Your source for the latest technology information of interest to community banks across America.
Subscribe to our monthly newsletter and stay on top of the latest technology trends in Hardware, Software, ATMs, Biometrics, Wireless, Online Banking, Marketing, Security, Internet Access and Call Centers.
~~
According to a study from Rutgers University, humidity is a greater risk to hard drive reliability than high temperatures. Their extensive research shows that disk failures accounted for 89% of component failures in a data center, with memory DIMMs coming second at 10%, and CPUs at 5%. Their tests were carried out on more than a million drives in nine Microsoft data centers over a multi-year period. They recommend positioning the drives in the hot region at the back of the server because the heat is not as destructive as the humidity and the heat of that position in the server kept humidity levels down.
Hewlett-Packard claims that its new Spectre laptop is the world`s thinnest laptop. The Spectre measures less than a 1/2" (0.41 inches) thick. It features a nine-hour battery life, 13-inch HD 1920 x 1080 resolution display, and sixth generation Intel Core i5 or i7 processor. The new machine runs around $1200.
~~~
The MiniTool Power Data Recovery tool provides five recovery modules to help recover lost data: Undelete Recovery, Lost Partition Recovery, Digital Media Recovery, Damaged Partition Recovery, and CD/DVD Recovery. It can even find data on formatted or deleted drives. However, it does not include the ability to choose file types to scan for, but it does recover 1GB of data for free. The program costs $69 for the Standard edition for one device.
Xavient Information Systems, a global IT consulting and software services company, believes that banks must capitalize on Big Data in order to boost the customer experience. They suggest that analytics and Big Data can be used to offer “specific services” and set pricing based on factors such as:
- a customer`s banking patterns
- levels of deposits
- debit/credit spending patterns
- Web browsing history
- social media information
- geolocation data from mobile banking
~~~
At the recent Money 20/20 Europe conference, Diebold demoed their CryptoTouch application from Cryptera, a company that the ATM manufacturer purchased in 2014. The Cryptera app encrypts PIN entries made on a touchscreen interface to deliver more secure consumer interactions on ATMs, point-of-sale devices and unattended payment terminals.
J.P. Morgan Chase has been making upgrades to its 18,000 ATMs to allow users to withdraw money faster by issuing $50 and $100 bills. However, they noticed a surge in people withdrawing tens of thousands of dollars at a time, so they have now instituted a ceiling of $1,000 per day for non-customer ATM withdrawals. The changes do not affect their own customers.
By some estimates, the average loss resulting from each ATM skimming incident is more than $40,000. Some NCR ATM deployers are turning to the company's Skimming Protection Solution which uses multiple jammers that generate multiple random signals, preventing any attempt by a criminal to isolate and record data from the magnetic stripe on the card. The company says that even if a fraudulent device is detected, NCR SPS jamming remains in operation and cardholder data is protected. NCR SPS also defends against attempts to tamper and disable the anti-skimming functionality by using sensors that can detect attempts to drill into the ATM fascia around the card reader area.
~~~
HID Global announced it has entered the market for mobile citizen IDs that can be carried on smartphones. The HID goID platform for mobile IDs enables driver licenses and other government IDs to be carried on smartphones that become all-in-one devices for receiving, presenting and authenticating mobile IDs. The company says that their solution is the first to enable secure over-the-air provisioning of citizen IDs, and is powered by HID Global`s Seos technology.
TeleSign's Behavior ID enables applications to analyze user behavior in the background, examining keystrokes, mouse usage and device handling to capture a "similarity score" to authenticate users. The similarity score is based on a set of behavioral traits that are collected, analyzed and rated along the user journey, from initial account creation through ongoing access and usage of an account. This score is then used to calculate a similarity ratio between the user's current behavior and the historical, expected behavior. The company, which is an established vendor in the mobile identity space, says that their solution helps reduce fraud and account takeover without compromising the user experience.
~~~
Some security experts are convinced that intrusion detection honeypots simplify network security and deliver enormous value for a relatively little effort. They believe that a honeypot is the best low noise/high value way to detect an intruder who has bypassed all other defenses. KFSensor is a commercial Windows Honeypot System that features enhanced intrusion and insider threat detection capabilities. KFSensor is pre-configured to monitor all TCP and UDP ports, along with ICMP. It is also configured with the emulation of common services.
Vera states that their solution secures enterprise data just as effectively with outside collaborators (customers, auditors, lawyers, etc.) as internal employees, without requiring recipients to download or install special programs. The Silicon Valley-based firm says that their platform can:
- Automatically encrypt and track your critical information, everywhere it goes
- Revoke access at the click of a button, whether or not recipients have Vera
Teramind is an internal threats security startup that says that their solution provides its customers with the ability to monitor - in real-time - potential threats coming from within their respective organizations, including visual screen recordings, email capture, file transfer tracking and complete user activity logging. The platform can be configured to notify, block, redirect, log-out or even lockout users depending on the severity of the offense. Teramind`s solution is available as a cloud or on-premise solution.
~~~
Addressing Insider Threats, Cyber Attacks & Data Security
Accellion - http://www.accellion.com
Read Yorgen H. Edholm's comments: https://www.cunews.com/Accellion.pdf |
Allied Solutions - http://www.alliedsolutions.net
Read Ann D. Davidson's comments: https://www.banktt.com/Allied.pdf |
BrightPoint - http://www.brightpointsecurity.com
Read Ajay Nigam's comments: https://www.banktt.com/BrightPoint.pdf |
Cummins Allison - http://www.cumminsallison.com
Read Dean Theodore's comments: https://www.banktt.com/CumminsAllison.pdf |
Easy Solutions - http://www.easysol.net
Read Daniel Ingevaldson's comments: https://www.banktt.com/EasySolutions.pdf |
EnableSoft - http://www.enablesoft.com
Read Richard Milam's comments: https://www.banktt.com/EnableSoft.pdf |
|
Info@Risk - http://www.infoatrisk.com
Read David Trepp's comments: https://www.banktt.com/This email address is being protected from spambots. You need JavaScript enabled to view it. |
InfoSight - http://www.infosightinc.com
Read Brian Smith's comments: https://www.banktt.com/InfoSight.pdf |
Millennial Vision - http://www.mviusa.com
Read Scott Cowan's comments: https://www.banktt.com/MVi.pdf |
Onbase by Hyland Software - http://www.onbase.com
Read Steve Comer's comments: https://www.banktt.com/OnBase.pdf |
Pwnie Express - http://www.pwnieexpress.com
Read Paul Paget's comments: https://www.banktt.com/PwnieExpress.pdf |
Securonix - http://www.securonix.com
Read Chris Inglis' comments: https://www.banktt.com/Securonix.pdf |
SentinelOne - http://www.sentinelone.com
Read Scott Gainey's comments: https://www.banktt.com/SentinelOne.pdf |
StrongAuth, Inc. - http://www.strongauth.com
Read Arshad Noor's comments: https://www.banktt.com/StrongAuth.pdf |
TruShield - http://www.trushieldinc.com
Read Paul Caiazzo's comments: https://www.banktt.com/TruShield.pdf |
Venminder - http://www.venminder.com
Read Aaron Kirkpatrick's comments: https://www.banktt.com/Venminder.pdf |
~~~
The SBDA Group launched SBDA Customer Insight to help FIs deliver personalized communications. The London-based company helps banks launch targeted campaigns using observations from internal data, such as transaction history, and external data, such as social network activity. After a segment is defined, the bank can use a step-by-step campaign widget to tailor and launch their campaign. The goal is to quickly and easily select customers by their real world activities to make the campaigns highly personalized, and then efficiently launch these targeted offers.
~~~
Online Banking/E-Commerce/Website Design
A majority of U.S. credit cardholders — 70% — now have EMV chip cards, says CreditCards.com, a consumer card review site. The firm's survey also found that 15% said they do not have a chip card, and 14% were unsure. Most consumers (59%) had no complaints about their cards. For those that were unhappy, here are the reasons:
= 16% said transactions take too long
- 12% said not enough stores accept the cards
- 6% either didn't know or cited another issue
- 5% didn't think the cards were secure enough
- 1% were unsure how to use the card
In 2015, Western Union transferred $75 billion which represents about 15% of total consumer remittances. The company is expanding its focus from consumers to businesses with their recently launched new service focusing on remittances for small and medium enterprises (SMEs): WU Edge. The service, which provides insights and analytics to help SMEs navigate foreign exchange risks and opportunities, will allow businesses to make payments in more than 130 currencies in over 200 countries and territories.
~~~
The Vivaldi browser runs on Windows, Mac and Linux and provides sophisticated controls for power users. It also allows users to organize tabs, fine-tune the interface, and much more. For example, it lets you clip images and text from webpages to save into discrete notes and save particular arrangement of tabs and pages as their own discrete sessions. Vivaldi is based on Chromium, the open-source part of Google`s Chrome browser, which means that it is compatible with many Chrome extensions.
Veriflow, which was created by a team of computer science professors and Ph.D. students, is software that can help eliminate its customers' change-induced outages and breaches. The company has secured investments from not only traditional venture capitalists, but also government agencies including the National Science Foundation and the Department of Defense. Unlike techniques such as penetration testing and traffic analysis, Veriflow performs mathematical analysis of an entire network's state, and does so proactively.
~~~
Most contact centers use templates (canned responses) when they reply to emails. These help reduce poorly written responses and speed up agent responses. But some contact center experts contend that far too often these responses make agents sound like robots. They recommend that the marketing department get involved in developing and reviewing the responses. That will help ensure that your email templates are in synch with your ads, newsletters, email blasts, web content, mobile app, Facebook posts, etc.
~~~