Your source for the latest technology information of interest to community banks across America.
Subscribe to our monthly newsletter and stay on top of the latest technology trends in Hardware, Software, ATMs, Biometrics, Wireless, Online Banking, Marketing, Security, Internet Access and Call Centers.
The self-contained ScanBox by Digital Check device operates independently of any tethered PC, accepting commands from a built-in touchscreen and communicating with other banking systems over a wired, wireless, or a 3G/4G mobile network. The compact check deposit kiosk can be deployed in bank branches, retail locations and corporate environments. It can also be configured to interface with mobile remote deposit capture applications to allow smartphone- or tablet-initiated deposits and real time tracking on mobile devices.
Microsoft, and other tech leaders, have expressed interest in using software-programmable network interface cards, aka SmartNICs. A SmartNIC like the Netronome Agilio intelligent server adapter can help reduce server CPU loads and deliver better throughput to VMs. Vendors like Mirantis, Ericsson, and Juniper Networks are working to advance the OpenStack networking plugin specification in an effort to drive usage of SmartNICs.
~~~
Cloud-managed solution providers say that their Web portals allow IT Departments to find, configure and maintain network devices. This option is gaining in popularity, especially with Wi-Fi implementations; case in point is that cloud-managed Wi-Fi is outpacing on-premises management by a factor of 2-1. Avaya just announced their Cloud Networking Platform that provides full lifecycle management of wired and wireless networking devices. In action, it controls devices without requiring on-premises controllers or overlay management software. Administrators can add, remove or change network services across the network by using a dashboard. The product also includes automated software updates and license management, as well as providing an integrated guest portal and BYOD onboarding capabilities.
MailSniper is a tool that allows IT Departments to search every email in a Microsoft Exchange environment for sensitive info. It can be used to find sensitive data such as passwords, credit card numbers, account numbers, etc., or to discover insider and network architecture information. Penetration testing firm Black Hills Information Security is developing the software which is available on GitHub.
~~~
According to Bankrate, combined surcharges levied by ATM deployers and a consumer`s own FI total $4.57, up 5% from a year ago. They note that this is the 10th consecutive year that out-of-network fees have risen. The average surcharge levied by ATM deployers rose 2 cents to $2.90, while the average out-of-network fee levied by a consumer`s own FI rose to $1.67. Some analysts attribute the raises to: 1) ATM deployers need to raise fees to maintain the revenue of shrinking out-of-network ATM transactions and 2) an industrywide belief that consumers making out-of-network transactions are insensitive to fees.
The ATM Industry Association has published Best Practices for ATM Physical Security Version 3 to update customers on counteracting current security issues. The organization says that their updated Best Practices for ATM Security publication will help ATMIA customers mitigate the risks of theft of the ATM itself, theft of cash within the ATM as well as compromise of data and electronics within an ATM.
~~~
An NTT Data survey of 2,000 consumers and 300 companies globally found that more than half of consumers believe mobile payments are less safe than cash, yet almost 60% of mobile payments executives say mobile payments will build their businesses because the services are safe. The report's authors stated that “fear is a powerful inhibitor, and fraud fear is top of mind for many consumers.” The concluded that organizations must do more to ease consumer security concerns if mobile payment adoption is to become widespread. Nearly 75 percent of consumers say guarantees against monetary fraud would encourage them to use mobile payments, but only 44 percent of businesses currently offer or plan to offer such guarantees.
By some estimates, only four out of 10 banking consumers have ever used mobile remote deposit capture, and only 53 percent of those are highly active users. But according to a report by Futurion, FIs can remedy the situation by rolling out full featured mobile RDC functionality. The report states that FIs with an excellent mobile RDC app have markedly higher consumer adoption rates. They suggest that banks should target:
- accurate deposit error prevention and item processing
- no fees
- carefully constructed deposit limits
- physical check retention
- clearer terminology
~~~
Some security experts contend that the obscurity of IPv6 helps to minimize attacks. IPv6 servers don't benefit from a built-in security feature or an inherent security superiority over IPv4 servers - they are simply harder to find. IPv6's much larger address space (2^128 potential addresses to IPv4's 2^32) makes it harder to scan and find potential IPv6 targets. For example, it is easy to obtain scan lists of IPv4 addresses with IP ranges of several well known hosting providers, but it appears that very few scammers are targeting IPv6 lists at this point.
NetGuardians says that their fraud prevention software uses Big Data to correlate and analyze user behaviors across the entire bank system – not just at the transactional level. FraudGuardian addresses specific fraud challenges (e.g. mobile banking, payment fraud, e-banking, account takeover, identity theft) with bundles containing predefined controls called Smart Control Objectives, while their RiskGuardian compliance automation solution comes with predefined controls packaged in bundles designed specifically for regulations and operational standards.
~~~
Core Systems:
The Foundation of Your Customer’s Experience
|
smartsolution - http://www.smart-solution.com
Read Iean Tait's comments: https://www.banktt.com/smartsolution.pdf |
~~~
Bank marketers are increasingly placing their marketing dollars towards social media campaigns and efforts. Unfortunately, social media can be difficult to manage when it comes to auditing and compliance. Archiving communications is critical and one firm that offers a platform is Smarsh which has been in the archiving business since 2001. The company says that their Archiving Platform allows you to access, review, and produce social media content in accordance with compliance guidance from regulatory agencies. The solution covers the most popular social media channels - Twitter, Facebook, LinkedIn, and Pinterest - as well as dozens of other different content types.
~~~
Online Banking/E-Commerce/Website Design
NCR has launched its cloud-based Developer Portal which enables banks to build their own digital banking applications. The portal provides self-service access to digital banking APIs, the Software Development Kit (SDK) and third party software connections developed by Digital Insight. It also includes an app gallery which presents a variety of developed applications to show the user what is possible, and a customer forum where developers can exchange information, tips and best practices.
While the three-digit CVV (card verification value) is supposed to help prevent fraud, CNP (card-not-present) transactions still make up about 65 percent of all card fraud. Oberthur Technologies' Motion Code CVV is a dynamic CVV that changes every hour in attempt to thwart this fraud. Oberthur claims that the battery for the digital display on the back on the card will last longer than the card`s expiration date. Card issuers can set the CVV refresh time to any time length that they desire. Websites can accept payment via the cards with Motion Code technology with no changes.
~~~
AT&T's Network on Demand service offers SDN (software defined networking) and virtualization technologies that the telecom giant says can offer new networking capabilities and cost savings. They will now partner with IBM who will sell AT&T's new FlexWare for setting up and managing virtual network functions on a single network device, such as a router. Additionally, AT&T will be able to run applications on IBM's infrastructure for cloud, cognitive analytics and security.
Unfortunately, sophisticated DDoS (distributed denial of service) attacks hit organizations of all sizes and even more disturbing is that they increasingly act as “smokescreens” in concert with other malicious activities. This might include ransomware or some other type of malware attack. In fact, research from Neustar shows that the majority of organizations that suffered a DDoS attack (53 percent) also experienced some form of additional compromise. In response, 53 percent of organizations are using traditional firewalls, 47 percent are using a cloud service provider and 36 percent are using an on premise DDoS appliance combined with a DDoS mitigation service (AKA a hybrid solution).
~~~
Some call centers are changing how they handle average handle time (AHT) which is a number that includes talk time, hold time, and after-call work time. They are shifting away from setting time goals at the agent level and moving it to the department level due to fears that agents may rush calls to meet their AHT goals and thus deliver poor service. Another reason is the shift to a sales culture which takes more time to make product and service cross-sell and/or up-sell pitches.
~~~