Your source for the latest technology information of interest to credit unions across America.
Subscribe to our weekly e-mail newsletter and/or our monthly newsletter and stay on top of the latest technology trends in Hardware, Software, ATMs, Biometrics, Wireless, Online Banking, Marketing, Security, Internet Access and Call Centers.
~ This Week's News is Sponsored by Better Branches ~
* Red Rocks CU, IMM Complete CUProdigy Interface
* CUneXus and Harland Clarke Form Partnership
* PSCU Chooses Wynyard Advanced Crime Analytics Platform
* William Mills Releases 2015 “Bankers as Buyers” Report
Colorado-based Red Rocks Credit Union recently underwent a core conversion and retained IMM, a leading provider of integrated eSignature, workflow and document solutions for credit unions, as its primary teller solutions provider. IMM worked with Red Rocks to complete an interface with its new core, CUProdigy, which was accomplished while keeping the credit union`s teller functions up and running.
CUneXus Solutions, a financial services software development firm focused on data-driven consumer lending technology, announced a new alliance with Harland Clarke, a top provider of integrated marketing capabilities and strategic services. Harland Clarke's chose of CUneXus' cplXpress to enable personalized, automated, pre-approved lending to its customers.
Wynyard Group, a leading provider in crime fighting software and services, announced that it has signed a multi-year agreement with PSCU for its Internal Fraud Analytics Solution – a configuration of the Wynyard Advanced Crime Analytics Platform. PSCU, the nation's leading credit union services organization, will use Wynyard Fraud Analytics as part of its overall risk management and financial controls efforts.
William Mills Agency, a financial public relations and marketing firm, released its annual financial services industry research, “Bankers as Buyers.” The twelfth annual complimentary report is a collection of research, observations and articles about what technology, solutions and services U.S. bankers will buy in 2015.
The 13th annual CU InfoSecurity Conference will be held June 3 - 5, 2015 in Las Vegas.
This is a one-of-a-kind conference - a security conference dedicated solely to credit unions. Highly experienced, expert speakers discuss the latest security trends as they specifically apply to credit unions. Also included is a virtual tour of F&A Federal Credit Union and a presentation by Alloya Corporate FCU. The CU InfoSecurity Conference is the only conference in the credit union movement that includes two nights lodging in a deluxe room as part of the already incredibly low price: just $595 per attendee and $495 for returning attendees. Topics include:
* Securing VMs
* Cloud Security
* Breach Prevention
* Pervasive Security
* Device Configuration
* Compliant Social Media
* Transparent Encryption
* CU Virtual Security Tour
* Securing Virtual Branches
* Network Security Strategies
* Account Takeover Prevention
* Intelligence Driven Cyber Security
Click Here for information, agenda, reservations & more.
Also includes a behind-the-scenes tour of Zappos Headquarters - don't miss it!
Research from Carlisle & Gallagher indicates that Americans are increasingly performing digital banking transactions interchangeably across laptops, tablets, and smartphones, including the growing category of phablets (smartphones with large screens that are almost tablets). The financial consultancy believes phablets will be the dominant mobile banking device by 2020, according to the study. They note that 46% of Americans are more likely to conduct mobile banking due to larger mobile devices, such as the phablet, and that phablets will have approximately 30% of the mobile device market share by 2020.
Intel just announced the availability of the new fifth-generation Core processors for business laptops, desktops and mini-PCs. Laptops with the Broadwell vPro chips will be a stepping stone to Intel's ultimate plan to support technologies that could rid computers of cables and connectors. Intel's wire-free plans call for users to stop carrying power bricks and to charge laptops wirelessly, as well as wirelessly connecting to peripherals such as monitors, external hard disks and printers. However for now, the new Broadwell chips will support only wireless connectivity to displays and peripherals. Wireless charging is expected to come in the second half of this year with the chip maker's new Skylake processors, which will succeed Broadwell.
Keyhole is a simple social monitoring tool that lets you track and watch hashtags, keywords and URLs across Twitter, Instagram and Facebook. Keyhole tracking works like a simple search query on Google, and it pulls in relevant results in real time. The Keyhole dashboard displays the total number of posts, users, reach, a timeline and impressions for each query. Price for the service varies from about $129 to $3,000 per month.
Commercial antivirus software is dominated by five vendors: Kaspersky Lab, McAfee (Intel Security), Sophos, Symantec, and Trend Micro. However, customized malware and zero-day attacks that circumvent AV are causing some organizations to question the cost of AV software. Some organizations are adding new endpoint security and anti-malware tools from vendors such as Savant, Bromium, Confer, Cylance, CrowdStrike, FireEye, IBM, Malwarebytes, Palo Alto Networks and Triumfant. While most organizations have no plans to abandon AV, some are considering replacing commercial AV with a freeware alternative like Avira, AVG, Bitdefender, or Microsoft Security Essentials. In fact according to ESG research, 57% of enterprises are apt to replace some commercial AV with freeware in the short- and/or near-term.
3SI Security Systems has introduced an ATM tracker solution that relies on GPS to locate a stolen ATM. The Philadelphia-based company says that their NextGen3 Electronic Satellite Pursuit ATM Tracker GPS uses multiple security and tracking applications that enable apprehension in up to 70 percent of cases and asset return at rates above 87 percent. They also note that the small footprint of the ATM Tracker accommodates easy installation in different types of ATMs and other cash dispensers. Plus it supports configuration options that allow the device to trigger on tilt and motion or just tilt.
In a related story that takes ATM protection to a whole other level, Leo Prime Payment Solutions of Chennai, India has developed a line of ATMs that deliver a shock to anyone attempting to move them. In addition to delivering a harsh, but nonfatal, electric shock to any would-be thief, the company's "intelligent ATM" is also equipped to automatically pull down the rolling door of the kiosk that houses it.
Here is a chance to learn about real life credit union success stories from various technology vendors through the words of their clients. This week's vendor is:
and their client is:
The previously mentioned (see Hardware News) Carlisle & Gallagher Consulting Group study found that 55 percent of Americans say mobile banking is a habitual part of their lifestyle. All survey respondents expect to buy more mobile devices by 2016. Here are the most frequent mobile banking activities:
- Viewed balances: 97 percent on laptops, 95 percent on tablets and 94 percent on smartphones
- Transferred funds: 89 percent on laptops, 81 percent on tablets and 82 percent on smartphones
- Paid bills: 92 percent on laptops, 86 percent on tablets and 81 percent on smartphones
According to statistics compiled by BI Intelligence, mobile banking customers totaled 53 percent of total online banking customers at the big three money center banks of Wells Fargo, Chase and BofA. However it appears that few mobile bankers are using Windows devices - so few in fact that Bank of America recently followed JPMorgan Chase in announcing that it would no longer support apps for the Windows Phone.
It appears that scam artists are increasingly using big data sets where they can take bits and pieces of the data and string together new identities. These synthetic schemes rely on partly made-up or completely new identities. Fraud systems have difficulties catching these activities since there is no pattern to match when an identity is created synthetically with stolen data. Some security experts contend that biometrics and out-of-band authentication, like a phone call or text to the phone number on record, for unusual transactions would help reduce fake identity theft.
Wisegate is a personalized, peer-based IT advisory service for senior IT professionals. They recently conducted a survey of their members and found that the lack of security metrics and reporting was high on the list of security professionals' minds. Specifically, here are some of their findings regarding security metrics and reporting:
- Security metrics and reporting processes are immature
- Communications problems are due to a tool-centric rather than risk-centric view of security
- The volume of security products in the market make seamless metrics and reporting very difficult
Meeting the Challenges of Attacks, Breaches & Compliance
IMM - http://www.immonline.com
Read John A. Levy's comments:
Info@Risk - http://www.infoatrisk.com
Read David Trepp's comments:
The American Savings Promotion Act, which was passed by Congress late last year, allows consumers to earn cash prizes for contributing to savings accounts. However, some states have laws in place that prevent financial institutions from holding contests or lotteries. But Washington and Michigan are among the states with gambling rules that exempt lotteries/raffles at credit unions, so Shelton, WA-based Peninsula Credit Union has opened 276 prize-linked accounts since 2013 which has resulted in savings of hundreds of thousands of dollars.
The Federal Reserve just issued a new report entitled "Strategies for Improving the U.S. Payment System." In it, they discuss payment security and detail four different options for building a faster U.S. payment system. These options include:
- evolving the existing PIN debit infrastructure to enable real-time payments
- using common protocols and standards to facilitate the clearing of transactions over the Internet
- creating a new payments infrastructure that would build on existing technology and have certain targeted uses
- developing a new payments infrastructure that would process a wider range of transactions and eventually eliminate the need for checks, wire transfers, and automated clearinghouse transactions
Coinbase is the first licensed U.S. bitcoin exchange and currently has regulatory approval in half of U.S. states, including New York and California. The startup, which is backed by money from the New York Stock Exchange, FIs, and venture-capital firms, says their exchange will offer greater security for individuals and institutions to trade bitcoin and monitor real-time pricing of the cryptocurrency. Coinbase says it has insurance, offering traders some assurance that their money will not disappear.
IMM - The Nation's Leading eSignature, Workflow & Teller Provider
The industry’s leading “end-to-end” eSignature platform that integrates with all business applications, provides flexible eSigning options, and seamless archival into Imaging/ECM repositories.
Differentiate your eSignature solution with industry unique business-rules driven workflow automation. Control and enforce critical eSignature business operations, processes and tasks.
Innovative electronic receipt and check 21 teller capture solutions that streamline teller processes and reduce costs, while enhancing the consumer experience and eliminating paper-generation.
Contact us today:
(800) 836 - 4750
About half of all enterprises were hit with a distributed denial-of-service (DDoS) attack last year. Some 90% of ISP and enterprise respondents in Arbor Networks' 10th Annual Worldwide Infrastructure Security Report say they experienced application-layer (versus network connection-sapping) DDoS attacks, and 42% say they were hit by DDoS attacks that used a combination of bandwidth-sapping, application-layer, and state exhaustion methods. The report also noted that HTTP- and DNS were the top two targets of application-layer attacks. However, volumetric attacks, which bombard a targeted organization or ISP's network connections, still outnumber application-layer attacks, accounting for about two-thirds of all DDoS attacks in the past year.
Logitech has introduced a portable video conferencing solution featuring the new Logitech ConferenceCam Connect. It works with any PC via a USB connection to a wide variety of videoconferencing platforms including Lync, Skype, Jabber, WebEx, Citrix GoToMeeting, Google Hangouts, Lifesize, Vidyo, and Zoom. The ConferenceCam Connect device ($499) combines an HD 1080p video camera with dual microphones and a speakerphone for 360-degree audio. Users can connect wirelessly to the ConferenceCam Connect to screen-mirror presentations, spreadsheets, videos or Internet content from a mobile device to a TV screen through an HDMI connection.
Ongoing Operations - The Credit Union Movement's Top BCP & Technology (Cloud) Provider
Always-On Production Connectivity typically includes:
* Internet Connectivity
* Core System Connectivity
* Credit Union Connectivity
* Credit Card Processor
* Debit Card Processor
* ATM Processor
* Online Banking Provider
* Fedline / Federal Reserve Connectivity
* Enterprise Grade Firewall
* Intrusion Detection System
Contact us today:
visit our blog for the latest BC/DR news: http://ongoingoperations.com/blog/
eSkill is a provider of customizable online hiring tests that fit specific job requirements. While standard tests may be enough to assess the skills required for many positions, some positions such as contact center agents require special specialized task-based testing. In response, they have created simulations to test important qualities, like reaction times and the ability to make decisions in stressful situations, for a more comprehensive assessment. The firm claims that organizations can fill positions more quickly and accurately when using their assessments as a pre-screening tool.