Your source for the latest technology information of interest to credit unions across America.

Subscribe to our weekly e-mail newsletter and/or our monthly newsletter and stay on top of the latest technology trends in Hardware, Software, ATMs, Biometrics, Wireless, Online Banking, Marketing, Security, Internet Access and Call Centers.

Credit Union Technology Talk Logo

April 13, 2015

~ This Week's News is Sponsored by Better Branches ~


General News  

* D+H Partners with Malauzai
* Central CU Selects XP2
* ESP Celebrates 50th Partnership
* DHCU Community CU Selects Fiserv's DNA

DH Corporation announced a strategic alliance with Malauzai Software to jointly develop and deploy advanced mobile banking solutions to D+H core system and Internet banking clients. The company will offer the Mobile Banking App powered by Malauzai, in addition to their existing Cavion Mobile Banking App solution.

Fiserv, a leading global provider of financial services technology solutions, announced that E-Central Credit Union, based in Pasadena, CA, has selected the XP2 core processing platform in an outsourced deployment. The credit union will also implement several other digital solutions, including Corillian Online for online banking, Mobiliti for mobile banking, CheckFree RXP for electronic bill payments, Mobile Source Capture for mobile check deposit, and Wisdom for accounting.

Enhanced Software Products (ESP), the Spokane, WA-based Credit Union Core Data Processor, recently announced that they have established their 50th vendor partnership. The company says that their partnerships create a suite of offerings that help credit unions drive new growth, service existing members, and protect their ROA.

Fiserv announced that DHCU Community Credit Union, based in Moline, IL, has selected their DNA account processing platform. The CU will also deploy the CRM and Business Intelligence suite for DNA, tMagic teller capture, Credit Card Management for DNA and other card solutions, Nautilus enterprise content management, Prologue accounting suite, Vantage Risk & Budgeting Manager, Frontier Reconciliation, Wisdom: 5300 Call Report Assistant and Item Processing solutions.



Credit Union InfoSecurity Conference Sponsored by
imsmartin consulting

 The 13th annual CU InfoSecurity Conference will be held June 3 - 5, 2015 in Las Vegas.

This is a one-of-a-kind conference - a security conference dedicated solely to credit unions. Highly experienced, expert speakers discuss the latest security trends as they specifically apply to credit unions. Also included is a virtual tour of F&A Federal Credit Union and a presentation by Alloya Corporate FCU. The CU InfoSecurity Conference is the only conference in the credit union movement that includes two nights lodging in a deluxe room as part of the already incredibly low price: just $595 per attendee and $495 for returning attendees. Topics include:

* Ransomware
* Securing VMs
* Cloud Security
* Breach Prevention
* Pervasive Security
* Device Configuration
* Compliant Social Media
* Transparent Encryption
* CU Virtual Security Tour
* Securing Virtual Branches
* Network Security Strategies

* Account Takeover Prevention

* Intelligence Driven Cyber Security

Click Here for information, agenda, reservations & more.

Also includes a behind-the-scenes tour of Zappos Headquarters - don't miss it!



Hardware News

The arrival of Windows 10 later this year will bring numerous hardware changes. Experts say that users can expect the smaller USB Type-C port to become mainstream in PCs around the time Windows 10 ships later this year. The multifaceted USB Type-C ports will recharge laptops and connect PCs to monitors, external storage drives, printers, cameras and other peripherals. Plus, the Type-C cable has an identical connector on both ends, and the users will enjoy faster data transfer rates with the USB 3.1 protocol, which can transfer data at 10Gbps (bits per second), double that of USB 3.0.

Demand for video conferencing systems continues to grow as hardware prices fall and advances in the technology make video much easier to use than it was in the past. For example, last month, Polycom announced a purpose-built voice and video collaboration solution designed by Microsoft and Polycom developers to be used with Skype for Business. Called the Polycom RoundTable 100, the device sells for under $1000 and targets small to midsized businesses teams who have a Skype for Business account. 


Hardware Section Sponsored by
Millennial Vision, Inc. (MVi)


Back to Top

Software Updates

On July 14, Microsoft will end support for Windows Server 2003 which means Microsoft will no longer issue security updates for any version of Windows Server 2003. Bit9 recently issued a report entitled "Windows Server 2003 (WS2K3) End-of-Life Survey" which found that nearly one in three enterprises (30%) plan to continue to run Server 2003 after the July 14 deadline, leaving an estimated 2.7 million servers unprotected. Bit9 claims that a migration would take at least 200 days, while other experts give more high-low room due to the variances in the apps, complexity, etc. They recommend an upgrade plan that includes network isolation, application whitelisting, and continuous server monitoring.

Syslog-ng Pro is an open source log consolidation engine which has a long and positive reputation in the Linux, AIX, and BSD communities. Syslog-ng Pro features heterogeneous support for varying operating systems. The developers differentiate the open source version from the Pro edition by including support, and Windows-specific hosting and client-side communications for log consolidation from Unix-based and Windows hosts alike.



Software Updates Sponsored by
Raddon Financial Group (RFG)

Back to Top


The ATM Industry Association has published new guidelines called “Best Practices for Preventing ATM Malware, Black Box and Cyber-Attacks”. This security manual explains how ATM malware works, from installation to execution, as well as how to detect it. The manual also looks into Black Box Attacks and the hijacking of ATM Control and Authorization Systems before outlining key mitigation best practices. The guidelines share links, background reading and relevant standards documentation.

VeeBees are virtual banker machines developed by Nautilis-Hyosung. They come with privacy screens so that if a member does not look straight at it, they can't see the screen. Members can research transactions, print statements, make loan payments, submit deposits and withdraw funds in any denomination they choose. They can also be setup to provide a quick account balance with having to insert a card.

Uber has met the ATM in Poland as Idea Bank has launched of a fleet of automobiles fitted with ATMs that can be summoned by smartphone. The bank has outfitted four electric BMW i3 automobiles with built-in cash depository ATMs that can be called upon by small businesses using the IdeaBank Money Collection app. Idea Bank's car service, which is available to order from 8:00 a.m. until 10:00 p.m. with professional bodyguard drivers, is free for customers, though the bank is considering charging a fee for entrepreneurs who withdraw money from a card issued by another institution.


ATMs/Kiosks Sponsored by
Heritage Industries

Back to Top

CU Success Stories  


Here is a chance to learn about real life credit union success stories from various technology vendors through the words of their clients. This week's vendor is:  

Stirling Systems Group


and their client is:

Los Angeles Firemen’s Credit Union

Credit Unions - if you have a vendor that you are happy with then please This email address is being protected from spambots. You need JavaScript enabled to view it.!

Vendors - if you have a credit union that is happy with your solutions then please This email address is being protected from spambots. You need JavaScript enabled to view it. and we will give you a $100 discount on your Case Study!


Wireless World Sponsored by
Member Access Pacific (MAP)



The MAP App™ is the first network-branded prepaid card exclusively serving credit unions to offer mobile banking -
contact us now to learn more about this market-leading innovation for credit unions:

(866) 598 - 0698

Back to Top

Wireless World

According to a recent Timetric survey, the use of mobile payment devices and technologies is growing among business professionals, but true mainstream integration will take at least several years. North America's contactless payments and fraud prevention initiatives lag both Asia`s and Europe's, although "the U.S. is rapidly upgrading its payments infrastructure and is likely to become the most advanced mobile payments market within the next two years." The report predicts that large tech firms such as Apple and Google will dominate the global payments market.

A new study by Millward Brown Digital highlights the nuances of mobile device usage by generation and task. Millennials are certainly a mobile-centric generation, however when it comes to financial services, only 8% of Millennials prefer a smartphone for submitting a checking or savings application vs. 46% whose preferred device for this task is a laptop. Similarly, 17% of Millennials prefer a smartphone for submitting a credit card application vs. 57% who prefer a laptop. Across all generations, 81% of consumers prefer a smartphone for tasks under 5 minutes and only 43% prefer a smartphones for activities lasting 10-20 minutes. The firm notes that researching financial products, obtaining an insurance quote, and opening new checking or credit card accounts all take longer than 5 minutes – at that point, device preference for smartphones declines dramatically. Finally, they say that tablet usage is highest among GenXers (34% use tablets regularly), but even among this group almost all prefer either a smartphone or a laptop/PC for financial tasks - their research shows that consumers continue to reach for their laptop for productivity driven financial tasks over tablets.


Back to Top

Security Section

Vera is a startup that aims to lock down documents transferred over email or other file-sharing services such as Box or Dropbox. With a right click on a file, a set of policies can be attached to an important file. The file is encrypted, with the decryption key passed only to the authorized recipient, who doesn`t have to install Vera`s software. The document won`t open if it is forwarded to someone else, and it can be set to lock after a certain amount of time.

Benjamin Dean, Fellow for Internet Governance and Cyber-security, School of International and Public Affairs at Columbia University, has an interesting theory on breaches: data breaches may cost less than the security to prevent them. He invokes the concept of moral hazard which occurs when one person takes more risks because someone else bears the burden of those risks. In the real world this means that companies can invest less in information security because in the event of a breach other parties such as card issuers, insurance companies and consumers bear the lion's share of the costs of the incident. Dean concludes that it does not make economic sense for companies like Target, Home Depot, and Sony to invest heavily in information security, especially when insurance payments and tax deductions cut the financial outlay to where it is less than what it would cost to improve information security.


Back to Top

Leaders Roundtable


Meeting the Challenges of Attacks, Breaches & Compliance

Alloya Corporate FCU - http://www.alloyacorp.org
Read Biff Myre's and Ron Schlecht's comments:

CatchFire Creative - http://catchfirecreative.com
Read Drew Schulthess' comments:

D+H - http://www.dh.com
Read Jeff Marshall's comments:

Easy Solutions - http://www.easysol.net
Read Daniel Ingevaldson's comments:

eScope Solutions - http://www.escope.net
Read Dean Marshall's comments:

Horsetail Technologies - http://www.horsetailtech.com
Read Mark Berman's comments:
HyTrust - http://www.hytrust.com
Read Hemma Prafullchandra's comments:
IMM - http://www.immonline.com  
Read John A. Levy's comments:

Info@Risk - http://www.infoatrisk.com
Read David Trepp's comments:
https://www.cunews.com/This email address is being protected from spambots. You need JavaScript enabled to view it.

Ingalls Information Security - http://www.iinfosec.com
Read Russell “Rusty” Wilson's comments:

KnowBe4 - http://www.knowbe4.com
Read Stu Sjouwerman's comments:

Millennial Vision - http://www.mviusa.com
Read Scott Cowan's comments:

Hyland Software - http://www.onbase.com
Read Steve Comer's comments:

PhishLabs - http://www.phishlabs.com
Read Stacy Shelley's comments:

Q2 - http://www.q2ebanking.com
Read Jay McLaughlin's comments:

Rallypoint Solutions - http://www.rallypoint.us.com
Read Kris Zupan's comments:

SilverSky - http://www.silversky.com
Read Andrew Jaquith's comments:

Xamin - http://www.xamin.com
Read Erik Gustafson's comments:


Back to Top

Technology and Marketing

MasterCard has introduced the "in reach" benefits platform for issuers looking to engage Millennials. By some accounts, by 2017 millennials` spending power is expected to surpass that of baby boomers. Issuers can incorporate the in reach platform onto any credit, debit or prepaid MasterCard, and cardholders with have access to career and financial related resources, tools and benefits in one central location. MasterCard has partnered with LinkedIn and The Wall Street Journal to build the engagement hub.

Naveo Credit Union has turned their debit cards into marketing tools by literally turning them on edge. The card's vertical design allows for their logo to be visible when the card is in their members' wallets or when they are swiping. The Massachusetts-based credit union introduced the rotated design following their latest name change and rebranding.


Technology & Marketing Sponsored by
Bluepoint Solutions


Back to Top

Online Banking/E-Commerce/Website Design

Because Bitcoin uses a "permissionless ledger" that relies on anonymous participants to validate transactions, it has limited appeal to financial institutions - there is no one to hold accountable in legal disputes over the ownership of assets. Bitcoin's primary purpose is facilitate online transactions, not those involving homes, cars, and other real-world assets. Many experts contend that distributed but "permissioned" ledgers from companies such as Ripple Labs, Eris Industries, Hyperledger and Clearmatics that use legal entities to validate transactions make more sense for FIs. Distributed but permissioned ledgers use legal entities to validate transactions, providing FIs with official records of asset ownership and legally accountable participants.

Gemalto announced that Coop Bank Denmark is the first FI to deploy biosourced contactless EMV cards. The new cards — from Gemalto's Optelio range — are manufactured from a corn-based material that is 100 percent biodegradable and are able to accept high quality artwork. The firm states that their cards are made from poly lactic acid, a plastic substitute, and the cards are compostable and nontoxic if incinerated.

Celent has released a new report titled “Top Trends in Retail Banking 2015: Digital Reigns, Complexity Intensifies.” The report identifies the following ten key trends affecting credit unions over the course of 2015:

1. Meeting Mobile Demand 2. Operationalizing Omnichannel 3. Engaging New Entrants - Fintech and Otherwise 4. Coming to Terms with Cloud 5. Increasing Innovation Investment 6. Embracing Emotions 7. Ceding Ecosystem Centrality 8. Securing Systems 9. Responding to Regulations 10. Changing the Core Perspective



Back to Top

Internet Access

Cisco is rolling out new models of its Adaptive Security Appliance (ASA) with FirePOWER Services, which they claim is the first threat-focused next-generation firewall. Aimed toward mid-size companies or branch offices, Cisco is promising the same kind of malware protection and detection enjoyed by enterprise organizations. Pricing starts at $995 per model.

Soha Systems has launched a cloud service called Soha Cloud that they say reduces the burden of setting up customer-owned security platforms and eliminates the need to make network configuration changes to accommodate that security. The platform provides security functions when users initially try to access cloud-based applications. Once they are cleared for access, the service bridges a link to the app they requested as if the request is originating from within the network, making network changes unnecessary. It provides authentication, authorization, application firewalling, WAN optimization and server load balancing among multiple application instances for both public and private clouds. Customers can get free access to the service supporting one application for five users indefinitely in order to test it.



Back to Top

Call Centers

Everyone knows that training is an important part of building a positive contact center culture. Toister Performance Solutions points out that employees learn workplace behaviors in three distinct ways:

- 70% comes from informal learning - 20% comes from the direct supervisor - 10% comes from formal training

The firm recommends asking agents to contribute their views on culture in team meetings and empowering employees to help with special projects like training new hires.