logo

Your source for the latest technology information of interest to community banks across America.

Subscribe to our monthly newsletter and stay on top of the latest technology trends in Hardware, Software, ATMs, Biometrics, Wireless, Online Banking, Marketing, Security, Internet Access and Call Centers.

August 20, 2018


Hardware News

 

Intel Foreshadow Exploits: How to Protect Yourself from Latest Chip Vulnerability

Intel has revealed a range of its modern processors are affected by new Foreshadow vulnerabilities that could allow sensitive data to be stolen. The vulnerabilities pose a particular risk to data handled by cloud platforms due to the possibility of virtual machines being able to read data from other VMs on the host machine.

techrepublic.jpg

 

10 Tips for Buying Refurbished Technology Devices

According to Back Market, a refurbished electronics supplier, "refurbished products are becoming an increasingly popular alternative to new ones." This article coves 10 practical tips for IT Departments looking to save money on hardware purchases.

techrepublic.jpg

~~~

Hardware Section Sponsored by
Millennial Vision, Inc. (MVi)

Back to Top


Software Updates

 

Windows 10 Updates Are About to Get Smaller and Less Painful

Starting with the "next major version of Windows 10 and Windows Server", Microsoft will change how it handles monthly quality updates, the name given to the bundle of general and security fixes issued for Windows on the second Tuesday of each month, otherwise known as Patch Tuesday. While Microsoft currently issues three versions of these quality updates — known as Full or Latest Cumulative Update (LCU), Delta and Express — in future Microsoft will only issue a single type of quality update.

techrepublic.jpg

 

Evaluating Patch Management Software: 6 Key Considerations

Gartner forecasts that 99 percent of the vulnerabilities exploited by the end of 2020 will be known to security and IT professionals at the time of the incident. Patch management tools can be delivered and configured in various ways. e.g., they can run on premises or in the cloud. They can be appliance-based, stand-alone solutions or part of a larger software product suite. This article makes some recommendations that IT leaders should consider when fine-tuning their patching strategy.

cso.jpg

~~~

Back to Top


ATMs/Kiosks

 

FBI Warns of ‘Unlimited’ ATM Cashout Blitz

Virtually all ATM cashout operations are launched on weekends, often just after FIs begin closing for business on Saturday. The FBI is urging FIs to review how they’re handling security, such as implementing strong password requirements and two-factor authentication using a physical or digital token when possible for local administrators and business critical roles. The agency warns that cyber criminals are planning to conduct a global ATM cash-out scheme in the coming days, likely associated with an unknown card issuer breach and commonly referred to as an ‘unlimited operation’.

krebs.jpg

~~~

ATMs/Kiosks Sponsored by
Heritage Industries


Back to Top


Wireless World

 

Data: Who Wants Contactless Cards?

The U.S. Payments Forum reports that active contactless-enabled payment terminals are approaching 20% of the U.S. market, an increase of more than 100,000 terminals within the last year. Some recent studies indicate U.S. issuers are poised to unleash more contactless-enabled cards. It’s still theoretical, because less than 5% of cards in circulation in the U.S. have contactless technology and no major issuers have disclosed plans for a mass issuance of contactless cards.

paymentssource.jpg

 

How to Improve the Mobile Banking Experience

The author beleives that innovative mobile offerings and delivering a comprehensive range of services and solutions can be differentiators - in short, deploying digital capabilities to solve users’ problems will be the key to building long-term relationships with consumers. He offers four ways FIs can improve mobile banking today in this article.

financialbrand.jpg

~~~

Back to Top


Security Section

 

RunSafe Could Eliminate an Entire Class of Infrastructure Malware Attacks

RunSafe, a Mclean, VA-based startup, got started doing research for DARPA on how to defend critical infrastructure. They built a commercial product based on that initial research that they claim eliminates an entire class of attacks. The way they do this is by hardening the software binary so malware and exploitations can’t find the tools they need to execute across the infrastructure.

techcrunch.jpg

 

Financial Sector Top Phishing Target

Kaspersky is reporting that the second quarter of 2018 flustered users of financial services, with nearly a quarter (21%) of attacks featuring FIs, followed by e-shops (8%) and payment systems (6%).

darkreading.jpg

~~~

Back to Top


Technology and Marketing

 

Millennials Open to Buying Non-Financial Services from FIs

Millennials would buy or consider buying non-financial products (e.g., mobile phone damage protection; roadside assistance; prescription, vision and hearing discounts; personal/family data storage; ID theft protection; travel/trip insurance and child identity theft protection) from community FIs, according to a survey of more than 2,000 consumers by Cornerstone Advisors. Among older millennials (ages 31 to 38), 40% said they would buy a package deal from either a credit union or bank, while 48% said they would consider it and 12% said they wouldn’t, according to the Cornerstone survey.

cornerstone.jpg

~~~

Back to Top


Online Banking/E-Commerce/Website Design

 

Fintechs Take on Borrowers with Poor Credit

For FinTechs, making loans to subprime borrowers can be a lucrative business. The credit cards typically have interest rates of around 20 percent, higher than the average credit card interest rate which the Wall Street Journal, citing the Federal Reserve, said is 14.1 percent.

pymnts.jpg

~~~

Back to Top


Internet Access

 

Cloud Computing Remains Top Emerging Business Risk

Cloud computing ranks as the top risk concern for executives in risk, audit, finance and compliance, according to the latest survey by Gartner. Additional information security risks, such as cybersecurity disclosure and GDPR compliance, ranked among the top five concerns of the executives surveyed.

helpnetsecurity.jpg

 

Ixia Helps Delivers Visibility into All Traffic in Virtual Workloads in Private Clouds

Keysight Technologies announced Cloud Sensor vTap, a new feature of CloudLens from Ixia, a Keysight Business. Cloud Sensor vTap enables organizations to manage their security risk in private and hybrid cloud environments, such as Microsoft Azure Stack, with visibility into East-West traffic without requiring access.

helpnetsecurity.jpg

~~~

Back to Top


Call Centers

 

5 Ways to Provide Employee Recognition

Attracting and retaining engaged contact center employees has always been difficult. A recent Gallup study showed that employees who do not feel adequately recognized are twice as likely to quit within the next 11 months. Gallup asked employees what form of recognition meant the most, and here are their replies: 1) Public recognition via an award, certificate, or some commendation; 2) Private recognition from a boss or peer; 3) Receiving a level of achievement through an evaluation or review; 4) Promotion, or an increase in the scope of work and responsibility; and 5) Monetary award such as a bonus, pay increase, or a trip.

icmi.jpg

~~~

Back to Top

Privacy Policy DBA: TRW ENTERPRISES, LLC