logo

Your source for the latest technology information of interest to credit unions across America.

Subscribe to our weekly e-mail newsletter and/or our monthly newsletter and stay on top of the latest technology trends in Hardware, Software, ATMs, Biometrics, Wireless, Online Banking, Marketing, Security, Internet Access and Call Centers.

March 9, 2020


Hardware News

 

Top 8 Things You Need to Know When Selecting Data Center SSDs

SSDs bring speed, durability, and flexibility to enterprise workloads such as AI, machine learning, and edge applications. The article compiles a list of important considerations to help make the choice of data center SSDs a little less daunting: 1. Form Factor; 2. Interface Options; 3. Endurance Considerations; 4. Error Handling, Power Protection, and End-to-End Data Protection; 5. NAND Types; 6. Benchmarking; 7. Power; and 8. Monitoring and Management.

networkworld.jpg

 

CWE List Now Includes Hardware Security Weaknesses

The Mitre Corporation has released version 4.0 of the Common Weakness Enumeration (CWE) list, which has been expanded to include hardware security weaknesses. Until now, the CWE list categorized only software weaknesses but, due to popular demand, has been now expanded to cover security issues that can be encountered in hardware design.

helpnetsecurity.jpg

~~~

Hardware Section Sponsored by
Millennial Vision, Inc. (MVi)

Back to Top


Software Updates

 

10 Best Practices for Using Windows Servers

This article highlights a simple set of management principles that are easy to implement at any budget and skill level to help your IT department take hold of its Windows servers and make sure they are managed efficiently and securely, while being optimized to deliver the best performance possible.

techrepublic.jpg

 

Windows 10: Containers Are the Future, and Here's What You Need to Know

Microsoft offers many different container models on Windows. If you're running Windows 10 you're running several without even realizing it: wrapping and isolating all your UWP apps and using thin virtual machines to deliver security. The author notes that the layered container model is key to the future of Windows -- one that reaches into the upcoming Windows 10X and out into the wider world of public and private clouds, with Docker Windows containers now officially part of Kubernetes.

techrepublic.jpg

~~~

Back to Top


ATMs/Kiosks

 

Deployers Use Different Strategies for Cash Replenishment and Servicing of Branch and Off-Site ATMs

RBR’s Global ATM Market and Forecasts to 2024 report shows that worldwide, cash replenishment and first line maintenance are carried out by third parties for around half of ATMs. Arrangements vary between deployers, but a common pattern is for FIs to replenish and carry out basic maintenance in-house for their branch-based ATMs, while outsourcing these tasks for their off-site terminals. Many FIs take the view that refilling their own branch ATMs is quicker and reduces downtime, while for non-branch locations, safety concerns and timing considerations tend to favor the use of external providers. The study shows that, in contrast to cash and basic maintenance, more complex second line maintenance tasks are outsourced for 92% of all ATMs.

rbr.jpg

~~~

Back to Top


Wireless World

 

Businesses Should Be Texting Customers, but with Security in Mind

A study of texting habits has found that 68% of businesses are now communicating with customers via text—and that number will likely increase. Here are a couple of caveats to business texting that the article mentions: First, texts need to come from a human. Second, don't do it from a cell phone for security reasons. Consumers rate the most effective text communications as reminders, delivery changes, and updates/changes to existing appointments.

techrepublic.jpg

~~~

Back to Top


Security Section

 

Verizon Business Beefs up Security Portfolio to Combat Cybercrime

Verizon Business has added three new features to its security portfolio to help organizations better protect themselves against cyberattacks. They have enhanced their Rapid Response Retainer service, added a new service called Verizon Managed Detection and Response (MDR), and for the Verizon Identity (VID) and Verizon Machine State Integrity solutions, Verizon has tapped into blockchain for the first time in its security portfolio.

fiercetelecom.jpg

 

Most Cyberattacks in 2019 Were Waged Without Malware

If the "malware-free" attack trajectory continues, it could mean major trouble for defenders, according to experts from CrowdStrike and other security companies. A malware-free attack in CrowdStrike's parlance is one where the method to gain entry into a victim organization doesn't employ a malicious file or file fragment to a computer disk. In addition to stolen credentials or legitimate tools, this type of attack also can execute code from memory and can only be detected with higher-level tools and techniques that spot unusual behavior, or via threat hunting.

darkreading.jpg

~~~

Back to Top


Technology and Marketing

 

The Biggest Challenges of Data Analytics

Despite 67% of SMBs spending $10,000 or more annually on analytics software and people, and 75% spending at least 132 hours annually on maintenance tasks related to analytics, 86% of leaders say they could be using them better, according to a study by Onepath. It's not just lack of staff that is causing the issue, though 57% do say they lack the people needed to implement an analytics program. More respondents (62%) said they could do a proper job with the right training. The article goes on to point out other ways that smaller organizations can improve their analytic capabilites.

techrepublic.jpg

~~~

Back to Top


Online Banking/E-Commerce/Website Design

 

ING Economist: The US Has Most to Lose in War of Digital Currencies

The US dollar's position as the unrivalled global currency means it has the most at stake should central banks begin to issue their own digital currencies, according to ING economist Carlos Cocuzzo. While the central banks of many countries have made public their positive intent to issue digital currencies of their own, Cocuzzo argues their plans do not go much further than that. "The attitude towards centrally-backed digital currencies (CBDCs) seems to be, 'Well we're not planning to launch a CBDC, but we will keep an eye on it'.

finextra.jpg

 

Juniper Research Sees Digital Banking Poised for Growth

Digital banking is expected to see a surge in the next few years. Juniper Research is forecasting a 54% increase between now and 2024, as millennials and other younger consumers abandon traditional banking. The growth will be driven by the increasing appeal of digital-only banks as well as efforts by traditional FIs to move their accountholders onto digital banking apps.

mobilepaymentstoday.jpg

~~~

Back to Top


Internet Access

 

Organizations Being Won over by Speed, Effectiveness of Network Automation

Network automation is designed to streamline the maintenance of physical and virtual network devices. Organizations are looking to reduce their dependency on manual methods, and automation can simplify repetitive IT processes, improve consistency across branches and geographies, lower operational costs, and reduce human errors. Major players in the market include traditional network vendors such as Cisco Systems and VMware; IT management players including SolarWinds, Forward Networks and Micro Focus; and automation specialists and startups such as AppViewX and NetBrain Technologies.

networkworld.jpg

 

Number of Spoof Attempts on Domains Drops to "Near Zero" Within Months of DMARC Enforcement

In a new study on DMARC usage and success, email cybersecurity company Vailmail found that spoof attempts drop to nearly zero "within a few months after that domain moves to DMARC enforcement." There has been a steady increase in organizations using Domain-based Message Authentication, Reporting, and Conformance (DMARC) as a security measure against domain spoofing but enforcement continues to be the main struggle for most enterprises. The report found that, "of the 933,000 organizational domains with DMARC, just 13% are at enforcement."

techrepublic.jpg

~~~

Back to Top


Call Centers

 

20 Productivity Hacks for Contact Center Leaders

This article offers 20 suggested productivity hacks to give contact center leaders time back in their days. They are broken down into three broad categories: 1) Tech Productivity Hacks; 2) Process Productivity Hacks; and 3) Personal Effectiveness Productivity Hacks.

icmi.jpg

~~~

Back to Top

Privacy Policy DBA: TRW ENTERPRISES, LLC/CU TECH-TALK