CU news Logo

Your source for the latest technology information of interest to community banks across America. Subscribe to our weekly e-mail newsletter and stay on top of the latest technology trends in Hardware, Software, ATMs, Wireless, Online Banking, Marketing, Security, Internet Access and Call Centers.

October 8, 2018


Hardware News

 

Microsoft's Surface All Access a Bet That Hardware as a Service Can Work

Surface All Access replaced a program called Surface Plus, which was a financing effort that ended Aug. 31, to move more Surface devices. Microsoft's Surface All Access appears to be a bet that Office 365 bundled with hardware will be appealing along with Windows 10. The program is offered through Dell Financing.

techrepublic.jpg

 

Zyxel Launches ZyWALL ATP Firewalls with Deep Learning

Zyxel Communications announced a new range of ZyWALL Advanced Threat Protection (ATP) Firewalls that bring artificial intelligence and deep learning network security to small- and medium-sized organizations. ZyWALL ATP products are network security gateway solutions that combine signature-based malware detection with the ability to detect malware all on their own.

helpnetsecurity.jpg

~~~

Hardware Section Sponsored by
Millennial Vision, Inc. (MVi)

Back to Top


Software Updates

 

Why Windows 10 Is the Most Secure Windows Ever

With Device Guard, Credential Guard, and Application Guard, Windows uses virtualization to provide new levels of protection from malware and advanced persistent threats. Device Guard and Credential Guard remain the two standout security features of Windows 10 - they protect the core kernel from malware and prevent attackers from remotely taking control of the machine. Microsoft has also grouped other virtualization-based protections such as Windows Defender Application Guard under the Windows Security umbrella.

computerworld.jpg

 

EverCompliant Releases KYC Gap Discovery Tool

EverCompliant announced the launch of eKYC Discovery, a tool that addresses potential gaps in the Bank Secrecy Act and Anti-Money Laundering-mandated Know Your Customer (KYC) processes. EverCompliant's eKYC Discovery solution analyzes the Internet for hard-to-find, potentially hidden connections to sanctioned countries, illegal businesses, and risky business associations.

finextra.jpg

~~~

Back to Top


ATMs/Kiosks

 

Venmo Outpacing ATM Cash as Payment Method

Rubiix, a social spending platform that distributes ad revenues back to users who provide their data, has released a report showing that Venmo is now beating cash from ATMs as a preferred transaction mechanism for millennials. The report noted that "the average Venmo payment was almost exactly on par with the average ATM withdrawal."

atmmarketplace.jpg

 

Visa Will Lift DCC Restriction at ATMs

Visa will allow dynamic currency conversion for consumers using international ATMs beginning April 13, 2019, says Euronet Worldwide. The rule change enables acquirers and ATM operators to offer the conversion service, which can convert the ATM’s native currency into the cardholder’s currency, on “all international ATM transactions on Visa-branded cards around the world.” In February, the National ATM Council, a trade organization for U.S. ATM operators, submitted a petition to Visa that sought elimination of the prohibition on dynamic currency conversion at ATMs.

digitaltransactions.jpg

~~~

ATMs/Kiosks Sponsored by
Heritage Industries


Back to Top


Wireless World

 

Microsoft’s Fixed Wireless Airband Program Gains Momentum with New Operator, Vendor Partners

Microsoft’s Airband effort appears to be gaining steam through the company’s steady announcements of additional carrier and vendor participants. The effort is noteworthy in that it is a nonprofit attempt by Microsoft to, in part, leverage TV White Spaces spectrum to build out fixed wireless Internet services in rural areas of the United States, thus crossing the so-called digital divide.

fiercewireless.jpg

~~~

Back to Top


Security Section

 

The Top 10 Cyberthreats IT Security Teams Are Facing Right Now

The most successful attack types reported were viruses, worms, or other malware infections (49%), phishing attacks (44%), and accidental information loss by employees or contractors (34%), according to a report from Cyren and Osterman Research. Here are the respondents' top 10 concerns: 1) Ransomware attacks (67%); 2) A breach of sensitive or confidential data (66%); 3) Phishing attacks (62%); 4) Malware infiltration through HTTPS/SSL web traffic (54%); 5) Targeted attacks/zero-day exploits (54%); 6) Shadow IT/employees using unauthorized cloud apps and services (48%); 7) Endpoints compromised by botnets (46%); 8) Cryptocurrency mining malware being installed on internal PCs or servers (45%); 9) Use of CPU by cryptocurrency miners when users visit websites (38%); and 10) Employees surfing websites that violate company policies (36%).

techrepublic.jpg

 

Splunk Security Updates Solutions

Splunk announced new innovations across its security portfolio that will help teams to detect, investigate and act on cyber threats to protect their organizations. Powered by new features such as security automation, orchestration and response (SOAR), the Use Case Library and Event Sequencing, Splunk Security solutions can help organizations take a more holistic approach to security.

helpnetsecurity.jpg

~~~

Back to Top


Technology and Marketing

 

Three Ways FIs Can Trigger Loan Marketing Success

The author recommends a holistic loan marketing strategy that actively reacts to individuals shopping for loans and proactively creates interest among those who are not. She calls for a three-part, holistic loan marketing success strategy: 1) Set up an alerts program where multiple credit bureaus alert you whenever credit inquiries are submitted; 2) Adopt a turnkey program that sends multiple loan offers for home equity, auto, credit card, personal and other loans through multiple channels; and 3) Create seamless, convenient experiences.

bai.jpg

 

Report: Majority of Global Consumers Are 'Belief-Driven' Buyers

Two in three global consumers (64%) are now “belief-driven” buyers, per a new Edelman report -- up from 50% last year. Such buyers now represent a majority across age groups and incomes and in all eight markets studied this year. Consumers are now just as likely to express purchase intent based on a brand’s values as they are based on the features of a product.

mediapost.jpg

 

CRM Dynamics 365 Updates Support Business Transformation

Dynamics 365, Microsoft’s cloud-based CRM and ERP product line, is set to roll out hundreds of new features as part of its fall release that will help IT meet business needs by providing deeper data integration across Microsoft products, more intelligence, and new mixed reality experiences for field workers, according to the software giant.

itprotoday.jpg

~~~

Back to Top


Online Banking/E-Commerce/Website Design

 

How Smart Banking Has to Be, When the Technology Is Driving the World Smarter

The author contends that smart branches, smart kiosks, smart 'staff', smart interactive front end are going to be the face of a 'Smart Bank' soon.

finextra.jpg

~~~

Back to Top


Internet Access

 

Cloud Technologies and APIs Are the Building Blocks of the FI of the Future

The author believes that now is the time for cloud-based services and an API-enabled composable architecture which offers a quick and cost effective route to building a versatile core solution. Rather than having to buy, build and maintain a collection of poorly-connected systems, an API-enabled composable architecture lets FIs leverage solutions built on a flexible cloud infrastructure, completely managed and provided as a service by a trusted provider.

tearsheet.jpg

 

CloudKnox Launches Cloud Security Platform to Control Overprivileged Identities

CloudKnox Cloud Security Platform is purpose-built to detect, remediate and prevent risks across hybrid-cloud infrastructure. The company says that thier platform provides organizations with a way to reduce the risks against compromised credentials, accidents and insider threats by utilizing Activity-Based Access Controls.

helpnetsecurity.jpg

~~~

Back to Top


Call Centers

 

The True Cost of Contact Center Agent Attrition

The author states that contact centers consistently undervalue the true financial toll that attrition takes, starting from the point that an agent leaves the organization to the point that the resulting empty seat is filled and fully productive. If these organizations knew how much money they were losing right out from under their noses, there is no doubt they would try much harder to fix the problem.

icmi.jpg

~~~

Back to Top

Get Our Free Email Newsletter

First Name(*)
Invalid Input

Last Name(*)
Invalid Input

Position(*)
Invalid Input

E-Mail(*)
Invalid Email Address