Your source for the latest technology information of interest to credit unions across America.
Subscribe to our weekly e-mail newsletter and/or our monthly newsletter and stay on top of the latest technology trends in Hardware, Software, ATMs, Biometrics, Wireless, Online Banking, Marketing, Security, Internet Access and Call Centers.
This Week's News is Sponsored by Better Branches ~
Chimney announces partnerships with three new credit unions to help deliver personalized, interactive digital content. The latest CUs to select Chimney are: NorthCountry FCU, Maui County FCU, and Solarity CU.
Zebra Technologies announced First Tech Federal Credit Union has selected Reflexis for Banking. Zebra’s Reflexis for Banking provides branch staffing optimization and mobile tools for improved employee engagement.
Enterprise SSD products are separating themselves from their consumer counterparts by getting faster, smarter and denser. Among the latest developments are three new products from Samsung, Micron and Kioxia. This article explains all of the new improvments to these vendors' SSD products.
The author argues that printers should be given the same amount of security resources, controls, processes and isolation as need for any other computer in your network. She recommends that you focus on these eight areas to keep you printers from being a point of entry for attackers: 1. Limit access privileges to printers; 2. Disable unused protocols; 3. Review printer firmware level; 4. Beware of automatic reports of printer activity; 5. Know what information your printers process; 6. Properly manage printer log files; 7. Confirm security controls; and 8. Review latest guidance for smart card authentication.
Brute-forced RDP access and malicious macros have for a long time been two of the most popular tactics used by threat actors to gain unauthorized access to Windows systems. In response, Win11 builds now have a DEFAULT account lockout policy to mitigate RDP and other brute force password vectors. Microsoft also confirmed that they will resume the rollout of the default blocking of VBA macros obtained from the Internet.
Many software providers offer BCM solutions that assist organizations in planning for and responding to disasters. The following BCM platforms are reviewed in this article: 1) Agility RecoveryPlanner; 2) Archer Business Resiliency; 3) Castellan Business Continuity Management; 4) CL360 Business Continuity; 5) Fusion Framework System; 6) NAVEX One IRM; 7) ParaSolution Business Continuity Platform; 8) SAI360 Business Continuity Management; 9) LogicManager Business Continuity Management; and 10) Quantivate Business Continuity Management.
Software Section Sponsored by
Aurora Advantage (A Product of CSPI)
In the last 12 months, American consumers have used slightly more cash for transactions than they did at this time last year. This rise in cash usage along with a small increase in purchases and peer-to-peer payments made in-person may imply that some consumers are moving back to the way they did business prior to COVID-19. The rise in cash payments is one key finding from a recent survey the Federal Reserve Banks of San Francisco and Atlanta conducted to better understand U.S. consumers’ payment behavior.
Tritec has introduced two ATM models: the Hyosung MX5300 and NH2700 CE. Tritec aims to boost transaction speeds and profits for both FIs and small businesses with these ATMs, according to the company.
Here is a chance to learn about real life credit union success stories from various technology vendors through the words of their clients. This week's vendor is:
and their client is:
NorthEast Alliance Federal Credit Union
America First said all of its 121 branches in Utah and Arizona will accept mDLs for ID verification for all banking transactions. The announcement stated Utah was the first state in the U.S. to pilot mDLs that are fully compliant with the ISO 18013-5 international security standard, which means the mDL is accepted globally as a legal form of identification.
Consumers increasingly expect a stellar mobile banking experience or they will let the world know by down-rating your app on the two key app markets. Monitoring what they are saying and reacting to it have become essentials of competitive survival. This article states that app promotion takes active marketing, and that responding to reviews, both positive and negative, can be helpful. It concludes that there are several key capabilities to consider including: 1. Simplicity and ease of use from day one; 2. Secure login with biometric authentication; 3. Personalized financial tools & product offers; 4. Build in push notifications; and 5. Virtual assistants and chatbots.
TrustedSite has launched Halo Security which is an attack surface management platform that combines external asset risk and vulnerability assessment, and penetration testing services. The firm claims that their agentless and recursive discovery engine discovers the assets you’re not aware of, so you can prioritize your efforts from a single pane of glass.
Microsoft Defender Threat Intelligence brings together all the different data sets you need to check out a domain, host or IP address that you think may be compromised, complete with metrics to help you know what you should worry about, as well as information about attack groups, malware and vulnerabilities. Meanwhile, Defender External Attack Surface Management scans your infrastructure from the Internet the way an attacker would, looking for all the assets that are connected to your organization and checking them for known vulnerabilities and compliance issues.
Technology and Marketing
The author states that a vast majority of FIs understand the foundational need to let data drive decision-making, yet a successful data-driven mindset still eludes many of them. What interferes with FIs leveraging data? She says the constant evolution of consumer data tracking, a massive growth in data volumes, and new concerns over privacy. However she concludes that the biggest barrier to overcome has nothing to do with data or the technology that tracks it, but rather, it is leadership and corporate culture. A main juxtaposition between FIs achieving success versus those lagging is their ability to lead and adapt.
Everyone has their own approach to SEO. Some might say SEO involves meta data. Some might say SEO is very “technical,” and includes things like addressing page speed. Put simply, SEO is the process of building your web presence to connect with consumers. The author states that an SEO effort is truly ‘marketing’ and goes on to layout steps to incorporate SEO into your Marketing Department.
Benchmarking Your Digital Banking Strategy
Access Softek - http://www.accesssoftek.com
Read Chris Doner's comments:
Humanizing Digital: Increasing Account Holder Loyalty and Exceeding CU Goals with Smart, Flexible Solutions
Digital Transformation: A Credit Union Imperative
The Digital Banking Market Is Heating Up
Three Present-Day Goals to Revolutionize Your FI’s Marketing
eSignatures Are Now a Top Priority Across the Nation
Fight Fraud by Better Understanding Your Financial Data
It’s Always About the People: 5 Rules for Digital Banking and Beyond
According to this article, an electronic bill presentment and payment (EBPP) platform is no longer a luxury for FIs. EBPP platforms can expedite payments, create revenue opportunities, ensure accurate payment posting and allow for the consolidation of receivables and data. Also some EBPP solutions can be built into integrated platforms that include other treasury services such as lockbox or remote deposit.
After experiencing the ease in both the speed and functionality of apps like Venmo, CashApp, and PayPal, many Americans may no longer be willing to accept tedious mobile banking apps – and their corresponding delays – when sending peer-to-peer payments. The author recommends that CUs invest in accessible digital banking platforms that offer fee-free and frictionless transfers. She points to Amplify Credit Union as an example of a CU that went entirely fee-free earlier this year, including wire-transfer fees, overdraft fees, and more.
Understandably, security teams wish to check all the relevant boxes when implementing appropriate security policies to ensure comprehensive cloud security coverage. In the process, however, they are playing into the most common grievance business leaders have against security practitioners – security restricts and inhibits innovation. This article explores some cloud data security policy pitfalls security teams should look out for and avoid when defining and implementing cloud data security policies.
An emerging technology called multi-cloud networking software (MCNS) is coming together from a variety of vendors — Cisco, Arista, VMware, and F5 among them — to address many of multi-cloud management challenges. MCNS technology helps enable consistent networking policy, network security, governance, and network visibility across multiple cloud environments via a single point of management. As part of these trends, Cisco recently made a significant addition to its MCNS portfolio with the introduction of Nexus Cloud.
This article discusses some key areas or ways to upgrade your performance management programs. It recommends the following 6 strategies: 1) Build empathy; 2) Redo KPIs; 3) Consider an Agile Approach; 4) Increase communication; 5) Showcase Career Progression; and 6) Use peer reviews.