Your source for the latest technology information of interest to community banks across America.
Subscribe to our weekly e-mail newsletter and/or our monthly newsletter and stay on top of the latest technology trends in Hardware, Software, ATMs, Biometrics, Wireless, Online Banking, Marketing, Security, Internet Access and Call Centers.
Cisco just unveiled a series of mid-range firewalls alongside a cloud-delivered management dashboard as part of an ongoing effort to capitalize on the pivot to hybrid work models. New capabilities extend to deployments in the data center, edge, and private and public clouds.
Microsoft has a new security processor that’s getting some buzz. Intel’s Trusted Platform Module has been good at improving security by creating a Secure Enclave for things like encryption keys, but it has had a few flaws. Now it has a successor: Microsoft’s Pluton Security Processor. This article dives into 5 features of the processor.
Microsoft recently made a flurry of announcements about new features in Windows 11 and other apps and services, saying the tweaks are designed to better support hybrid work environments. The most noteworthy change will deliver tighter integration between Windows 11 and Windows 365, Microsoft's cloud-based PC virtualization service. Referred to by some as "desktop as a service" (DaaS), Microsoft calls Windows 365 its "Cloud PC" — as in, users get a full Windows experience that can replace the Windows desktop on a PC.
Encryption key managers are different from password managers, because, in some cases, they actually function in the background to interact with various applications and services that depend on those keys. Of course, if you only need the means to securely store those keys so that you can manually retrieve them later, you could opt to make use of a simple password manager. This article reviews 5 tools: 1) HashiCorp Vault; 2) Seahorse; 3) ManageEngine Key Manager Plus; 4) Google Cloud Key Management; and 5) GnuPG.
The aim of Giesecke+Devrient's Green Banknote Initiative is to foster collaboration and ensure that banknotes based on natural fibers make cash a greener payment system. The aim is to work together to create the banknote of the future – one that is sustainable, durable and counterfeit-proof in order to make the cash cycle more sustainable and efficient. G+D’s research has identified that longevity alone does not make a banknote sustainable. They say that only a balanced interplay of security, sustainability and longevity can achieve this.
Rising personnel costs, the pandemic and the changing transaction environment are pushing FIs into considering branch self-service kiosks. Branch self-service kiosks, sometimes known as interactive teller machines (ITMs) or interactive branch kiosks (IBKs), have proliferated in recent years. This article discusses one FI with about $250 million in assets that installed self-service kiosks at its six branches and was able to reduce its teller staff by more than half.
The QR code was actually invented in Japan in 1994 and are everywhere these days — on restaurant menus, food packaging, even TV screens. So, does all this mean FIs should incorporate QR codes more into their digital functionality and user experience? This article dvies into the answer to this question and the various ways that they can be deployed such as in payments, customized marketing, contactless ATMs, and more.
The safety, security and convenience of digital wallets as well as the popularity of smartphones and the general digitalization of society were among the main reasons for the popularity of mobile wallets. As emphasised by a recent Merchant Machine report, the number of digital wallet users swelled by over 50 per cent from 1.4 billion to 2.3 billion between 2019 and 2020. This figure is to expect steady growth this year, increasing slightly to 2.66 billion users.
A Zero Truse (ZT) architecture includes as an integral component a closed loop between ongoing behavior on the network and ongoing permission to use it (as manifest in the trust map that drives the environment’s policy engine). That is, ZT by definition requires that there be feedback, automated and preferably real-time, from observable network behavior to enforced network permissions.
Microsoft announced multiple security enhancements for Windows 11 devices that it said are designed to help organizations protect users and data in hybrid environments. One example is Microsoft's Smart App control feature which is designed to prevent users of Windows 11 devices from running malicious applications by blocking suspicious software by default. The technology combines real-time Microsoft threat intelligence with AI to determine if a new application that is being run on a Windows 11 system is safe or presents a threat that needs to be automatically blocked. The next version of Windows 11 will also have a feature known as Hypervisor-Protected Code Integrity (HVCI) enabled by default. The technology is aimed at ensuring — among other things — that all drivers that the OS loads are trustworthy and free of malicious code.
The author is convicned that when you start producing valuable content on your blog, podcast, or vlog, all the other forms of marketing and growth are immediately easier to execute. He offers 5 examples of good content you can produce now that'll be valuable to your audience: 1) Cover the hot trends in your industry; 2) Recap the latest news; 3) Interview a leader in your space; 4) Create a list of authorities in your market; and 5) Review a new solution or product you've encountered.
Thunes has suggested in its study that organizations must understand the living, shopping, and habits of Zoomers in order to achieve growth and success. This demographic, who never knew life without the Internet and smartphones, currently represents the largest population group on earth. Highlights of Thunes’ Gen Z: The Future of Spending survey, revealed that two thirds of Zoomers have purchased products they first discovered online. This demographic also has little enthusiasm for traditional financial products, with 50% of those surveyed in emerging markets using mobile wallets. Gen Z will be influenced first, not by price or even range or scarcity, but by their social circles, brand engagement online, and trendy, convenient, trustworthy payment options, according to the study.
The vast majority of central banks are considering launching a central bank digital currency (CBDC), according to analysts at accounting firm PwC. “CBDCs will facilitate more effective, lower cost and 24/7/365 cross-border payments for the financial services industry,” analysts from PwC said. Overall, retail CBDC projects, which are digital currencies designed for public use, have reached greater maturity levels than wholesale projects, which are digital currencies used by FIs that have accounts with central banks, the report notes.
Secretary of the Treasury Janet Yellen recently stated "that issuing a CBDC would likely present a major design and engineering challenge that would require years of development, not months." Meanwhile, the Fed's whitepaper acknowledged concerns that non-US CBDCs could threaten the dominance of the US dollar in international trade if a particular CBDC became popular. The central banks of Australia, Malaysia, Singapore, South Africa and the Bank for International Settlements (BIS) have been weighing up cross-border payments from separate CBDC platforms.
Benchmarking Your Digital Banking Strategy
Access Softek - http://www.accesssoftek.com
Read Chris Doner's comments:
Humanizing Digital: Increasing Account Holder Loyalty and Exceeding Goals with Smart, Flexible Solutions
Digital Transformation: A Banking Imperative
Three Present-Day Goals to Revolutionize Your FI’s Marketing
eSignatures Are Now a Top Priority Across the Nation
Fight Fraud by Better Understanding Your Financial Data
It’s Always About the People: 5 Rules for Digital Banking and Beyond
As SD-WAN adoption continues to flourish, the market has begun to stabilize and competitive pressures have begun to force prices lower, according to research from TeleGeography. Median non-recurring charges for SD-WAN implementations—meaning charges for the SD-WAN appliances themselves, not for additional managed services—have decreased by about 15% compounded annually since 2018.
Contact centers are an attractive target for cybercriminals, as they typically handle a huge volume of personal data, such as card numbers, social security numbers, and birthdates. A survey by TRUSTID found that 51% of survey respondents who were engaged in the Financial Services Industry identified contact centers as the main channel for account-take-over attacks. This article goes on to cover some tips to reduce cybercrime in the contact center.