Your source for the latest technology information of interest to community banks across America.
Subscribe to our monthly newsletter and stay on top of the latest technology trends in Hardware, Software, ATMs, Biometrics, Wireless, Online Banking, Marketing, Security, Internet Access and Call Centers.
The Check is NOT in the mail: Easy to use, cost effective payment collection tools that reduce delinquencies & offer customers multiple payment options
How many times have you heard delinquent customers say, "THE CHECK IS IN THE MAIL!"? If you are interested in learning how they were able to solve this time and money consuming issue you need to attend this informative webinar.
What You Will Learn:
• How any computer with Internet access can be used to accept payments by phone
• Emailing payment receipts to comply with NACHA rules
• Easy reporting tools to reconcile payments
• Charging convenience fees: Are you eligible?
• Easy website and IVR payments for 24/7 payment collection
Who Should Attend: Any community bank looking to reduce delinquent payments.
Date: Schedule a 30-minute live demonstration at your convenience!
To Register: http://www.banktt.com/webinars.htm
LenovoEMC has launched its px4-400r network storage array designed for small- to mid-sized businesses and branch offices. The single rack unit has four bays and serves as a network attached storage array. It includes LenovoEMC's LifeLine operating system and has 7200rpm SATA-III drives that add up to 16TB of capacity.
Dell has introduced their new Dell Wyse D10D which is a high-performance thin client based on Dell Wyse ThinOS. The computer giant claims that the unit comes with a virus-immune firmware base that is designed for optimal thin client security, performance, and ease-of-use. The machine features a dual-core AMD 1.4 GHz processor and Dell says that you can take the machine from box to productivity in minutes with auto configuration.
|
Hardware Section Sponsored by
MVi |
Software Updates
DeskPDF is a utility for creating, editing, and even signing PDF files. It costs $79.95, but a free 10-day trial version is available for download. The software allows PDFs to be created from just about any type of file, and you can also convert PDFs to Microsoft office documents, HTML, XML, or to various image formats. The software also contains functionality that allows you to create PDF forms containing interactive objects, such as check boxes.
ManageEngine announced enhancements to its firewall security and configuration management software, Firewall Analyzer, and to EventLog Analyzer, its log management and IT compliance software for SIEM. Now, Firewall Analyzer provides security policy management for Cisco and FortiNet firewalls as well as reporting on used and unused firewall policies and policy objects. EventLog Analyzer can now manage event logs from a much wider range of systems. The new features have been incorporated into Firewall Analyzer 8.0 and EventLog Analyzer 8.6.
|
Software Section Sponsored by
Raddon Financial Group (RFG) |
According to the BBC, USB-based malware has been used in Europe to siphon money from several unpatched ATMs. The criminals manually cut holes in the machines to plug in USB sticks that then installed malware on the system. The software allowed them to create a unique interface on the ATMs by typing in a 12-digit code. This interface allowed for withdrawals and also showed the criminals the amount of money and each bill denomination inside the machines. Many security experts were surprised that these ATMs were not configured to disable the "boot from USB" functionality.
While the migration from Windows XP to Windows 7 on ATMs will certainly be time-consuming and costly for ATM deployers, there are certainly advantages in performing the upgrade. Windows 7 offers a more sophisticated user interface that enables ATMs to offer support for the latest touchscreen technology and iPad-style interactions. Windows 7 also has several built-in features that make it more secure than XP, such as Session Zero Isolation.
|
ATMs/Kiosks Sponsored by
Heritage Industries |
In their new report "Remote Deposit Capture Solutions 2013: ABCD Vendor View," Celent notes that barely 10% of US financial institutions offer mobile RDC (mRDC) to consumers. However they predict rapid expansion in 2014 because they believe that RDC - particularly mobile RDC - can be a consumer and deposit acquisition tool. They also note that current solutions offer powerful risk and compliance management capabilities that earlier products lacked.
Accellion offers secure mobile file sharing solutions to enable users to access, create, edit and share content securely on their mobile devices. The company provides secure mobile file sharing solutions via private, public, and hybrid cloud deployments, The software includes centralized management of users and files via single sign-on (SSO), data leak prevention (DLP) and strong encryption via a FIPS 140-2 certified module.
According to AV-Test. there are nearly 180 million malware programs, and more than 200,000 new malicious programs are produced every day. There is no way that even the best malware scanners can keep up with this assault. Whitelisting (aka application control) proponents argue that whitelisting can be used by any organization to detect previously undetectable malware threats, and help with this malware explosion.
Even as BYOD (bring your own device) continues to gain popularity because of its convenience and cost savings features, it remains nightmare for many IT Departments concerned about security. However there is good news for nervous security managers: biometric technology can open up a host of new possibilities and an entirely new level of security for BYOD devices. It offers the potential to deliver a higher level of identity assurance, at least for basic device access. Biometrics is well suited to mobile devices with their built-in cameras, microphones and of course Apple's fingerprint technology on the latest iPhones. Finally the phone can be a cost-saving ally because it allows you to bypass the huge expense of giving staff traditional authentication tokens such as OTP widgets and smart cards.
|
Security Section Sponsored by
THE FINANCIAL & SECURITY PRODUCTS ASSOCIATION (FSPA) |
Our members, located in every state, will be more than happy to consult with your bank regarding: Upgrading branch security equipment, remodeling branches, servicing all types of physical & electronic security equipment (to include keeping older equipment operational), and providing quotes on ATMS, cash-recyclers, safes, vaults, safe-deposit boxes, after-hour-depositories, drive-up banking systems, tellers’ undercounter steel & storage units, insulated products and all types of electronic security & digital video systems. This email address is being protected from spambots. You need JavaScript enabled to view it. by telephone or e-mail for an immediate referral to a member-company in your local area.
COMMUNITY BANKS:
For more information or for a member referral in your specific geographic area, please This email address is being protected from spambots. You need JavaScript enabled to view it. for a prompt & detailed response. Our members carry a very broad line of products and are able to provide community banks with many powerful and affordable alternatives for their security equipment & servicing needs.
SECURITY VENDORS:
For more information about joining our organization and all of the accompanying benefits, please This email address is being protected from spambots. You need JavaScript enabled to view it. for a prompt & detailed response.
Call Today: 800.843.6082
Visit Us Online Today: http://www.fspa1.com
Core Systems:
Driving More Efficiency From Core Systems
|
|
|
|
|
Harland Financial Solutions -http://www.harlandfinancialsolutions.com |
|
Mercator Advisory Group -http://www.mercatoradsvisorygroup.com
Read Edward O'Brien's comments: http://www.banktt.com/Mercator.pdf |
According to the latest industry data, the number of e-mail users in the United States continues to grow exponentially with each passing year. eMarketer projects that there will be nearly 240 million Americans with email accounts by 2017. While many organizations are shifting their marketing budgets to social media, e-mail marketing still matters in 2014. Some e-mail marketing gurus offer these three e-mail campaign recommendations:
1) Relevance has been called the Holy Grail of email marketing - maintain focus on what your customers are interested in (based on everything from their product mix to behavioral data)
2) Content is paramount - regardless of your underlying promotional objectives, give the e-mail concrete value by presenting pertinent news, advice, or resources that communicate your awareness of that customer’s interests and your authority on the matter at hand
3) Call to action must be clear - your email must be actionable by boldly highlighting an offer, invite, or opportunity with a clear path to act
Online Banking/E-Commerce/Website Design
More and more financial institutions are investing in virtual banking and other technology as consumers become comfortable using electronic signatures to sign documents and communicating via video conferencing. Private conference rooms with a camera, video screen, signature pad and printer are used in some scenarios. Instead of purely digital signatures, UMB Bank in Kansas City has chosen to use remote robotic signature technology so customers can sign their name on a tablet and have it physically replicated. In Kansas City, a robot holds a pen that is visible to the customer on the monitor and it mimics the movements of the customer’s hand, reproducing the signature using ink on a paper document there.
Zeus has been the undisputed leader in banking malware for many years and it remains active today, but it appears that new malware named Neverquest is raising the bar for online banking malware. This Trojan is loaded via social media, email, or file transfer and watches for key banking terms that are typed into a browser. It will relay the login information back to the command and control server which will allow the scammers to remotely control the victim's computer using VNC, log into the victim's banking website and essentially become that person.
In a new take on distributed denial-of-service (DDoS) attacks, attackers are targeting the Network Time Protocol, or NTP, which syncs time between machines on the network. Symantec has discovered a major jump in so-called NTP reflection attacks. In response, Symantec recommends that organizations update their NTP implementations to version 4.2.7, or disable access to monlist in older versions of NTP.
By definition, a Session Initiation Protocol (SIP) trunk is a virtual interface that connects enterprise communications systems with each other or to a third party communications service. They can be used to access audio or video conferencing, unified communications, contact center and other services, regardless of whether they are provided by on-premise equipment or hosted in the cloud. While (SIP) trunks can be a lower cost alternative to traditional T1/PRI trunks, SIP proponents say that the SIP services can also increase business agility, improve productivity and reduce costs.
Some contact center observers contend that centers are inundated with information that they can't use to better serve callers. They say that much of this information is contained in legacy reports that were created when agent efficiency was more important than customer satisfaction. They point to one survey by the by the International Customer Management Institute (ICMI) which found that the five most collected metrics were average handle time (79 percent), abandonment rate (75 percent), average speed of answer (72 percent), after call work (63 percent) and quality (61 percent).