Your source for the latest technology information of interest to credit unions across America.
Subscribe to our weekly e-mail newsletter and/or our monthly newsletter and stay on top of the latest technology trends in Hardware, Software, ATMs, Biometrics, Wireless, Online Banking, Marketing, Security, Internet Access and Call Centers.
Gartner has introduced a term called “Shared Accelerated Storage” (SAS) to describe what’s next for the industry after all-flash arrays. This brings the benefits of network-based systems and direct-attached systems together by leveraging a number of new technologies, most notably Nonvolatile Memory Express— or NVMe. Plus NVMe over Fabric (NVMe-oF) gets rid of the penalty for moving storage outside the server.
An oversupply of memory chips, plus aggressive pricing by SSD suppliers are causing SSD prices to drop, while the capacity of drives continues to increase. All of this comes as a new type of SSD hits the market, the quad-level cell (QLC) NAND flash memory jointly developed by Intel and Micron.
Windows 10 S mode is Microsoft’s new secure platform. Its goal is to provide the familiar Windows 10 interface with a much more restricted software deployment process. Consider Windows 10 S similar to the Apple iPhone and iPad ecosystem: All applications must be deployed through a vetted deployment process. Windows 10 S can also be used to deploy systems in kiosk mode and in limited-use needs.
Low-quality power can cause many different types of damage to an ATM, and it's a problem that is not always easy for a technician to identify in the field based on the symptoms the machine is exhibiting. The author contends that there are several really good power conditioners out there, and it is always a good idea to add one at the time you install your new or refurbished ATM. Plus studies by Powervar and other companies show that proper power conditioning can reduce service calls by as much as 35 percent.
Distributed deception technology does not provide a viable solution for defending ATM machines against attacks executed physically on the machines themselves. But it is arguably the most effective means of stopping the most damaging attacks - the ones executed against the larger ATM network or those enabled by compromise of network-resident systems that support ATMs.
By the end of this year, a quarter of U.S. smartphone users — 55 million people — over the age of 14 will make an in-store mobile payment. More than 40 percent of those people will have done so through Starbucks’s mobile payments app, according to new data from research firm eMarketer. Apple Pay is accepted at more than half of U.S. merchants, according to eMarketer. Google Pay is less popular despite being preinstalled on Android phones. Samsung is the most widely accepted — about 80 percent of merchants have it, eMarketer estimates — but it’s the least popular.
This article covers two dozen tools include everything from password crackers to vulnerability management systems to networks analyzers.
Social network phishing is a form of cybercrime that involves the theft of personal data from a victim’s social network account. The fraudster creates a copy of a social networking website (such as a fake Facebook page), and tries to lure unsuspecting victims to it, forcing them to give up their personal data – such as their name, password, credit card number, PIN code and more – in the process. At the beginning of the year, Facebook was the most popular social networking brand for fraudsters to abuse, and Facebook pages were frequently faked by cybercriminals.
What's the difference between a deception vendor and a honey pot? This article/interview covers this and looks at the benefits and misconceptions of deception technologies.
Today’s financial marketer needs to embrace the dynamics of modern marketing. According to eConsultancy, this includes competencies and capabilities around domains of expertise like data and analytics, consumer experience, content, multichannel delivery and personalization.
EMVCo, the global technical body that manages the EMV Specifications, has created a QR Payment Mark to promote global interoperability across EMV QR Code payments. EMVCo has developed reproduction requirements and a free licensing structure to enable all implementers of EMV QR Code solutions to use the mark. QR Codes are two-dimensional machine-readable barcodes, increasingly used to facilitate mobile payments at the point-of-sale.
The new threat hunting capabilities introduced by Cato are the latest security in its secure SD-WAN service. The Cato Cloud global SD-WAN service already provides security functions, such as next-generation firewall (NGFW), secure web gateways (SWG), and intrusion prevention systems (IPS). Now, with the Cato Threat Hunting System (CTHS), the company gives us algorithms and procedures developed by Cato Research Labs to alert on threats, which it claims is more accurate than other approaches.
The upside can be better performance and resiliency with a down side of dire business impact if the DNS service provider suffers a catastrophic outage.
A Spiceworks survey found that 97% of businesses believe security is the most important factor in choosing a cloud service, and 25% of companies did not believe there was anything they could do to truly secure their cloud data. In this year's survey, 51% of organizations reported using OneDrive, up from 31% in 2016. Dropbox is now tied with Google Drive at 34% each, up only one percentage point compared to 2016, when it led the field. Another 10% of organizations said they would either be switching over to or starting to use OneDrive within the next two years.
Research shows FI contact centers lose an average of 57 cents to fraud for each incoming call—and that one in every 2,900 calls is fraudulent. That’s a big number from a fraud specialist’s point of view but for most contact center agents, that represents maybe one fraud call per month.
Average handling time, like the volume of contacts, must be incorporated into planning by the half hour. Assuming the same average handling time all day for forecasting purposes will not reflect the environment accurately. Some relatively simple analysis can go a long way toward tightening up your projections. This article points out a few important prerequisites for getting this part of your forecast right.