CU news Logo

Your source for the latest technology information of interest to community banks across America. Subscribe to our weekly e-mail newsletter and stay on top of the latest technology trends in Hardware, Software, ATMs, Wireless, Online Banking, Marketing, Security, Internet Access and Call Centers.

November 12, 2018


Hardware News

 

AMD Continues Server Push, Introduces Zen 2 Architecture

AMD revealed the Zen 2 architecture for its family of microprocessors. Sold under the Epyc brand for servers, it’s expected to double the performance of the previous generation. One of the big features of Zen was it offered full in-memory virtual machine encryption, something Intel has yet to offer with its Xeon processors.

networkworld.jpg

 

Why the Encryption on Your SSD in Windows 10 May Be Failing

Researchers have found that both the "ATA security" and "Opal Storage Specification" for self-encrypting drives have material implementation flaws in SSD firmware which are trivial to exploit, in order to gain access to drive contents. BitLocker users are not safe, as the software encryption solution defers to hardware encryption by default when detected. This can be changed in a group policy setting, but requires formatting affected drives.

techrepublic.jpg

 

Intel Responds to the Epyc Server Threat from AMD

Intel has formally announced a new class of Xeon Scalable processors, code-named “Cascade Lake-AP” or Cascade Lake Advanced Performance, that some analysts contend in many ways leapfrogs the best AMD has to offer. The Cascade Lake-AP processors come with up to 48 cores and support for 12 channels of DDR4 memory, a big leap over the old design and a leap over AMD’s Epyc server processors, as well.

networkworld.jpg

~~~

Hardware Section Sponsored by
Millennial Vision, Inc. (MVi)

Back to Top


Software Updates

 

How to Tune Your Virtual Machines Beyond the Usual Methods

One expert states that a way to avoid CPU contention is by using a greater number of smaller virtual machines rather than a small number of large ones. Others suggest ensuring your VMs aren't hitting their memory limit, using agent-less antivirus tools because those are more efficient on a cloud, and deleting unneeded snapshots as they're resource hogs. The article covers many other optimization tips as well.

techrepublic.jpg

~~~

Back to Top


ATMs/Kiosks

 

Aiming to Automate 100 Percent of Teller Transactions

Banco BPI, part of CaixaBank Group, has committed itself to automating 100 percent of teller transactions by next year. All branches will offer self-service ATMs, which will be available 24/7. However, some branches will make a teller available for cash transactions during limited hours, while others will make managers available to assist visitors with specific products.

atmmarketplace.jpg

 

Withdraw Cash Wednesday

The ATMIA, the global trade association for the ATM industry, announced the second annual Withdraw Cash Wednesday event which will take place on Wednesday, Nov. 21 at ATMs nationwide. The Withdraw Cash Wednesday movement encourages consumers to develop the habit of getting cash for weekly spending on Wednesdays to control spending and avoid racking up debt, especially during the holidays.

atmia.jpg

~~~

ATMs/Kiosks Sponsored by
Heritage Industries


Back to Top


Wireless World

 

Financial Marketers Must Convert Mobile Banking Holdouts

Nearly everyone has smartphones, but two-thirds aren't using mobile banking apps. Surprisingly few consumers use tools like mobile deposits, despite their ease and convenience. The author contends that FIs only have themselves to blame, and states that consumers' security concerns and inadequate marketing must both be addressed to reverse this trend.

financialbrand.jpg

~~~

Back to Top


Security Section

 

Why Password Management and Security Strategies Fall Short

Some researchers say organizations need to rethink their password training and take a more holistic approach to security. One recommends a more balanced approach that includes training, email authentication, deploying secure email gateways, and making sure email filters are current. Another recommends the use of password managers such Roboform, Dashlane, etc. which ensure the use of long complex passwords.

darkreading.jpg

 

BehavioSec Announces Authentication Features and Patents Behavioral Biometrics Platform

BehavioSec's Behavioral Biometrics Platform (Version 5.0) can now detect suspicious use of attack obfuscation techniques, including the use of virtual private networks (VPNs) and TOR-routed traffic during login attempts and sessions. The platform also adds Docker container support to simplify on-premise deployments and a real-time feed of more than 1.5 billion compromised devices, pushing anti-fraud defenses further out to identify attackers before they begin compromising accounts.

helpnetsecurity.jpg

 

5 Reasons Why Threat Intelligence Doesn't Work

The author states that threat intelligence solutions must be implemented as per the particular security needs of each organization, suborganizations, or even department — or all that's being achieved is accumulating irrelevant data that gives a false sense of security. He also points out that it's essential to connect threat intelligence and its data feeds to commonly deployed software such as, for example, security information and event management applications.

darkreading.jpg

~~~

Back to Top


Technology and Marketing

 

11 Things to Do Every Month to Boost Your Conversion Rates

Many marketers think once a reasonable conversion rate is achieved, status quo is acceptable. However, this article lists 11 tasks that your marketing team should perform regularly to stay competitive.

contentmarketinginstitute.jpg

~~~

Back to Top


Online Banking/E-Commerce/Website Design

 

A Path to Victory in the Payments Game

The article states that FIs will lose if all they do is open accounts and order debit cards - they must continue to ensure their place as the primary payment vehicle. The article goes on to state that capturing payments at onboarding can cement loyalty, increase incremental spend and add revenue to the bottom line.

cornerstone.jpg

 

Consumer-Centric Bill Pay

The author posits that a consumer-centric UX mindset sets the stage for simplifying banking activities such as voice/AI banking. He provides an example of "Consumer-Centric Bill Pay Flow" that provides API capabilities so that the UX becomes part of the FI’s brand, not the vendor’s brand.

fis.jpg

~~~

Back to Top


Internet Access

 

The Browser Is the New Endpoint

With browsers at the center of so much corporate activity, they are now subject to many of the same challenges that face desktops, smartphones, and other hardware-based endpoints. The first challenge concerns leaking sensitive corporate data. Second, the number of surface attacks grows along with the number of browser extensions installed. IT Departments need to manage not only their browsers but also the extensions as well as the plug-ins and add-ons used by older browsers and keep all of those technologies up to date.

darkreading.jpg

 

Teridion Unwraps Cloud-Based SD-WAN Service

Teridion is taking its cloud-based SD-WAN service into the enterprise sector to deliver MPLS-like performance. The Internet wasn't designed for high performance traffic and flexibility, but rather for resiliency, said a company spokesperson. Teridion sees the public Internet connectivity of SD-WAN as a chokepoint and wants to help solve this issue with a service that provides reliability and performance that is consistent with MPLS, as well as "MPLS-like SLAs."

fiercetelecom.jpg

~~~

Back to Top


Call Centers

 

How to Empower Agents with Flexible Scheduling

According to an article by The Undercover Recruiter, one of the seven most wanted work benefits for millennials (who make up a large portion of the contact center workforce) is flexible working hours. Regardless of the number of agents and the hours of operation, many HR experts say giving your agents a say in their schedules can bring loyalty, along with increased engagement and job satisfaction.

icmi.jpg

~~~

Back to Top

Get Our Free Email Newsletter

First Name(*)
Invalid Input

Last Name(*)
Invalid Input

Position(*)
Invalid Input

E-Mail(*)
Invalid Email Address