Your source for the latest technology information of interest to community banks across America.
Subscribe to our weekly e-mail newsletter and/or our monthly newsletter and stay on top of the latest technology trends in Hardware, Software, ATMs, Biometrics, Wireless, Online Banking, Marketing, Security, Internet Access and Call Centers.
Palo Alto Networks will soon change its licensing for all of its software firewalls and security services to a more consumption-based approach. The new model uses credit-based licensing. It lets customers resize their software firewall as traffic levels change and add or delete security services on demand, as opposed to buying a fixed-size firewall based on projected traffic levels with security services bundled in. Other leading firewall vendors already adopted similar consumption-based licensing approaches. Fortinet, Forcepoint, and Check Point rolled theirs out last year; meanwhile a Cisco spokesperson said that vendor “is working on license flexibility and portability across security products including firewalls.”
USB-Lock-RP allows system administrators to manage USB access from a central administrative console. The program works on-premises and is designed to: 1) Prevent unauthorized use of removable media; 2) Authorize devices (white list); and 3) Monitor and report device activity and security status.
Axio announced the availability of a complimentary Ransomware Preparedness Assessment tool to give organizations detailed visibility into their cyber posture with respect to ransomware. The assessment is based on data from hundreds of real ransomware events, guidance from the U.S. Department of Homeland Security, and Axio’s research.
In 2017, Microsoft added a new feature to its Windows 10 operating system: S mode, a stripped-down, tightly-locked, and low-end PC friendly way to run Windows 10. There are a lot of good reasons to put a Windows 10 PC in S mode, but performance and security improvements always come at a cost. This article looks at some of the pros and cons of S Mode.
The number of assisted self-service banking terminals installed around the world has been increasing significantly over recent years, allowing FIs to migrate transactions away from the teller’s desk and redeploy staff to focus on sales and advisory activities. Findings from RBR’s latest study, Branch Transformation 2021, show that there are 340,000 assisted self-service terminals (ASSTs) deployed worldwide. The report shows that the USA is the world’s second largest ASST market after China. Here, it is typical for people to receive remote video assistance, often from their vehicle in drive-through banking lanes, allowing them to access a wide range of services outside of the core branch opening hours.
Travelers insurance reported that claims for damages due to ATM thefts increased by 220% from 2019 to 2020. They note that claims can be high since ATMs themselves can cost $30,000 to $80,000, and could have $40,000+ in cash inside.
5G networks are slowly but steadily blanketing the world, and though the lightning-fast speeds we’ve been promised are a little tough to find, you can expect to see some changes. The benefits that 5G brings in terms of faster download speeds, faster upload speeds, more bandwidth and lower latency mean that it’s very possible to get online using 5G rather than a conventional broadband link—but there’s a lot you need to know before choosing 5G broadband. This article looks at some 5G usage considerations.
Barclays has begun the roll out of digital receipts from Flux to users of its mobile banking app. Debit cardholders who pay at certain retailers will see their receipts sent automatically to their app after making a purchase. Receipts can be called up and viewed by tapping on the transaction.
Synthetic fraud is appearing more frequently in conversations and on security agendas across the financial services industry. This is not because synthetic fraud is new—this problem has been on the security radar for financial services firms for years—but rather because it is getting more sophisticated every day. The authors highlight three key areas in which synthetic fraud analytics activities are often focused.
KYC monitoring is vital to ensure compliance with Money Laundering directives. This article looks at 7 pain points when it comes to KYC monitoring: 1) Money and time wasted on false positives; 2) Undetected risks due to poor data; 3) Lack of detail of alerts lead to inefficiencies; 4) Poor record keeping; 5) Lack of configurability; 6) Holistic approach to compliance better than a data-driven model; and 7) Amber Management monitoring.
This article analyzes 5 digital marketing trends for 2021: 1) Marketing Automation; 2) SMS Marketing; 3) User-Generated Content; 4) Revamped SEO due to new Google updates; and 5) Social E-Commerce.
Survey findings from Juniper Research have revealed that more than 50% of American households are considering a move away from bricks and mortar-style FIs. Consumers expect digital banks to offer all the tech trimmings such as dependable online access, user-friendly finance apps and lots of useful tools for everyday banking. However, the public also wants traditional ‘best buy’ features including sign-up benefits and good rates according to the study results.
Mastercard is preparing its network to handle the direct processing of cryptocurrency payments later this year. Mastercard has already dipped its toes in the water, teaming up with Wirex and BitPay last year to create crypto cards that allow people to transact using their cryptocurrencies. The card scheme has also joined forces with LVL, an up-and-coming cryptocurrency exchange. In all of these cases, the cryptocurrencies themselves still don’t move through the network, but instead are converted to fiat for onward transmission.
Denial-of-service attacks have been part of the criminal toolbox for twenty years, and they’re only growing more prevalent and stronger. Today it’s becoming more common for these attacks to be conducted by rented botnets. Another trend is the use of multiple attack vectors within an attack, also known as Advanced Persistent Denial-of-Service APDoS. Finally, organizations are no longer merely concerned with DDoS attacks on themselves, but attacks on their numerous business partners, vendors, and suppliers on whom they rely on to keep their operations running.
This article recommends that IT teams look for VPN services with automatic alerts about user behavior, logging, scalability, and central management. Plus they must consider secondary technical parameters, such as connectivity, speed, latency, supported devices, and the number of permitted connections.
The author asks the question: Can we write fresher emails that are less scripted-sounding, more personal, or better aligned with our organization’s brand voice? She says: Yes, and then goes on to list 12 better ways to start an email reply.