deployments, The software includes centralized management of users and files via single sign-on (SSO), data leak prevention (DLP) and strong encryption via a FIPS 140-2 certified module.


Back to Top

Security Section

According to AV-Test. there are nearly 180 million malware programs, and more than 200,000 new malicious programs are produced every day. There is no way that even the best malware scanners can keep up with this assault. Whitelisting (aka application control) proponents argue that whitelisting can be used by any organization to detect previously undetectable malware threats, and help with this malware explosion.

Even as BYOD (bring your own device) continues to gain popularity because of its convenience and cost savings features, it remains nightmare for many IT Departments concerned about security. However there is good news for nervous security managers: biometric technology can open up a host of new possibilities and an entirely new level of security for BYOD devices. It offers the potential to deliver a higher level of identity assurance, at least for basic device access. Biometrics is well suited to mobile devices with their built-in cameras, microphones and of course Apple's fingerprint technology on the latest iPhones. Finally the phone can be a cost-saving ally because it allows you to bypass the huge expense of giving staff traditional authentication tokens such as OTP widgets and smart cards.


Back to Top

Leaders Roundtable


Addressing the Big 3: Compliance, Fraud & Cyber Security

D+H - http://wwwdhltd.com
Read Jeff Marshall's comments:

DirectRM - http://www.directrm.com
Read Donald E. Malloy's comments:

Easy Solutions - http://www.easysol.net
Read Daniel Ingevaldson's comments:

Horsetail Technologies - http://www.horsetailtech.com
Read Mark Berman's comments:

Integrated Media Management - http://www.immonline.com  
Read John A. Levy's comments:

Incapsula - http://www.incapsula.com
Read Marc Gaffan's comments:

LogRhythm - http://www.logrhythm.com
Read Mike Reagan's comments:

Mimecast - http://www.mimecast.com  
Read Mounil Patel's comments:

Hyland Software - http://www.onbase.com
Read Steve Comer's comments:

ProPay - http://www.propay.com
Read Dr. Heather Mark's comments:

Rallypoint Solutions - http://www.rallypoint.us.com
Read Kris Zupan's comments:

SilverSky - http://www.silversky.com
Read Andrew Jaquith's comments:

Spikes Security
Spikes Security - http://www.spikes.com
Read Branden Spikes' comments:

TrustCC - http://www.trustcc.com
Read Andy Robbins' & Brandon Henry's comments:

Verafin - http://www.verafin.com
Read Brendan Brothers' comments:

Wombat Security Technologies - http://www.wombatsecurity.com
Read Joe Ferrara's comments:

Zerto - http://www.zerto.com
Read Ziv Kedem's comments:


Back to Top

Technology and Marketing

According to the latest industry data, the number of e-mail users in the United States continues to grow exponentially with each passing year. eMarketer projects that there will be nearly 240 million Americans with email accounts by 2017. While many organizations are shifting their marketing budgets to social media, e-mail marketing still matters in 2014. Some e-mail marketing gurus offer these three e-mail campaign recommendations:

1) Relevance has been called the Holy Grail of email marketing - maintain focus on what your members are interested in (based on everything from their product mix to behavioral data)

2) Content is paramount - regardless of your underlying promotional objectives, give the e-mail concrete value by presenting pertinent news, advice, or resources that communicate your awareness of that member’s interests and your authority on the matter at hand

3) Call to action must be clear - your email must be actionable by boldly highlighting an offer, invite, or opportunity with a clear path to act


Back to Top

Online Banking/E-Commerce/Website Design

More and more financial institutions are investing in virtual banking and other technology as consumers become comfortable using electronic signatures to sign documents and communicating via video conferencing. Private conference rooms with a camera, video screen, signature pad and printer are used in some scenarios. Instead of purely digital signatures, UMB Bank in Kansas City has chosen to use remote robotic signature technology so customers can sign their name on a tablet and have it physically replicated. In Kansas City, a robot holds a pen that is visible to the customer on the monitor and it mimics the movements of the customer’s hand, reproducing the signature using ink on a paper document there.

Zeus has been the undisputed leader in banking malware for many years and it remains active today, but it appears that new malware named Neverquest is raising the bar for online banking malware. This Trojan is loaded via social media, email, or file transfer and watches for key banking terms that are typed into a browser. It will relay the login information back to the command and control server which will allow the scammers to remotely control the victim's computer using VNC, log into the victim's banking website and essentially become that person.


Back to Top

Internet Access

In a new take on distributed denial-of-service (DDoS) attacks, attackers are targeting the Network Time Protocol, or NTP, which syncs time between machines on the network. Symantec has discovered a major jump in so-called NTP reflection attacks. In response, Symantec recommends that organizations update their NTP implementations to version 4.2.7, or disable access to monlist in older versions of NTP.

By definition, a Session Initiation Protocol (SIP) trunk is a virtual interface that connects enterprise communications systems with each other or to a third party communications service. They can be used to access audio or video conferencing, unified communications, contact center and other services, regardless of whether they are provided by on-premise equipment or hosted in the cloud. While (SIP) trunks can be a lower cost alternative to traditional T1/PRI trunks, SIP proponents say that the SIP services can also increase business agility, improve productivity and reduce costs.


Back to Top

Call Centers

Some contact center observers contend that centers are inundated with information that they can't use to better serve callers. They say that much of this information is contained in legacy reports that were created when agent efficiency was more important than customer satisfaction. They point to one survey by the by the International Customer Management Institute (ICMI) which found that the five most collected metrics were average handle time (79 percent), abandonment rate (75 percent), average speed of answer (72 percent), after call work (63 percent) and quality (61 percent).