Your source for the latest technology information of interest to community banks across America.
Subscribe to our monthly newsletter and stay on top of the latest technology trends in Hardware, Software, ATMs, Biometrics, Wireless, Online Banking, Marketing, Security, Internet Access and Call Centers.
NEC Display Debuts High-Image Quality Desktop Display
NEC Display's MultiSync EA271U business-class desktop display offers 4K UHD image quality and improved USB-C connectiviity. The 27-inch display, aimed at small and medium-sized organizations, features a three-sided narrow bezel of 1.00-millimeters, which eliminates distractions while providing a large desktop space that helps enhance productivity.
~~~
Technologies That Will Disrupt Financial Services in the next 5 Years
The author states that the scope and speed of evolution in regulation, consumer behavior and technology – coupled with the emergence of new competitors – mean that the future of banking will not be a continuation of the past. He says that the four most transformational challenges and opportunities for the future of banking through the next 5 years include: 1) Response to consumer needs; 2) Optimization of costs; 3) Creation of new revenue streams; and 4) Development of security and compliance systems.
~~~
Annual Fed Report Shows More Transactions Made In-Person with Cash than Debit or Credit
Cash remains the most frequently used payment instrument in the nation, according to a new report out of the Federal Reserve’s Cash Product Office. The 2017 Diary of Consumer Payment Choice found cash payments made up 30 percent of payments last year, more than any other payment instrument. Debit cards were used 27 percent of the time while credit cards made up 21 percent of payments.
~~~
6 Mobile Security Threats You Should Take Seriously in 2019
Mobile malware infections are incredibly uncommon in the real world — with your odds of being infected significantly less than your odds of being struck by lightning, according to some estimates. Security experts contend that the more realistic mobile security hazards lie in these areas: data leakage, social engineering, Wi-Fi interference, out of date devices; cryptojacking attacks, and physical device breaches.
~~~
66% of Vulnerabilities Published Through Q3 2018 Have a Documented Solution
A large number of the vulnerabilities reported in 2018 have either updated versions or patches available. However, 24% of the reported vulnerabilities currently have no known solution which is a reminder that, while patching is very important, it cannot be relied on exclusively as a remedy.
24 Best No Cost Security Tools
Infosec professionals are fortunate to have many good free tools for a range of tasks. This article lists 24 of them that are available for download.
~~~
Why Compliance Is No Excuse for Being Dull on Social Media
The author contends that the best way to engage consumers without face-to-face interaction is through social platforms. He goes on to offer tips on how to plan, build and execute a social media marketing strategy that stays within the boundaries of compliance.
~~~
Online Banking/E-Commerce/Website Design
New Zealand's ASB is speeding up the customer onboarding process with the introduction of biometric facial recognition technology that allows eligible new customers to open an ASB account from anywhere in New Zealand in approximately 15 minutes, and start transacting the same day. Their biometric ID app developed by VIX Verify enables people to verify their identity by comparing a photo of themselves and a photo of their eligible drivers’ licence or passport.
~~~
DNS over HTTPS Seeks to Make Internet Use More Private
The IETF has standardized DNS over HTTPS (DOH), which encrypts DNS queries so eavesdroppers can’t tell what sites users connect to. The terms DNS over HTTP (DOH), DNS over HTTPS (DOH), and DNS over TLS (DOT) are often used interchangeably, but it is important to distinguish among HTTP, HTTPS, and TLS underlying this web-based DNS function. While DOH can contribute to Internet privacy, it’s also important to recognize there are other ways to address the problem, and this article covers those as well.
The Top 5 Myths About Cloud-Based Security
People who trust the public cloud outnumber those who don't by a ratio of 2-to-1, according to research from Intel. More than 62% of IT professionals now store their data in the public cloud as well. This article looks at the five most common misconceptions about cloud-based security infrastructure, and what your organization should be looking for in a solution.
~~~
Why Consumers Change Suppliers After a Bad Call Center Experience
In 2018, 82% of customers said they would change suppliers following a bad call center experience; but 91% of customers said they would remain loyal to a supplier after a good call, according to CallMiner. Respondents pointed to a few key reasons they switch: A serious problem with service (32%); Unfair treatment (28%); and Lack of timely responses (25%). Respondents said they would stay for a variety of reasons, between the call center staff simply knowing their service history (62%) and interacting with a more caring and polite staff (43%).
~~~