Your source for the latest technology information of interest to credit unions across America.

Subscribe to our weekly e-mail newsletter and/or our monthly newsletter and stay on top of the latest technology trends in Hardware, Software, ATMs, Biometrics, Wireless, Online Banking, Marketing, Security, Internet Access and Call Centers.

February 15, 2021

This Week's News is Sponsored by Better Branches ~



General News


PayKey Unveils New Embedded Banking Solution

PayKey announced the availability of its new embedded banking solution. PayKey’s embedded solution allows users to tap on their CU's logo within the mobile keyboard and then have the ability to balance checks, pay bills, make P2P payments and get instant access to their accounts.



NICE Actimize Introduces Watch List Screening Solution

Nice announced the launch of WL-X, its next-generation Watch List (WL) screening solution. The software features real-time and on-demand screening for parties and payments that leverages AI and biometrics to match and screen against global sanctions, politically-exposed persons (PEPs), adverse media and other lists. The solution also orchestrates and aggregates list data from premium and public sources with internal lists.





Hardware News


Palo Alto Networks Joins Flexible Firewall Party. Will Cisco Follow Suit?

Palo Alto Networks will soon change its licensing for all of its software firewalls and security services to a more consumption-based approach. The new model uses credit-based licensing. It lets customers resize their software firewall as traffic levels change and add or delete security services on demand, as opposed to buying a fixed-size firewall based on projected traffic levels with security services bundled in. Other leading firewall vendors already adopted similar consumption-based licensing approaches. Fortinet, Forcepoint, and Check Point rolled theirs out last year; meanwhile a Cisco spokesperson said that vendor “is working on license flexibility and portability across security products including firewalls.”




USB-Lock-RP allows system administrators to manage USB access from a central administrative console. The program works on-premises and is designed to: 1) Prevent unauthorized use of removable media; 2) Authorize devices (white list); and 3) Monitor and report device activity and security status.



Hardware Section Sponsored by
Millennial Vision, Inc. (MVi)


Back to Top

Software Updates


Axio Launches Free Ransomware Preparedness Assessment Tool

Axio announced the availability of a complimentary Ransomware Preparedness Assessment tool to give organizations detailed visibility into their cyber posture with respect to ransomware. The assessment is based on data from hundreds of real ransomware events, guidance from the U.S. Department of Homeland Security, and Axio’s research.



Windows 10 in S Mode: Pros and Cons

In 2017, Microsoft added a new feature to its Windows 10 operating system: S mode, a stripped-down, tightly-locked, and low-end PC friendly way to run Windows 10. There are a lot of good reasons to put a Windows 10 PC in S mode, but performance and security improvements always come at a cost. This article looks at some of the pros and cons of S Mode.



Back to Top



Assisted Self-Service Terminals Provide Bridge Between Physical and Digital Banking

The number of assisted self-service banking terminals installed around the world has been increasing significantly over recent years, allowing FIs to migrate transactions away from the teller’s desk and redeploy staff to focus on sales and advisory activities. Findings from RBR’s latest study, Branch Transformation 2021, show that there are 340,000 assisted self-service terminals (ASSTs) deployed worldwide. The report shows that the USA is the world’s second largest ASST market after China. Here, it is typical for people to receive remote video assistance, often from their vehicle in drive-through banking lanes, allowing them to access a wide range of services outside of the core branch opening hours.



ATM Thefts: A Growing Source of Insurer Loss

Travelers insurance reported that claims for damages due to ATM thefts increased by 220% from 2019 to 2020. They note that claims can be high since ATMs themselves can cost $30,000 to $80,000, and could have $40,000+ in cash inside.



Back to Top

CU Success Stories  


Here is a chance to learn about real life credit union success stories from various technology vendors through the words of their clients. This week's vendor is:  

Adapt Telephony Services


and their client is:

Chicago Patrolmen's Federal Credit Union

Credit Unions - if you have a vendor that you are happy with then please This email address is being protected from spambots. You need JavaScript enabled to view it.!

Vendors - if you have a credit union that is happy with your solutions then please This email address is being protected from spambots. You need JavaScript enabled to view it. and we will give you a $100 discount on your Case Study!


Back to Top

Wireless World


How 5G Could Replace Your Home Broadband Connection

5G networks are slowly but steadily blanketing the world, and though the lightning-fast speeds we’ve been promised are a little tough to find, you can expect to see some changes. The benefits that 5G brings in terms of faster download speeds, faster upload speeds, more bandwidth and lower latency mean that it’s very possible to get online using 5G rather than a conventional broadband link—but there’s a lot you need to know before choosing 5G broadband. This article looks at some 5G usage considerations.



Mobile Banking App Includes Digital Receipts

Barclays has begun the roll out of digital receipts from Flux to users of its mobile banking app. Debit cardholders who pay at certain retailers will see their receipts sent automatically to their app after making a purchase. Receipts can be called up and viewed by tapping on the transaction.



Back to Top

Security Section


What’s Your Plan for Battling Synthetic Fraud?

Synthetic fraud is appearing more frequently in conversations and on security agendas across the financial services industry. This is not because synthetic fraud is new—this problem has been on the security radar for financial services firms for years—but rather because it is getting more sophisticated every day. The authors highlight three key areas in which synthetic fraud analytics activities are often focused.



7 Biggest Challenges of KYC Monitoring

KYC monitoring is vital to ensure compliance with Money Laundering directives. This article looks at 7 pain points when it comes to KYC monitoring: 1) Money and time wasted on false positives; 2) Undetected risks due to poor data; 3) Lack of detail of alerts lead to inefficiencies; 4) Poor record keeping; 5) Lack of configurability; 6) Holistic approach to compliance better than a data-driven model; and 7) Amber Management monitoring.



Back to Top


Technology and Marketing


5 Digital Marketing Trends to Watch out for in 2021

This article analyzes 5 digital marketing trends for 2021: 1) Marketing Automation; 2) SMS Marketing; 3) User-Generated Content; 4) Revamped SEO due to new Google updates; and 5) Social E-Commerce.



Back to Top

Online Banking/E-Commerce/Website Design


Over Half of Consumers Considering a Move to Digital Banks

Survey findings from Juniper Research have revealed that more than 50% of American households are considering a move away from bricks and mortar-style FIs. Consumers expect digital banks to offer all the tech trimmings such as dependable online access, user-friendly finance apps and lots of useful tools for everyday banking. However, the public also wants traditional ‘best buy’ features including sign-up benefits and good rates according to the study results.



Mastercard to Enable Crypto Flow Across Its Network

Mastercard is preparing its network to handle the direct processing of cryptocurrency payments later this year. Mastercard has already dipped its toes in the water, teaming up with Wirex and BitPay last year to create crypto cards that allow people to transact using their cryptocurrencies. The card scheme has also joined forces with LVL, an up-and-coming cryptocurrency exchange. In all of these cases, the cryptocurrencies themselves still don’t move through the network, but instead are converted to fiat for onward transmission.



Back to Top

Internet Access


How Distributed Denial of Service Attacks Are Evolving

Denial-of-service attacks have been part of the criminal toolbox for twenty years, and they’re only growing more prevalent and stronger. Today it’s becoming more common for these attacks to be conducted by rented botnets. Another trend is the use of multiple attack vectors within an attack, also known as Advanced Persistent Denial-of-Service APDoS. Finally, organizations are no longer merely concerned with DDoS attacks on themselves, but attacks on their numerous business partners, vendors, and suppliers on whom they rely on to keep their operations running.



How to Select an Enterprise VPN That Protects Data but Doesn't Drive Users Crazy

This article recommends that IT teams look for VPN services with automatic alerts about user behavior, logging, scalability, and central management. Plus they must consider secondary technical parameters, such as connectivity, speed, latency, supported devices, and the number of permitted connections.



Back to Top

Call Centers


12 Better Ways to Start Service Emails

The author asks the question: Can we write fresher emails that are less scripted-sounding, more personal, or better aligned with our organization’s brand voice? She says: Yes, and then goes on to list 12 better ways to start an email reply.