CU news Logo

Your source for the latest technology information of interest to community banks across America. Subscribe to our weekly e-mail newsletter and stay on top of the latest technology trends in Hardware, Software, ATMs, Wireless, Online Banking, Marketing, Security, Internet Access and Call Centers.

November 26, 2018


Hardware News

 

NEC Display Debuts High-Image Quality Desktop Display

NEC Display's MultiSync EA271U business-class desktop display offers 4K UHD image quality and improved USB-C connectiviity. The 27-inch display, aimed at small and medium-sized organizations, features a three-sided narrow bezel of 1.00-millimeters, which eliminates distractions while providing a large desktop space that helps enhance productivity.

kioskmarketplace.jpg

~~~

Hardware Section Sponsored by
Millennial Vision, Inc. (MVi)

Back to Top


Software Updates

 

Technologies That Will Disrupt Financial Services in the next 5 Years

The author states that the scope and speed of evolution in regulation, consumer behavior and technology – coupled with the emergence of new competitors – mean that the future of banking will not be a continuation of the past. He says that the four most transformational challenges and opportunities for the future of banking through the next 5 years include: 1) Response to consumer needs; 2) Optimization of costs; 3) Creation of new revenue streams; and 4) Development of security and compliance systems.

financialbrand.jpg

~~~

Back to Top


ATMs/Kiosks

 

Annual Fed Report Shows More Transactions Made In-Person with Cash than Debit or Credit

Cash remains the most frequently used payment instrument in the nation, according to a new report out of the Federal Reserve’s Cash Product Office. The 2017 Diary of Consumer Payment Choice found cash payments made up 30 percent of payments last year, more than any other payment instrument. Debit cards were used 27 percent of the time while credit cards made up 21 percent of payments.

federalreserve.jpg

~~~

ATMs/Kiosks Sponsored by
Heritage Industries


Back to Top


Wireless World

 

6 Mobile Security Threats You Should Take Seriously in 2019

Mobile malware infections are incredibly uncommon in the real world — with your odds of being infected significantly less than your odds of being struck by lightning, according to some estimates. Security experts contend that the more realistic mobile security hazards lie in these areas: data leakage, social engineering, Wi-Fi interference, out of date devices; cryptojacking attacks, and physical device breaches.

cso.jpg

~~~

Back to Top


Security Section

 

66% of Vulnerabilities Published Through Q3 2018 Have a Documented Solution

A large number of the vulnerabilities reported in 2018 have either updated versions or patches available. However, 24% of the reported vulnerabilities currently have no known solution which is a reminder that, while patching is very important, it cannot be relied on exclusively as a remedy.

helpnetsecurity.jpg

 

24 Best No Cost Security Tools

Infosec professionals are fortunate to have many good free tools for a range of tasks. This article lists 24 of them that are available for download.

cso.jpg

~~~

Back to Top


Technology and Marketing

 

Why Compliance Is No Excuse for Being Dull on Social Media

The author contends that the best way to engage consumers without face-to-face interaction is through social platforms. He goes on to offer tips on how to plan, build and execute a social media marketing strategy that stays within the boundaries of compliance.

bai.jpg

~~~

Back to Top


Online Banking/E-Commerce/Website Design

 

Biometric Onboarding

New Zealand's ASB is speeding up the customer onboarding process with the introduction of biometric facial recognition technology that allows eligible new customers to open an ASB account from anywhere in New Zealand in approximately 15 minutes, and start transacting the same day. Their biometric ID app developed by VIX Verify enables people to verify their identity by comparing a photo of themselves and a photo of their eligible drivers’ licence or passport.

finextra.jpg

~~~

Back to Top


Internet Access

 

DNS over HTTPS Seeks to Make Internet Use More Private

The IETF has standardized DNS over HTTPS (DOH), which encrypts DNS queries so eavesdroppers can’t tell what sites users connect to. The terms DNS over HTTP (DOH), DNS over HTTPS (DOH), and DNS over TLS (DOT) are often used interchangeably, but it is important to distinguish among HTTP, HTTPS, and TLS underlying this web-based DNS function. While DOH can contribute to Internet privacy, it’s also important to recognize there are other ways to address the problem, and this article covers those as well.

networkworld.jpg

 

The Top 5 Myths About Cloud-Based Security

People who trust the public cloud outnumber those who don't by a ratio of 2-to-1, according to research from Intel. More than 62% of IT professionals now store their data in the public cloud as well. This article looks at the five most common misconceptions about cloud-based security infrastructure, and what your organization should be looking for in a solution.

techrepublic.jpg

~~~

Back to Top


Call Centers

 

Why Consumers Change Suppliers After a Bad Call Center Experience

In 2018, 82% of customers said they would change suppliers following a bad call center experience; but 91% of customers said they would remain loyal to a supplier after a good call, according to CallMiner. Respondents pointed to a few key reasons they switch: A serious problem with service (32%); Unfair treatment (28%); and Lack of timely responses (25%). Respondents said they would stay for a variety of reasons, between the call center staff simply knowing their service history (62%) and interacting with a more caring and polite staff (43%).

techrepublic.jpg

~~~

Back to Top

Get Our Free Email Newsletter

First Name(*)
Invalid Input

Last Name(*)
Invalid Input

Position(*)
Invalid Input

E-Mail(*)
Invalid Email Address