Your source for the latest technology information of interest to credit unions across America.

Subscribe to our weekly e-mail newsletter and/or our monthly newsletter and stay on top of the latest technology trends in Hardware, Software, ATMs, Biometrics, Wireless, Online Banking, Marketing, Security, Internet Access and Call Centers.

November 30, 2020

This Week's News is Sponsored by Better Branches ~



General News


Share One Renews Three CUs

Share One, the Memphis-based CUSO that offers the NewSolutions core system, has renewed three client contracts in the last half of 2020: 1) Whiting Refinery FCU; 2) New Haven County CU; and 3) LG&W FCU.



Plaid Teams with Banking Hub Jack Henry

FinTech startup Plaid is partnering with banking platform Jack Henry & Associates to advance the Plaid Exchange. Plaid Exchange claims to be the financial industry’s first open finance platform.





Hardware News


Software-Defined Storage as Replacement for Dedicated Arrays

Software-defined storage, or SDS, is a somewhat ambiguous term that’s been with us for over 20 years but is still at the forefront of storage technology. This article provides a quick history of software-defined storage and also discusses two SDS products that embody this original concept of flexible, scalable storage that costs less.



The 7 Best Microphones to Help You Sound Better in Your next Video Meeting

Unfortunately, the standard laptop microphone simply cannot deliver high-quality audio. An aftermarket microphone is a smart way to immediately give your audio a healthy boost. This article reviews 7 options: Blue Yeti USB Mic; HyperX SoloCast; HEiL sound PR-40; FIFINE T669; Shure MV5 Digital Condenser Microphone; JOUNIVO USB Recording Microphone; and Shure MV88 Portable iOS Microphone.



Hardware Section Sponsored by
Millennial Vision, Inc. (MVi)


Back to Top

Software Updates


FIs Looking to Confidential Computing for Solutions to Money Laundering and Fraud

To address problems such as digital theft, fraud, and money laundering, some tech companies are offering confidential computing as a potential solution. Combined with federated machine learning, companies like Intel say confidential computing can predict who is money laundering within secure enclaves without revealing sensitive information. They claim that confidential computing is a powerful new tool that helps secure data while it's in use.



Augmented and Virtual Reality for CUs

This article predicts that both AR and VR will have a positive impact on the member experience while also helping employees grow in their capabilities and roles. AR is less expensive and easier to develop than VR since it still uses the real world and “superimposes information and artificial objects” over it. This makes AR a good entry point for CUs looking to build their digital offerings. VR creates a virtual space and fully immerses individuals, which could be used to create an entirely virtual branch for members to visit 24/7.



Back to Top



Mobile Cash Technology: Get Cash from the ATM, but Leave the Debit Card Home

The mobile cash app provides an opportunity for consumers to have the convenience of using their cell phone combined with the functionality of cash. With the increase in logical ATM threats, like skimming and jackpotting, mobile cash does not require the ATM user to insert their debit card or sensitive information into the ATM. The benefit of mobile cash is if a user forgets their debit card or just wants to travel with their cellphone, they can still access cash.



Back to Top

CU Success Stories  


Here is a chance to learn about real life credit union success stories from various technology vendors through the words of their clients. This week's vendor is:  



and their client is:
NorthEast Alliance Federal Credit Union

Credit Unions - if you have a vendor that you are happy with then please This email address is being protected from spambots. You need JavaScript enabled to view it.!

Vendors - if you have a credit union that is happy with your solutions then please This email address is being protected from spambots. You need JavaScript enabled to view it. and we will give you a $100 discount on your Case Study!


Back to Top

Wireless World


Palo Alto Networks Introduces 5G Security Service

Realizing the increase in use of 5G will only increase the number of cyberattacks, Palo Alto has introduced a service that focuses on securing 5G networks and devices. The service aims to provide visibility and granular security controls to help organizations identify security issues in user and device traffic. It also provides automated threat intelligence.



Remote Working: This New Microsoft VPN Aims to Make Your Mobile Devices More Secure

Microsoft's Endpoint Security, in conjunction with Azure Active Directory and Intune, offers a set of conditional access tools that set policies to control network access for both corporate fleets and BYOD hardware. Microsoft is also currently previewing an alternative to the Windows VPN, Microsoft Tunnel, aimed at iOS, iPadOS, and Android Enterprise devices. It's a policy-driven VPN that allows you to lock down access to devices that comply with your security policies, reducing the risk of intrusion from bad actors and of data leakage through misconfigured devices that don't have appropriate separation of work and personal content.



Wireless World Sponsored by
Member Access Pacific (MAP)



The MAP App™ is the first network-branded prepaid card exclusively serving credit unions to offer mobile banking -
contact us now to learn more about this market-leading innovation for credit unions:

(866) 598 - 0698

Back to Top

Security Section


How to Speed Up Malware Analysis

Today malware evolves very fast - loaders, stealers, and different types of ransomware change so quickly, so it is a real challenge to keep up with them. Generally, there are two ways of how to perform malware analysis: 1) Static analysis and 2) Dynamic analysis - this article looks at both methods.



Facts About Backup Security That Should Scare You to Death

The idea of least privilege is often ignored in the backup space, where a person with superpowers can actually do an incredible amount of damage with just a few keystrokes. If you do not purposefully enact least privilege in your backup system, your backup system admin essentially has all power. They can easily delete an incredible amount of data and delete all of the backups of that data. This article recommends that your backup system support role-based administration, where you assign each user various roles or powers., e.g., one person might have the ability to run and monitor backups, while another has the ability to configure new backups or delete old backup configurations.



How AI May Finally Win the War Against Email Phishing Attacks

This article states that while we are far from any silver bullets when it comes to combatting phishing, email messaging is moving to a more secure future with the help of modern AI technology. One of the technologies that has been gaining momentum is natural language processing (NLP). A well-trained NLP engine can actually determine a message’s context and sentiment - such an engine might learn to accurately recognize phishing messages.



Back to Top

Leaders Roundtable

Core Systems:

Integrating Digital, Payments and the Core

Celent - http://www.celent.com
Read Stephen Greer's comments:

Enhanced Software Products - https://www.espsolution.net
Read Matt Lefler's comments:

Member Driven Technologies - http://www.mdtmi.com
Read Gary Lee's comments:

Share One - http://www.shareone.com
Read Teri Van Frank's comments:

Sharetec - http://www.sharetec.com
Read Sharetec Partners' comments:

Symitar - http://www.symitar.com
Read Shanon McLachlan's comments:

Back to Top


Technology and Marketing


How to Build a Brand with the Help of Social Media

In most cases, you stand to gain a lot from taking advantage of social media for your brand. The author offers numerous ways to put social media to good use.



Back to Top

Online Banking/E-Commerce/Website Design


Buy Now Pay Later Growing

One of 2020’s most unanticipated ecommerce trends, buy now pay later (BNPL) installment payment schemes, continues to show no signs of slowing down as the year draws toward a close. For example, two more vendors have entered the arena: QuadPay and Zilch.



Back to Top

Internet Access


Will Edge Computing Become the New Cloud in 2021?

Gartner predicts that by 2024 at least 40% of enterprises will have plans to adopt secure access service edge services, up from less than 1% at the end of 2018. They argue that organizations will need to think about how to build out edge capacity with new infrastructure and services. One example is Aruba who launched its Edge Services Platform (ESP) in June 2020 as an AI-powered, cloud-native platform to automate, unify, and protect the edge.



The Ins and Outs of Starlink: Internet from the Sky

Recent Starlink beta tests show that Starlink is living up to its promise of data speeds from 50Mb/s to 150Mb/s and latency from 20ms to 40ms. To get this, you need to be admitted into the SpaceX Starlink "Better than Nothing" beta program. If you make it in, your dish and modem/router will cost you $499 with a subscription price of $99 a month.



Back to Top

Call Centers


Chatbots Don’t Always Create Better Experiences

As FIs transition from in-branch interactions to digital-only relationships aided by key technology such as AI, chatbots have actually seen a marked decline in overall user satisfaction ratings, particularly among Millennials, according to a J.D. Power report. This article looks at three ways to improve chatbots.