logo

Your source for the latest technology information of interest to community banks across America.

Subscribe to our monthly newsletter and stay on top of the latest technology trends in Hardware, Software, ATMs, Biometrics, Wireless, Online Banking, Marketing, Security, Internet Access and Call Centers.

July 6, 2020


Hardware News

 

Here’s Why Tape Will Always Surpass Hard Drives and SSDs in Storage

Sony and Fujifilm are locked in a battle for tape supremacy, with the latter revealing it's preparing for tape media with an areal density of 224Gbit per square inch, which translates to a real life capacity of around 400TB. Fujifilm - which has just announced its first Tape-as-a-Service offering - is betting on Strontium Ferrite (SrFe) as opposed to the popular Barium Ferrite, which is used in most LTO tapes, the capacity of which currently top 12TB (uncompressed) or 30TB (compressed using an industry ratio of 2.5:1). Tape capacity has increased exponentially (essentially doubling every generation) while SSD and HDD has tended to grow linearly.

techradar.jpg

~~~

Hardware Section Sponsored by
Millennial Vision, Inc. (MVi)

Back to Top


Software Updates

 

Microsoft’s New Windows File Recovery Tool Lets You Retrieve Deleted Documents

Microsoft is releasing its own Windows File Recovery tool which is designed to retrieve files you’ve mistakenly deleted. Windows File Recovery is a command line app that will recover a variety of files and documents from local hard drives, USB drives, and even SD cards from cameras. Recovery of files on cloud storage or network file shares is not supported, though.

theverge.jpg

 

Kaspersky Announces Integrated Endpoint Security

Kaspersky has unveiled what they are calling a new approach that integrates Kaspersky Endpoint Security for Business with Cloud Management Console, Kaspersky Endpoint Detection and Response Optimum (EDR Optimum) and Kaspersky Sandbox. Kaspersky EDR Optimum adds visibility across threats detected by Kaspersky Endpoint Security for Business and provides the background for malicious activity including enriched alert data and visualization of the attack spread path.

darkreading.jpg

~~~

Back to Top


ATMs/Kiosks

 

Hyosung and Fujitsu Unveil a Biometric ATM

Palm vein biometric authentication technology from Fujitsu has been integrated into Hyosung's ATMs for a contactless and secure way to identify ATM users. Fujitsu claims that palm vein authentication technology is virtually impossible to forge, and its technology has 10 times the data points that finger vein authentication provides.

atmmarketplace.jpg

 

Driver Vulnerabilities Facilitate Attacks on ATMs

Driver vulnerabilities can facilitate attacks on ATMs, point-of-sale systems and other devices, according to firmware security company Eclypsium. Eclypsium last year analyzed device drivers from major vendors and found that over 40 drivers made by 20 companies contained serious vulnerabilities that could be exploited to deploy persistent malware.

securityweek.jpg

~~~

Back to Top


Wireless World

 

7-Eleven Trials Voice Commands for Payments at Pump

7-Eleven is piloting internally developed technology that allows customers to pay for fuel through the 7Rewards in-app loyalty program by using mobile payment options or Siri shortcuts on their Apple iPhone. Once set up, customers won’t have to open their app during future visits to get the fuel rewards or pay. Instead they instruct Siri to select a pump and authorize payment.

finextra.jpg

~~~

Back to Top


Security Section

 

Remote Employees Encounter 59 Risky URLs per Week

NetMotion recently aggregated a sample of anonymized network traffic data, searching specifically for evidence of users attempting to access flagged (or blocked) URLs, otherwise known as risky content. They found that employees, on average, encounter 8.5 risky URLs per day, or 59 per week, and remote workers also access around 31 malware sites per month, and 10 phishing domains. That equates to one malware site every day, and one phishing domain every 3 days.

helpnetsecurity.jpg

 

Botnet Encyclopedia Helps Security Teams Analyze Suspicious Activity

Guardicore's Botnet Encyclopedia is a new, complimentary tool for security teams tracking suspicious activity in data centers. Users can search for information using a free text search and several indicators of compromise (IOCs) including IP addresses, domains, file names, and names of services, and scheduled tasks.

techrepublic.jpg

~~~

Back to Top


Technology and Marketing

 

4 Tips for Revising Your Digital Marketing Strategy During a Crisis

The author states that during these times of uncertainty, it can be difficult for marketers to navigate the digital landscape. He recommends being empathetic toward your audience and that maintaining the integrity of your brand is essential. He goes on to outline four tips to help you find this balance.

forbes.jpg

~~~

Back to Top


Online Banking/E-Commerce/Website Design

 

5 Ways to Maximize the Value of Instant Payments

The author contends that instant payments are the ‘new normal’. She goes on to cover 5 trends: 1. Request to Pay for more control; 2. Amplify the power of QR codes; 3. Leverage valuable real-time data with ISO 20022; 4. Deliver convenience for corporates; and 5. Embrace new channels.

finextra.jpg

 

New ACH Contact-Registry Rule Takes Effect with the Goal of Reducing Fraud and Exceptions

A new rule requiring all FIs in the ACH network to participate in ACH governing body Nacha’s contact registry has gonme into effect. Nacha’s goal is to enable a FI on one end of an ACH transaction to quickly get in touch with the right people at the institution on the other end when proof of authorization is needed or in cases of “ACH-related system outages, erroneous payments, duplicates, reversals, fraudulent payments, etc.”

digitaltransactions.jpg

 

Video KYC

ICICI Bank announced the launch of a facility that empowers retail customers to complete the ‘Know Your Customer’ (KYC) process through video interaction. Consumers can complete the KYC process digitally within a few minutes, without physically meeting at the branch.

finextra.jpg

~~~

Back to Top


Internet Access

 

Palo Alto Networks Rolls ML into Firewall, Containerizes It

Palo Alto Networks launched what it calls the “world’s first” machine-learning powered next generation firewall, plus a containerized version of the firewall, and a new IoT security service. In addition to offering the latest version of the next-generation firewall as a physical device, software, or cloud-based product, Palo Alto Networks also offers a containerized version designed specifically for Kubernetes environments.

sdx.jpg

 

CenturyLink Says Its Fiber Will Enable 5G and Other Next-Gen Technologies

CenturyLink claims to have the world's most highly connected Internet peering backbone, with 450,000 fiber route miles, 170,000 on-net buildings, 2,200 on-net public data centers and more than 100 edge compute nodes. The company says these edge compute nodes enable more than 98% of U.S. enterprises to reach its network with less than 5 milliseconds of latency.

fiercetelecom.jpg

~~~

Back to Top


Call Centers

 

Five Tips to Successfully Integrate Chatbots

If you plan on implementing AI or a chatbot, the author recommends taking these five things into account when building a good chatbot experience: 1)Be realistic about the scope of the bot; 2) Choose the channel that fits your accountholders – and choose the technology that provides the best platform; 3) Planning is the most important part of the process; 4) Train the chatbot well – and then train it again – and again; and 5) train your agents on how it works, what it knows, and how their interactions may change based on the implementation.

icmi.jpg

~~~

Back to Top

Privacy Policy DBA: TRW ENTERPRISES, LLC