Your source for the latest technology information of interest to credit unions across America.

Subscribe to our weekly e-mail newsletter and/or our monthly newsletter and stay on top of the latest technology trends in Hardware, Software, ATMs, Biometrics, Wireless, Online Banking, Marketing, Security, Internet Access and Call Centers.

Credit Union Technology Talk Logo

January 23, 2017

~ This Week's News is Sponsored by Better Branches ~



General News  

* PSCU and Cooperative CU Association Partner
* Sharetec Garners Top Ratings
* First Oklahoma FCU Chooses Fiserv
* UNFCU Selects Jwaala

PSCU, the nation's leading credit union service organization, has been named the payments provider for the Cooperative Credit Union Association (CCUA). Under terms of the agreement, PSCU establishes long-term servicing relationships with 44 credit unions, representing 47,000 credit and debit accounts.

Sharetec, a provider of both in-house and service bureau core solutions to nearly 300 credit unions, announced the 2016 results for its Annual Customer Satisfaction Survey. The company captured a 9.26 satisfaction rating out of a possible 10 for 2016, with nearly 25% ranking Sharetec a perfect 10.

Fiserv, a leading global provider of financial services technology solutions, announced that First Oklahoma Federal Credit Union, based in Tulsa, OK, has selected their selected the Portico core account processing platform. The software-as-a-service (SaaS) suite selected by First Oklahoma includes Virtual Branch for online banking, Mobiliti for mobile banking, Mobile Source Capture for mobile deposits, Loancierge for lending automation, and Wisdom for accounting and call report management, in addition to solutions for statements, identity verification, web signatures and website hosting.

Jwaala, a provider of mobile and online banking solutions, announced that Long Island, NY-based United Nations Federal Credit Union (UNFCU) has selected its Ignite Platform. UNFCU was founded in 1947 and has more than 125,000 members.



Credit Union InfoSecurity Conference Sponsored by
imsmartin consulting


15th annual CU InfoSecurity Conference will be held June 14 - 16 in San Diego.

This Conference provides an excellent, cost effective way to show Regulators that your CU is serious about Information Security and that your staff is getting training on how it can protect itself against constantly changing techniques and threats.

This is a one-of-a-kind conference - a security conference dedicated solely to credit unions. Highly experienced, expert speakers discuss the latest security trends as they specifically apply to credit unions. Also included are three CU speakers from Logix FCU, Golden 1 CU, and San Diego County CU. The CU InfoSecurity Conference is the best conference value in the credit union movement: just $495 per attendee and $395 for returning attendees. Topics include:

* HoneyNets
* Ransomware
* USB Security
* Secure Workflows
* CyberCrime Trends
* Why You Need a WAF
* Data Leak Prevention
* Cybersecurity Assessments
* Working with Law Enforcement
* Blockchain Security Explained
* Next-Gen IT Security Risk Assessments
* Fear Your On Premise Security, Not the Cloud
* Is Your Credit Union’s IT Insecure by Design
* Multiple Biometric Authentication Technologies
* How to Build a Real-Time Insider Threat Program
* Fine Tuning: Six things you can do right now to improve your information security

Click Here for information, agenda, reservations & more.




Hardware News

Fujitsu announced development of the world's first slide-style palm vein authentication technology which is compact enough to be equipped in tablets and other handheld mobile devices. They developed a new verification technology that captures the complete pattern of a palm's veins, dividing the pattern into slices as the hand passes over the small optical unit. They claim that as a result, palm vein authentication - with its accurate authentication and the spoof-resistance offered by biological information from within the body - can be put to wider use.

Digital Check`s SecureLink device for network-enabled check scanning allows networking and PC-free control of most Digital Check scanners, including scanners already deployed in the field. The initial SecureLink model is an external attachment that connects to a scanner via USB and is certified for use with TellerScan TS240, TS500, and CheXpress CX30 devices. The PC-free operation allows the scanner to be controlled via a web browser by a wide array of client devices – including Apple and Android tablets and smartphones, as well as desktop and laptop PCs without the need for scanner driver software installations. 


Hardware Section Sponsored by
Millennial Vision, Inc. (MVi)


Back to Top

Software Updates

DataGravity says that DataGravity for Virtualization (DGfV) is the first product to offer behavior-based data protection and visibility into unstructured data across virtual environments. DGfV monitors user interactions with the data stored within a VM and triggers data protection points when anomalous user behavior is detected. Other actions include logging the issue to your SIEM via syslog and notifying the administrator via email of the issue. Catalogs are created for each snapshot that include an audit trail of changed and deleted files, data access patterns, and content properties. You can recover from malicious events by restoring previous file versions from available snapshots.

According to a Microsoft employee, Windows 7 "does not meet the requirements of modern technology, nor the high security requirements of IT departments." Windows 7 doesn't reach its end of life for three more years, but Microsoft says you shouldn't wait that long to update to Windows 10. With the upcoming release of the Creators Update, Windows 10 will include a UEFI (Unified Extensible Firmware Interface) conversion tool that will reduce the need for IT admins to manually convert Windows 7 devices using legacy BIOSes. The tool will integrate with other management tools like System Center Configuration Manager to make it easier to upgrade.


Back to Top


According to the report entitled "Millennials, Gen X, and Baby Boomers: Financial Insights," access to surcharge-free ATMs is a top motivator for millennials when it comes to changing FIs. The recent survey by Phoenix Synergistics showed that approximately 13 percent of millennial checking account holders have moved or switched their main checking account within the past two years. By comparison, less than 10 percent of Gen Xers and baby boomers have done so. Along with surcharge-free ATM access, other top change motivators were free checking; a life-changing event such as moving or getting married; and the search for better service.

Diebold Nixdorf is showcasing a new self-checkout concept dubbed the Extreme Self-Checkout Concept that is just one and a half times the width of a dollar bill. The company says that it has the ability to serve as an ATM, point-of-sale (POS) terminal and a self-checkout unit. The terminal can accept cards, cash and touch-free payments, and only reads cards with EMV chips.


ATMs/Kiosks Sponsored by
Heritage Industries

Back to Top

CU Success Stories  


Here is a chance to learn about real life credit union success stories from various technology vendors through the words of their clients. This week's vendor is:  



and their client is:

Holy Rosary Credit Union

Credit Unions - if you have a vendor that you are happy with then please This email address is being protected from spambots. You need JavaScript enabled to view it.!

Vendors - if you have a credit union that is happy with your solutions then please This email address is being protected from spambots. You need JavaScript enabled to view it. and we will give you a $100 discount on your Case Study!


Back to Top

Wireless World

The global mobile wallet market is projected to grow at a CAGR of 35.5 percent from 2017 to 2021, according to research firm Research and Markets. The growing use of 3G and 2G mobile data and broadband globally is a major factor contributing to the growth of the global mobile wallet market. The research firm also notes that the increasing technological advances in NFC devices and growing security of payment portals are other factors driving the market growth.

Australia and New Zealand Banking Group (ANZ) has launched a new service that replaces lost/stolen credit and debit cards with a new virtual card. Once a cardholder calls to report their debit or credit card as missing, ANZ blocks the original card and automatically uploads the new virtual card details to their digital wallet. They support both Apple Pay and Android Pay and allow cardholders to keep their existing personal identification number, provided it has not been compromised, meaning less change with the same high level of security.


Wireless World Sponsored by
Member Access Pacific (MAP)



The MAP App™ is the first network-branded prepaid card exclusively serving credit unions to offer mobile banking -
contact us now to learn more about this market-leading innovation for credit unions:

(866) 598 - 0698

Back to Top

Security Section

Shape Security's study of large organizations shows that it is common for credential-stuffing login attempts to account for more than 90% of all login activity on Internet-facing systems. The study concludes that with automation, attackers are using pilfered passwords quite effectively. The bad news is that attackers utilizing automated credential stuffing tools can take credentials from breaches such as Yahoo's massive one and then use them on other websites with up to a 2% success rate for account takeover. One problem with credential stuffing is that many organizations don't have visibility into the volume of automated login traffic that is accessing their websites because these attacks are not taking advantage of vulnerabilities per se.

Carbon Black released Cb Response 6.0, a new version of its incident response and threat-hunting solution. They have added new search features via a new Process-Timeline View that enable security personnel to zoom in on specific timeframes via click-and-drag functions or broadly view the timeline to note anomalies. The company claims that security teams` total incident response time shifts from 78 hours to less than 15 minutes per incident, while root-cause identification shifts from 20 hours to less than 10 minutes with their solution in place.


Back to Top

Leaders Roundtable


Battling Security Fatigue – Working Towards Usable Security




Onbase by Hyland Software - https://www.onbase.com
Read Steve Comer's comments:


Millennial Vision - http://www.mviusa.com
Read Scott Cowan's comments:


NetWatcher - http://www.netwatcher.com
Read Scott B. Suhy's comments:


Nintex - https://www.nintex.com
Read Mike Fitzmaurice's comments:


Network Bix USA
Network Box - https://www.networkboxusa.com  
Read Pierluigi Stella's comments:


Pure IT Credit Union Services - http://pureitcuso.com
Read Kyle Stutzman's comments:


Security Compliance Associates - http://www.scasecurity.com
Read Jim Brahm's comments:


SentinelOne - https://www.sentinelone.com
Read Jeremiah Grossman's comments:


Back to Top

Technology and Marketing

Marketing executives need to track the ROI on their marketing dollars so they can strategically allocate their budgets and demonstrate the effectiveness of their campaigns. One way to do this is to invest in a marketing dashboard program. Domo offers a dashboard service that helps track Digital Marketing; Field Marketing; Marketing Operations; and Social Media/PR. The solution provides over 400 connectors to the most popular business applications. It also includes alerts that are triggered by irregularities in your data, and a host of predictive business tools. They also offer implementation and consulting services for their cloud-based platform.


Back to Top

Online Banking/E-Commerce/Website Design

The Consumer Financial Data Rights coalition was recently formed to advocate for consumers' rights to share their FI-stored data with third parties. Backed by FinTech firms such as Affirm, Yodlee, Betterment, Kabbage, Ripple and Varo Money, the group is pushing for data access via application program interfaces (APIs). They point to the United Kingdom which has adopted an Open Banking standard as one model that they would like to emulate.

Pushfor is a secure content sharing and instant messaging platform that converts and projects content to any device - content is pushed but never sent and can be pulled back at any time. It offers real-time tracking of the content journey, with full audit trail. The company states that their platform allows for new digital services to be introduced such as digital vaults and improved KYC processes.

ACI Worldwide says that the latest version of its UP Immediate Payments solution provides access to all Immediate Payments schemes globally. The solution features new functionality designed specifically for the management and processing of real-time payments, and is available via a SaaS delivery model or on premise. The core technology of the TCH (real time US payments) scheme is being built by ACI's partner VocaLink.


Back to Top

Internet Access

The Talari Appliance E100 is designed for organizations that require a flexible yet easy way to deploy a SD-WAN and WAN edge solution for their small to medium branches. It supports the aggregation of WAN bandwidth up to 100 Mbps across multiple WAN connections, and comes with Talari Basic View with Configuration Templates to help with configuration and management. Talari`s Adaptive Path Networking software, which drives the E-100, consolidates key branch services, such as routing, firewall and DHCP on a common platform. The company states that these capabilities allow organizations to replace legacy routers and service delivery platforms and thus enjoy significant cost savings.

By some estimates, there are over 800 broadband providers in the US. Companies such as Hughes Network Systems are available to help organizations manage their different providers. Their new Hughes Managed SD-WAN is aimed at distributed organizations that mostly use broadband communications, simplifying the management of those connections and helping to ensure that their applications run smoothly. The solution includes an array of optimization features that can help cover for uneven broadband network quality.


Back to Top

Call Centers

Security experts recommend that contact centers have strong shredding policies and are diligent about enforcing them. That is because some agents still use pen and paper in the increasingly digital world. For example, a member might have a laundry list of issues that can`t all be addressed via one view of the system and to prevent having to ask them over and over what is next, they might jot down critical information. Proper security procedures should include easy access to a shredder where employees can take all of their paper notes and shred them at the end of their shift.