logo

Your source for the latest technology information of interest to community banks across America.

Subscribe to our monthly newsletter and stay on top of the latest technology trends in Hardware, Software, ATMs, Biometrics, Wireless, Online Banking, Marketing, Security, Internet Access and Call Centers.

February 15, 2016

 


Hardware News

As SSDs (solid state drives) deliver higher performance and continue to increase in capacity, their prices are simultaneously decreasing. A thin SSD layer can boost performance when placed alongside traditional hard disks (HDDs). For example, storage vendor HPE indicates that the addition of flash as a read cache can reduce latency up to 70 percent, and employing the flash as a performance tier boosts performance up to 90 percent. Their systems also support Archive Tiering which moves rarely used data from the performance HDD tier (traditional 10K and 15K HDDs) to the nearline tier, thus maximizing storage capacity.

Cisco introduced the Catalyst 3650 “Mini” for small offices and branches. It is a 1RU Gigabit Ethernet switch with 24 or 48 fixed PoE+ ports, and four SFP and/or SFP+ uplinks. It supports Cisco`s StackWise technology for linking multiple switches into a single logical switch; and Converged Access for allowing one management policy to be used for both wired and wireless traffic. 

~~~

Hardware Section Sponsored by
Millennial Vision, Inc. (MVi)

Back to Top


Software Updates

NetworkMiner can be used as a passive network sniffer/packet capturing tool in order to detect operating systems, sessions, hostnames, open ports, etc. without putting any traffic on the network. The company has just come out with the 2.0 version of their product that collects data (such as forensic evidence) about hosts on the network. The new version 2.0 of NetworkMiner has a built-in filtering capability for the data displayed in the following tabs:

- Files

- Parameters

- DNS

- Messages

- Sessions

The Veeam Availability Suite is a backup, recovery and replication solution for VMware vSphere and Microsoft Hyper-V environments. Veeam Availability Suite combines the backup, restore and replication capabilities of Veeam Backup & Replication with the monitoring, reporting and capacity planning functionality of Veeam ONE. The company guarantees recovery time and recovery point objectives (RTPO) of less than 15 minutes for all applications and data. Admins can restore entire VMs in minutes with Instant VM Recovery or recover individual files with Instant File-level Recovery.

~~~

Back to Top


ATMs/Kiosks

Fiserv's Popmoney peer-to-peer money-transfer service will soon enable recipients to go directly to an ATM to retrieve funds. Popmoney Send Cash will use tokens and a software update to ATMs that use Fiserv`s Accel debit network. The recipient receives a text or email notification of the transfer, along with an 11-digit passcode that they will need to retrieve the money at the ATM. Upon arrival at a Popmoney-enabled ATM, the recipient enters the passcode after pressing the Popmoney button on the ATM display.

Security vendor Kaspersky says that a modular malware program known as Metel or Corkow has infected computer systems belonging to Russian banks and has been used to reverse ATM transactions. The gang uses spear phishing emails with malicious links to the employees of banks to gain access to the systems that control transactions. They then automate the rollback of ATM transactions for particular debit cards issued by the institution that are under their control. The transactions are automatically reversed so the account balances never change.

Ally Bank has rolled out an Android Wear app, called the Android Wear ATM Locator, which provides ATM addresses, distances, and directions to Android smartwatch users. They also released a similar app last fall for users of the Apple Watch.

~~~

ATMs/Kiosks Sponsored by
Heritage Industries

 


Back to Top


Wireless World

Fing is a powerful wireless network scanner that runs on Android. Fing will do the following and more:

- Discover all devices connected to a Wi-Fi network

- Display the MAC Address and manufacturer of the devices found

- Allow you to enter your own names, icons, notes, and location

- Do a full search by IP, MAC, Name, Vendor, and Notes

- Show you a history of all discovered networks (this requires a Fingbox account)

- Do a service scan to find hundreds of open ports

- Run Ping and traceroute

- Do automatic DNS lookup and reverse lookup

Rogue app stores offer "free” versions of many of the most popular apps in the Apple and Google Play stores, but many times they contain malware. The apps can pilfer mobile banking credentials, install adware and other malicious apps, and even use the digital certificates of approved app stores to trick mobile devices into thinking they are legitimate. Unfortunately, mobile apps can proliferate from official stores throughout the app store ecosystem, spreading to new "stores" and web download locations without the owner's consent. Scanning services are available that monitor the public app stores and the web at large for pirated versions of apps. For example, RiskIQ Mobile Threats provides discovery across iTunes, Google Play and 150+ unofficial app stores, including focused coverage of high-risk stores and regions for brand impersonation, malware, and fraud.

~~~

Back to Top


Security Section

Cyber-criminals package their pilfered data in many formats. Here is a partial list of what is available:

- Credit/debit card data

- Stealth bank transfer services

- Bank account login credentials

- Enterprise network login credentials

- Online payment service login credentials

According to Intel Security, the most in-demand type of data is credit/debit cards, the price goes up when more bits of sub-data come with the card data, such as the victim`s birthdate, SSN and FI account ID number. Accounts that are “fullzinfo” which include username and password can go for around $30 each.

Eliminating high-denomination currency notes ($100 bill, the 500 euro note, the 50 pound bill, and the 1,000 Swiss franc bill) would help deter tax evasion, financial crime, and corruption, according to Peter Sands, a senior fellow at the Harvard Kennedy School. "This is a bold, relatively simple-to-implement action that could have significant impact and has limited downside. High-denomination notes are arguably an anachronism in a modern economy given the availability and effectiveness of electronic payment alternatives. They play little role in the functioning of the legitimate economy, yet a crucial role in the underground economy," says Sands.

~~~

Security Section Sponsored by
StrongAuth, Inc.

 

StrongAuth

 

Back to Top


Leaders Roundtable

Security:

Addressing Insider Threats, Cyber Attacks & Data Security

 

Accellion - http://www.accellion.com
Read Yorgen H. Edholm's comments:
https://www.cunews.com/Accellion.pdf

 

Allied Solutions - http://www.alliedsolutions.net
Read Ann D. Davidson's comments:
https://www.banktt.com/Allied.pdf

 

 

Cummins Allison - http://www.cumminsallison.com
Read Dean Theodore's comments:
https://www.banktt.com/CumminsAllison.pdf

 

 

Easy Solutions - http://www.easysol.net
Read Daniel Ingevaldson's comments:
https://www.banktt.com/EasySolutions.pdf

 

EnableSoft - http://www.enablesoft.com
Read Richard Milam's comments:
https://www.banktt.com/EnableSoft.pdf

 

 
IMM - http://www.immonline.com  
Read John A. Levy's comments:

 

Info@Risk - http://www.infoatrisk.com
Read David Trepp's comments:
https://www.banktt.com/This email address is being protected from spambots. You need JavaScript enabled to view it.

 

InfoSight - http://www.infosightinc.com
Read Brian Smith's comments:
https://www.banktt.com/InfoSight.pdf

 

KnowBe4 - http://www.knowbe4.com
Read Stu Sjouwerman's comments:
https://www.banktt.com/KnowBe4.pdf

 

Millennial Vision - http://www.mviusa.com
Read Scott Cowan's comments:
https://www.banktt.com/MVi.pdf

 

MVi
Nintex - http://www.nintex.com
Read Mike Fitzmaurice's comments:
https://www.banktt.com/Nintex.pdf

 

Onbase by Hyland Software - http://www.onbase.com
Read Steve Comer's comments:
https://www.banktt.com/OnBase.pdf

 

Pwnie Express - http://www.pwnieexpress.com
Read Paul Paget's comments:
https://www.banktt.com/PwnieExpress.pdf

 

Securonix - http://www.securonix.com
Read Chris Inglis' comments:
https://www.banktt.com/Securonix.pdf

 

SentinelOne - http://www.sentinelone.com
Read Scott Gainey's comments:
https://www.banktt.com/SentinelOne.pdf

 

StrongAuth, Inc. - http://www.strongauth.com
Read Arshad Noor's comments:
https://www.banktt.com/StrongAuth.pdf

 

Venminder - http://www.venminder.com
Read Aaron Kirkpatrick's comments:
https://www.banktt.com/Venminder.pdf

~~~

Back to Top


Technology and Marketing

When it comes to social media marketing, most FIs stick to Facebook and Twitter and perhaps YouTube or Google+. But some observers contend that Snapchat has grown into a communications medium that organizations cannot afford to ignore. Case in point: AmroABN Amro uses the popular file-sharing app Snapchat as a channel for communications with its customers. Snapchat users can ask their representatives questions via the app and share financial tips on better budgeting.

~~~

Back to Top


Online Banking/E-Commerce/Website Design

A new service launched by Visa allows consumers to determine how, where, and when their credit and debit accounts can be used. The service dubbed Visa Consumer Transaction Controls offers spending controls that can be applied to different transaction types, date ranges, or overall card spending. Consumers also can temporarily suspend their accounts in cases where they lose a card or have it stolen. Issuers choose which features to provide their cardholders. The system supports a smartphone app, mobile wallet, or website. Alerts can be sent by text, within an app, or by email. According to Visa, cardholders who receive transaction alerts experience 40% less fraud than cardholders who do not.

According to Javelin's "Rethinking the Role of Bill Payment in Digital Banking" report, FIs are the first place that most consumers turn to handle their bill paying chores, instead of going directly to the biller. Bill paying totals over $3.5 trillion for seven key bills, including $442 billion made on smartphones and tablets. The research firm concludes that a strong bill pay program and sophisticated digital banking services in general compel consumers of all ages to consolidate their financial activity and purchases with an FI.

~~~

Online Banking Sponsored by
IMM

 

IMM

Back to Top


Internet Access

By some estimates, encryption today accounts for roughly one-third of all Internet traffic and is growing every day. Unfortunately, encryption allows cyber-criminals to conceal their exploits from security devices like firewalls, intrusion prevention systems and data loss prevention platforms. In response, organizations must decrypt and inspect inbound and outbound traffic with a dedicated SSL inspection platform that enables third party security devices to eliminate this blind spot. A10 is one vendor that is addressing this issue with their SSL Insight solution which is an essential feature in the A10 Thunder Application Delivery Controller (ADC). Thunder ADC decrypts SSL-encrypted traffic and forwards it to third-party security devices for inspection. Once the traffic has been analyzed and scrubbed, Thunder ADC encrypts it and forwards it to the intended destination. SSL Insight, also known as SSL forward proxy, is a technology consisting of two SSL termination devices that have separate secured sessions between server and client.

Logitech says that their recently announced video conferencing suite, the Group, is an affordable alternative to expensive conference equipment. The new speakerphone isolates the microphone and speakers for better audio quality and the microphone handles a distance of 20 feet, but it may support larger conferences of up to 28 feet with added expansion microphones. The Group`s camera offers 1080p video quality, a field of view of 90 degrees, H.264 scalable video coding and 10x lossless zoom. The Group offers support for a number of applications such as Microsoft Lync 2013, Skype for Business, Cisco Jabber and WebEx. On the hardware side, the Group can be connected on any device with a USB port.

~~~

Back to Top


Call Centers

Training is absolutely critical for new contact center hires, but some new trainers and subject matter experts make the mistake of trying to tell everything they know about a subject. Training and coaching experts say that the focus of the training must be on need-to-know information. Many new hires cannot take in an overload of information and need solid information on what they need to know to effectively do their jobs right now. Training experts recommend that the nice-to-know information (such as keyboard shortcuts, different places the same information can be accessed, etc.) should be made available electronically for the new hire to reference when they are ready to absorb it.

~~~

Privacy Policy DBA: TRW ENTERPRISES, LLC