CU news Logo

 Your source for the latest technology information of interest to credit unions across America.

Subscribe to our weekly e-mail newsletter and/or our monthly newsletter and stay on top of the latest technology trends in Hardware, Software, ATMs, Biometrics, Wireless, Online Banking, Marketing, Security, Internet Access and Call Centers.

October 10, 2016

~ This Week's News is Sponsored by Better Branches ~



General News  

* allU.S. CU Chooses Cummins Allison
* McCoy FCU Selects Vantiv
* TransUnion Launches Fraud Prevention Exchange
* JHA Expedites P2P Payments

Cummins Allison, a provider of ATMs and coin, currency and check processing technology, has partnered with allU.S. Credit Union of Salinas, CA to help automate their branch operations. The credit union has selected the H34 automated deposit ATM, a self-service coin counter, and a JetScan two-pocket currency scanner.

Vantiv, a leading provider of payment processing services, announced that it has been selected by McCoy Federal Credit Union, one of the largest credit unions in Central Florida with assets of more half a billion dollars, as its payments processor. Vantiv will provide a suite of payment processing solutions including debit, ATM and full service credit card processing solutions.

TransUnion announced the launch of its Fraud Prevention Exchange, an industry collaborative designed to enhance responsible lending by helping combat online fraud. They state that the Fraud Prevention Exchange will help lenders face challenges brought on by originations fraud, including synthetic identity and loan stacking.

JHA Payment Solutions group announced that it has partnered with Visa to deliver faster P2P (person-to-person) payments to a recipient's Visa debit card. Their integration with Visa Direct allows recipients to receive funds on the same day or one day sooner based on the institution's funding model. Recipients have the convenience of providing their debit card rather than an account and routing number.




Hardware News

The self-contained ScanBox by Digital Check device operates independently of any tethered PC, accepting commands from a built-in touchscreen and communicating with other banking systems over a wired, wireless, or a 3G/4G mobile network. The compact check deposit kiosk can be deployed in credit union branches, retail locations and corporate environments. It can also be configured to interface with mobile remote deposit capture applications to allow smartphone- or tablet-initiated deposits and real time tracking on mobile devices.

Microsoft, and other tech leaders, have expressed interest in using software-programmable network interface cards, aka SmartNICs. A SmartNIC like the Netronome Agilio intelligent server adapter can help reduce server CPU loads and deliver better throughput to VMs. Vendors like Mirantis, Ericsson, and Juniper Networks are working to advance the OpenStack networking plugin specification in an effort to drive usage of SmartNICs. 


Hardware Section Sponsored by
Millennial Vision, Inc. (MVi)


Back to Top

Software Updates

Cloud-managed solution providers say that their Web portals allow IT Departments to find, configure and maintain network devices. This option is gaining in popularity, especially with Wi-Fi implementations; case in point is that cloud-managed Wi-Fi is outpacing on-premises management by a factor of 2-1. Avaya just announced their Cloud Networking Platform that provides full lifecycle management of wired and wireless networking devices. In action, it controls devices without requiring on-premises controllers or overlay management software. Administrators can add, remove or change network services across the network by using a dashboard. The product also includes automated software updates and license management, as well as providing an integrated guest portal and BYOD onboarding capabilities.

MailSniper is a tool that allows IT Departments to search every email in a Microsoft Exchange environment for sensitive info. It can be used to find sensitive data such as passwords, credit card numbers, account numbers, etc., or to discover insider and network architecture information. Penetration testing firm Black Hills Information Security is developing the software which is available on GitHub.


Back to Top


According to Bankrate, combined surcharges levied by ATM deployers and a consumer`s own FI total $4.57, up 5% from a year ago. They note that this is the 10th consecutive year that out-of-network fees have risen. The average surcharge levied by ATM deployers rose 2 cents to $2.90, while the average out-of-network fee levied by a consumer`s own FI rose to $1.67. Some analysts attribute the raises to: 1) ATM deployers need to raise fees to maintain the revenue of shrinking out-of-network ATM transactions and 2) an industrywide belief that consumers making out-of-network transactions are insensitive to fees.

The ATM Industry Association has published Best Practices for ATM Physical Security Version 3 to update members on counteracting current security issues. The organization says that their updated Best Practices for ATM Security publication will help ATMIA members mitigate the risks of theft of the ATM itself, theft of cash within the ATM as well as compromise of data and electronics within an ATM.


ATMs/Kiosks Sponsored by
Heritage Industries

Back to Top

CU Success Stories  


Here is a chance to learn about real life credit union success stories from various technology vendors through the words of their clients. This week's vendor is:  

Member Driven Technologies


and their client is:

Community Choice Credit Union

Credit Unions - if you have a vendor that you are happy with then please This email address is being protected from spambots. You need JavaScript enabled to view it.!

Vendors - if you have a credit union that is happy with your solutions then please This email address is being protected from spambots. You need JavaScript enabled to view it. and we will give you a $100 discount on your Case Study!


Back to Top

Wireless World

An NTT Data survey of 2,000 consumers and 300 companies globally found that more than half of consumers believe mobile payments are less safe than cash, yet almost 60% of mobile payments executives say mobile payments will build their businesses because the services are safe. The report's authors stated that “fear is a powerful inhibitor, and fraud fear is top of mind for many consumers.” The concluded that organizations must do more to ease consumer security concerns if mobile payment adoption is to become widespread. Nearly 75 percent of consumers say guarantees against monetary fraud would encourage them to use mobile payments, but only 44 percent of businesses currently offer or plan to offer such guarantees.

By some estimates, only four out of 10 banking consumers have ever used mobile remote deposit capture, and only 53 percent of those are highly active users. But according to a report by Futurion, FIs can remedy the situation by rolling out full featured mobile RDC functionality. The report states that FIs with an excellent mobile RDC app have markedly higher consumer adoption rates. They suggest that credit unions should target:

- accurate deposit error prevention and item processing

- no fees

- carefully constructed deposit limits

- physical check retention

- clearer terminology


Wireless World Sponsored by
Member Access Pacific (MAP)



The MAP App™ is the first network-branded prepaid card exclusively serving credit unions to offer mobile banking -
contact us now to learn more about this market-leading innovation for credit unions:

(866) 598 - 0698

Back to Top

Security Section

Some security experts contend that the obscurity of IPv6 helps to minimize attacks. IPv6 servers don't benefit from a built-in security feature or an inherent security superiority over IPv4 servers - they are simply harder to find. IPv6's much larger address space (2^128 potential addresses to IPv4's 2^32) makes it harder to scan and find potential IPv6 targets. For example, it is easy to obtain scan lists of IPv4 addresses with IP ranges of several well known hosting providers, but it appears that very few scammers are targeting IPv6 lists at this point.

NetGuardians says that their fraud prevention software uses Big Data to correlate and analyze user behaviors across the entire credit union system – not just at the transactional level. FraudGuardian addresses specific fraud challenges (e.g. mobile banking, payment fraud, e-banking, account takeover, identity theft) with bundles containing predefined controls called Smart Control Objectives, while their RiskGuardian compliance automation solution comes with predefined controls packaged in bundles designed specifically for regulations and operational standards.


Security Section Sponsored by
StrongAuth, Inc.



Back to Top

Leaders Roundtable

Core Systems:

The Foundation of Your Member’s Experience


Celent -
Read Stephen Greer's comments:


Corelation -
Read Theresa Benavidez's comments:


CU Answers


Enhanced Software Products -
Read Matt Lefler's comments:



Member Driven Technologies -
Read Matthew Baaki's comments:


Share One -
Read Teri Van Frank's comments:






Back to Top

Technology and Marketing

Credit union marketers are increasingly placing their marketing dollars towards social media campaigns and efforts. Unfortunately, social media can be difficult to manage when it comes to auditing and compliance. Archiving communications is critical and one firm that offers a platform is Smarsh which has been in the archiving business since 2001. The company says that their Archiving Platform allows you to access, review, and produce social media content in accordance with compliance guidance from regulatory agencies. The solution covers the most popular social media channels - Twitter, Facebook, LinkedIn, and Pinterest - as well as dozens of other different content types.


Back to Top

Online Banking/E-Commerce/Website Design

NCR has launched its cloud-based Developer Portal which enables credit unions to build their own digital banking applications. The portal provides self-service access to digital banking APIs, the Software Development Kit (SDK) and third party software connections developed by Digital Insight. It also includes an app gallery which presents a variety of developed applications to show the user what is possible, and a customer forum where developers can exchange information, tips and best practices.

While the three-digit CVV (card verification value) is supposed to help prevent fraud, CNP (card-not-present) transactions still make up about 65 percent of all card fraud. Oberthur Technologies' Motion Code CVV is a dynamic CVV that changes every hour in attempt to thwart this fraud. Oberthur claims that the battery for the digital display on the back on the card will last longer than the card`s expiration date. Card issuers can set the CVV refresh time to any time length that they desire. Websites can accept payment via the cards with Motion Code technology with no changes.


Back to Top

Internet Access

AT&T's Network on Demand service offers SDN (software defined networking) and virtualization technologies that the telecom giant says can offer new networking capabilities and cost savings. They will now partner with IBM who will sell AT&T's new FlexWare for setting up and managing virtual network functions on a single network device, such as a router. Additionally, AT&T will be able to run applications on IBM's infrastructure for cloud, cognitive analytics and security.

Unfortunately, sophisticated DDoS (distributed denial of service) attacks hit organizations of all sizes and even more disturbing is that they increasingly act as “smokescreens” in concert with other malicious activities. This might include ransomware or some other type of malware attack. In fact, research from Neustar shows that the majority of organizations that suffered a DDoS attack (53 percent) also experienced some form of additional compromise. In response, 53 percent of organizations are using traditional firewalls, 47 percent are using a cloud service provider and 36 percent are using an on premise DDoS appliance combined with a DDoS mitigation service (AKA a hybrid solution).


Back to Top

Call Centers

Some call centers are changing how they handle average handle time (AHT) which is a number that includes talk time, hold time, and after-call work time. They are shifting away from setting time goals at the agent level and moving it to the department level due to fears that agents may rush calls to meet their AHT goals and thus deliver poor service. Another reason is the shift to a sales culture which takes more time to make product and service cross-sell and/or up-sell pitches.