Your source for the latest technology information of interest to community banks across America.
Subscribe to our weekly e-mail newsletter and/or our monthly newsletter and stay on top of the latest technology trends in Hardware, Software, ATMs, Biometrics, Wireless, Online Banking, Marketing, Security, Internet Access and Call Centers.
Enterprise SSD products are separating themselves from their consumer counterparts by getting faster, smarter and denser. Among the latest developments are three new products from Samsung, Micron and Kioxia. This article explains all of the new improvments to these vendors' SSD products.
The author argues that printers should be given the same amount of security resources, controls, processes and isolation as need for any other computer in your network. She recommends that you focus on these eight areas to keep you printers from being a point of entry for attackers: 1. Limit access privileges to printers; 2. Disable unused protocols; 3. Review printer firmware level; 4. Beware of automatic reports of printer activity; 5. Know what information your printers process; 6. Properly manage printer log files; 7. Confirm security controls; and 8. Review latest guidance for smart card authentication.
Brute-forced RDP access and malicious macros have for a long time been two of the most popular tactics used by threat actors to gain unauthorized access to Windows systems. In response, Win11 builds now have a DEFAULT account lockout policy to mitigate RDP and other brute force password vectors. Microsoft also confirmed that they will resume the rollout of the default blocking of VBA macros obtained from the Internet.
Many software providers offer BCM solutions that assist organizations in planning for and responding to disasters. The following BCM platforms are reviewed in this article: 1) Agility RecoveryPlanner; 2) Archer Business Resiliency; 3) Castellan Business Continuity Management; 4) CL360 Business Continuity; 5) Fusion Framework System; 6) NAVEX One IRM; 7) ParaSolution Business Continuity Platform; 8) SAI360 Business Continuity Management; 9) LogicManager Business Continuity Management; and 10) Quantivate Business Continuity Management.
In the last 12 months, American consumers have used slightly more cash for transactions than they did at this time last year. This rise in cash usage along with a small increase in purchases and peer-to-peer payments made in-person may imply that some consumers are moving back to the way they did business prior to COVID-19. The rise in cash payments is one key finding from a recent survey the Federal Reserve Banks of San Francisco and Atlanta conducted to better understand U.S. consumers’ payment behavior.
Tritec has introduced two ATM models: the Hyosung MX5300 and NH2700 CE. Tritec aims to boost transaction speeds and profits for both FIs and small businesses with these ATMs, according to the company.
Consumers increasingly expect a stellar mobile banking experience or they will let the world know by down-rating your app on the two key app markets. Monitoring what they are saying and reacting to it have become essentials of competitive survival. This article states that app promotion takes active marketing, and that responding to reviews, both positive and negative, can be helpful. It concludes that there are several key capabilities to consider including: 1. Simplicity and ease of use from day one; 2. Secure login with biometric authentication; 3. Personalized financial tools & product offers; 4. Build in push notifications; and 5. Virtual assistants and chatbots.
TrustedSite has launched Halo Security which is an attack surface management platform that combines external asset risk and vulnerability assessment, and penetration testing services. The firm claims that their agentless and recursive discovery engine discovers the assets you’re not aware of, so you can prioritize your efforts from a single pane of glass.
Microsoft Defender Threat Intelligence brings together all the different data sets you need to check out a domain, host or IP address that you think may be compromised, complete with metrics to help you know what you should worry about, as well as information about attack groups, malware and vulnerabilities. Meanwhile, Defender External Attack Surface Management scans your infrastructure from the Internet the way an attacker would, looking for all the assets that are connected to your organization and checking them for known vulnerabilities and compliance issues.
The author states that a vast majority of FIs understand the foundational need to let data drive decision-making, yet a successful data-driven mindset still eludes many of them. What interferes with FIs leveraging data? She says the constant evolution of consumer data tracking, a massive growth in data volumes, and new concerns over privacy. However she concludes that the biggest barrier to overcome has nothing to do with data or the technology that tracks it, but rather, it is leadership and corporate culture. A main juxtaposition between FIs achieving success versus those lagging is their ability to lead and adapt.
Everyone has their own approach to SEO. Some might say SEO involves meta data. Some might say SEO is very “technical,” and includes things like addressing page speed. Put simply, SEO is the process of building your web presence to connect with consumers. The author states that an SEO effort is truly ‘marketing’ and goes on to layout steps to incorporate SEO into your Marketing Department.
According to this article, an electronic bill presentment and payment (EBPP) platform is no longer a luxury for FIs. EBPP platforms can expedite payments, create revenue opportunities, ensure accurate payment posting and allow for the consolidation of receivables and data. Also some EBPP solutions can be built into integrated platforms that include other treasury services such as lockbox or remote deposit.
Benchmarking Your Digital Banking Strategy
Access Softek - http://www.accesssoftek.com
Read Chris Doner's comments:
Humanizing Digital: Increasing Account Holder Loyalty and Exceeding Goals with Smart, Flexible Solutions
Digital Transformation: A Banking Imperative
Three Present-Day Goals to Revolutionize Your FI’s Marketing
eSignatures Are Now a Top Priority Across the Nation
Fight Fraud by Better Understanding Your Financial Data
It’s Always About the People: 5 Rules for Digital Banking and Beyond
Understandably, security teams wish to check all the relevant boxes when implementing appropriate security policies to ensure comprehensive cloud security coverage. In the process, however, they are playing into the most common grievance business leaders have against security practitioners – security restricts and inhibits innovation. This article explores some cloud data security policy pitfalls security teams should look out for and avoid when defining and implementing cloud data security policies.
An emerging technology called multi-cloud networking software (MCNS) is coming together from a variety of vendors — Cisco, Arista, VMware, and F5 among them — to address many of multi-cloud management challenges. MCNS technology helps enable consistent networking policy, network security, governance, and network visibility across multiple cloud environments via a single point of management. As part of these trends, Cisco recently made a significant addition to its MCNS portfolio with the introduction of Nexus Cloud.
This article discusses some key areas or ways to upgrade your performance management programs. It recommends the following 6 strategies: 1) Build empathy; 2) Redo KPIs; 3) Consider an Agile Approach; 4) Increase communication; 5) Showcase Career Progression; and 6) Use peer reviews.