CU news Logo

 Your source for the latest technology information of interest to credit unions across America.

Subscribe to our weekly e-mail newsletter and/or our monthly newsletter and stay on top of the latest technology trends in Hardware, Software, ATMs, Biometrics, Wireless, Online Banking, Marketing, Security, Internet Access and Call Centers.

September 1, 2014

~ This Week's News is Sponsored by Better Branches ~


General News  

* Four Points FCU Selects D+H's UltraData
* Financial Health FCU Chooses Sharetec System
* Best Financial CU to Convert to NewSolutions by Share One
* Catalyst Expands ATM Capture to NCR Machines

D+H Corporation announced that Four Points Federal Credit Union has chosen its UltraData Enterprise Core solution. The Omaha, NE-based credit union has also chosen additional D+H solutions: Cavion Internet Banking, Cavion Mobile Banking, Cavion Remote Deposit Capture, Item Processing Services, Touche CRM, MortgagebotLOS and MortgagebotPOS mortgage origination solutions and the Servicing Director loan servicing system.

Sharetec System, one of the fastest growing core systems, announced that Financial Health Federal Credit Union, located in Indianapolis, IN, has selected the Sharetec System as their new core system. The credit union will also be deploying Sharetec's electronic document signing for all departments, electronic notices and alerts, and mobile banking.

Share One, a CUSO operating out of Memphis, TN serving a client base of credit unions with assets ranging from $10 million to $1.5 billion, announced that Best Financial Credit Union of Muskegon, MI has selected Share One`s NewSolutions core data processing system. The $79M asset credit union will also use Share One's online and mobile banking products.

Catalyst Corporate Federal Credit Union has expanded its ATM Capture service to include image-enabled ATMs on the NCR platform. The Plano, TX-based corporate introduced ATM Capture in 2009 for Diebold image-enabled ATMs, and now the service is available to credit unions with NCR ATMs.




Hardware News

Lenovo has just announced a trio of new ThinkCentre desktops in various form factors with an emphasis on security and reliability. The new additions include the ThinkCentre E63z, which is a 19.5-inch all-in-one PC; the ThinkCentre M53, which is a "tiny" business desktop that allows you to power it up via the USB keyboard and comes with PC Cloud Manager 3.0 to provide remote management; and the ThinkCentre M79 lineup, which is available in either a mini tower or a small-form-factor version. All three new ThinkCentre machines provide Smart USB Protection, which allows the IT staff to control access to USB ports so unauthorized users can't transfer data to or from the desktops via external drives.

Intel is shipping its fastest PC processor to date and it`s first with eight cores. The Core i7-5960X Extreme Edition chip allows for faster application performance and video transcoding and encoding. However, many of the performance gains will also come from support for DDR4 memory, which is not in PCs yet. Compared to DDR3, the new memory will provide 50 percent faster internal data transfers, while reducing energy consumption between 30 percent and 40 percent. 


Hardware Section Sponsored by
Millennial Vision, Inc. (MVi)


Back to Top

Software Updates

HyTrust, in a partnership with Intel, has developed “boundary controls” to help protect VMware-based virtual machines. Supported through the HyTrust CloudControl and DataControl software, boundary controls create a high-security zone cluster. HyTrust says the boundary controls process works so that if a virtual machine is copied or removed from its defined location, it won`t run at all and the data will not be decrypted on untrusted hosts or hosts outside the defined policy.

McAfee Server Security Suite Advanced has added simplified manageability, performance optimizations, and NSX integration for virtualized environments to their package. Additional advanced server security features include whitelisting to protect from zero-day threats, change control to help meet regulatory requirements, and McAfee Agentless Firewall for visibility into all virtual networks.



Software Updates Sponsored by
Raddon Financial Group (RFG)

Back to Top


ATM skimmers are getting smaller and more sophisticated every day, and now some are actually razor-thin. These high-tech card skimming devices are made to fit snugly and invisibly inside the throat of the card acceptance slot. In most cases, the fraudsters capture the PIN through hidden cameras.

Some marketing experts recommend using the back side of ATM receipts for coupons. Many consumers regularly use coupons and these promotions can help create a sense of urgency that gets consumers to act quickly. If the ATM receipt is actually a coupon that needs to be redeemed at a branch location for a special, limited-time offer, it may be enough motivation to get members to act, and it is a 100% trackable campaign. Additionally, the ATM receipt can be an effective way to encourage people to sign up for email communications, and to entice members to become fans and followers of your social media networks.


ATMs/Kiosks Sponsored by
Heritage Industries

Back to Top

CU Success Stories  


Here is a chance to learn about real life credit union success stories from various technology vendors through the words of their clients. This week's vendor is:


CUneXus Solutions


and their client is:

Educational Employees Credit Union (EECU)

Credit Unions - if you have a vendor that you are happy with then please This email address is being protected from spambots. You need JavaScript enabled to view it.!

Vendors - if you have a credit union that is happy with your solutions then please This email address is being protected from spambots. You need JavaScript enabled to view it. and we will give you a $100 discount on your Case Study!


Back to Top

Wireless World

According to a recent survey by the ABA, mobile banking is steadily gaining momentum and is now preferred by 10 percent of consumers - up from 8 percent in 2013. Ipsos Public Affairs, an independent market research firm, conducted the survey and they found that online banking remains America's most popular banking method. Visiting a branch came in second, ATMs placed third and mobile was the fourth choice.

When Apple rolls out its iOS8 operating system next month with its Touch ID technology, St George Bank will allow their iPhone-owning mobile customers to log into their accounts with only a fingerprint. Customers who open the Australian bank's app will have the choice to use their fingerprint or a password to log in and check their balances, transfer funds and carry out other transactions. They also plan for a similar biometric login system for the Android-based Samsung Galaxy S5 in the near future.


Back to Top

Security Section

The US Federal Reserve is looking for ways to speed up payments and even allow for real-time funds transfers. These changes will certainly be a boon to consumers, but they are also raising concerns for fraud. Some experts expect that big data analytic tools will play a critical role in fighting fraud. They argue that big data analytics will join traditional tools such behavior monitoring, network analysis, anomaly detection, pattern recognition, and profiling in the battle to track fraudulent payments and money transfers via the online and mobile channels, and soon-to-be real-time payments.

The travel industry and financial services were the US industries most abused by unsolicited and malicious email in the second quarter of 2014, according to Agari's Email TrustIndex. Email security can be provided by using authentication standards such as SPF (Sender Policy Framework), DKIM (DomainKeys Identified Mail) and DMARC (Domain-based Message Authentication, Reporting and Conformance). Agari promotes DMARC, a recent technology through which servers can communicate whether the sender is using SPF or DKIM and how to treat emails that try to spoof email without implementing these security layers.


Security Section Sponsored by


We Will Pay Your Crypto-Ransom If You Get Hit With Ransomware

Question: With ransomware like CryptoLocker on the rise, what’s your only real defense against malware attacks… no matter what security software you’re using?

You know the answer: Training your employees how to recognize ‘red flags’ so they will be constantly alert to the threat.

Well, who better to train them than the man who was once the world’s most-wanted hacker?

You know the answer to that, too: No one. You need to do security awareness training to be compliant, so why not use the most effective program there is?

And, at KnowBe4, we’re so confident in the effectiveness of our Kevin Mitnick Security Awareness Training Program, we offer you a guarantee: If your employees have been through our training and you still get hit with ransomware, we’ll pay your ransom in Bitcoin while you’re a customer.

Sound good? Of course it does.

Learn more about our training and our guarantee, and find out just how affordable our program is for your credit union. Ask for your quote TODAY.

KnowBe4. Human error. Conquered.



Back to Top

Leaders Roundtable

Online & Mobile Banking:

Online and Mobile Banking – Improving & Bridging the Digital Channels

Bluepoint Solutions -
Read Andrew Tilbury's comments:

D+H -
Read Tom Berdan's comments:

Integrated Media Management -  
Read John Levy's comments:

Javelin Strategy & Research -
Read Mark Schwanhausser's comments:

Mercator Advisory Group  -
Read Pradeep Moudgal's comments:
Read Jeremiah Lotz's comments:



Back to Top

Technology and Marketing

The latest U.S. Credit Card Satisfaction Study found that 10% of cardholders switched their primary credit card in 2014. The J.D. Power study found that of those who changed cards, 42% did so due to dissatisfaction with a rewards program. The study, in its seventh year, examined interaction, credit card terms, billing and payment, rewards, benefits and services, and problem resolution. The research firm noted that cardholders who use their card`s benefits spend an average of $400 more per month on their card compared with those who are aware of benefits but do not use them.


Back to Top

Online Banking/E-Commerce/Website Design

Celent has released a new report, titled, ‘Real-Time Payments: Dispelling the Myths.` In the new report they state that credit unions that have yet to investigate real-time payments in-depth are in danger of falling behind. The research firm cover four myths concerning real-time payments:

- Real-time payments are limited to a handful of countries. The reality is that there at least 35 countries with at least one system.

- Real-time payments are a recent innovation. They are not; some systems are more than 40 years old.

- The third myth is that adoption of real-time systems is only ever driven by regulatory pressure. The report highlights examples from Sweden and Poland where nonbanks launched their own systems, forcing FIs to respond with or risk being disintermediated.

- Finally, the fourth myth centers around the impact on FIs' wire revenue, which many incorrectly believe will be impacted.

NACHA announced two new rules that are designed in part to provide new avenues for institutions and NACHA to identify and act against so-called outliers, or originating businesses that generate returns out of proportion to the volume they handle. One of the new amendments, the Network Risk and Enforcement rule, consists of four parts and aims at returns stemming from various causes, including unauthorized transactions as well as transactions returned for data errors. The second new amendment, called the ACH Network Quality rule, seeks to raise costs to originating institutions and at least partially reimburse receiving institutions when unauthorized transactions occur. Under the rule, originating institutions will be required to pay a fee to receiving institutions for each debit returned as unauthorized.


Online Banking Sponsored by


PSCU - The Nation's Leading CUSO

We offer leading edge eCommerce Solutions:

* Electronic Banking

* Mobile Banking

* Online Bill Pay

* Remote Deposit Capture

Contact us today:

(800) 443-7728


Back to Top

Internet Access

The Acunetix Web Vulnerability Scanner is a tool that automatically checks your web applications for SQL Injection, XSS and other web vulnerabilities. It crawls and analyzes different types of websites including HTML5, SOAP and AJAX. After scanning the site, Acunetix WVS provides the scan results ranking the security alerts by severity. In addition, Acunetix WVS provides an Alerts Summary in a Details pane. The user can expand each type of alert to get more information on the specific alert. A set of web security tools are also included in Acunetix, allowing the user to perform additional tests manually. Most vulnerabilities discovered during an Acunetix WVS scan can be exported to the relevant manual testing tool, allowing for further verification of the vulnerability.

MegaPath just launched its Unified Communications service which integrates its existing IP voice telephony portfolio with enhanced collaboration features, such as screen sharing, presence, instant messaging, SMS text messaging, and videoconferencing. Unified Communications is available as an add-on to MegaPath`s Hosted Voice service. The combined offer includes traditional telephony features, plus additional services such as voicemail transcribed as email, call recording, conferencing, and support for mobility, as well as the new Unified Communications capabilities.


Internet Access Sponsored by
Ongoing Operations


Ongoing Operations - The Credit Union Movement's Top BCP & Technology (Cloud) Provider

Always-On Production Connectivity typically includes:

* Internet Connectivity

* Core System Connectivity

* Credit Union Connectivity

* Credit Card Processor

* Debit Card Processor

* ATM Processor

* Online Banking Provider

* Fedline / Federal Reserve Connectivity

* Enterprise Grade Firewall

* Intrusion Detection System


Contact us today:

This email address is being protected from spambots. You need JavaScript enabled to view it.


visit our blog for the latest BC/DR news:


Back to Top

Call Centers

Some organizations are beginning to rely on WebRTC for contact center operations and customer support, along with applications and collaboration features that incorporate video. Another application is the “click to call” and a “click to call back” feature. While “click to call” and “click to call back” have been available for over a decade using other technologies, the advantage of WebRTC over other approaches is the ease of sharing contextual information between the caller and the agent, forwarding information between the parties using a browser.