Your source for the latest technology information of interest to community banks across America.
Subscribe to our monthly newsletter and stay on top of the latest technology trends in Hardware, Software, ATMs, Biometrics, Wireless, Online Banking, Marketing, Security, Internet Access and Call Centers.
OneSpan DIGIPASS CX Helps Defend Against Social Engineering Fraud
OneSpan announced its latest high-assurance identity verification and authentication devices. Using DIGIPASS CX, customers will be able to log in or authorize transactions and agreements anytime, anywhere – on a desktop, laptop or smartphone. The platform also supports biometrics, as well as video-assisted transactions and agreements using OneSpan’s Virtual Room.
~~~
The Microsoft-Cisco Teams Collaboration Could Create an Interoperability Revolution
Cisco recently announced its hardware would support Microsoft Teams in the future. With firms like Sennheiser, HP, and now Cisco signing on to work on Teams, the author thinks that Teams may be a truly sustainable videoconferencing platform. He predicts that this will help drive Cisco toward a future where Webex and Teams could interoperate, plus it might mean the end of products like Zoom.
BitSight announced that it has enhanced its Third-Party Risk Management (TPRM) platform to provide additional insights to customers, helping them to more proactively detect and mitigate vulnerabilities and exposure across their third-party vendor ecosystem. BitSight also expanded its Fourth-Party Risk Management solution to increase visibility into risk across an organization's extended supply chain and to help manage and prioritize mitigation efforts more efficiently.
~~~
What Does the Future Hold for ATMs, Branches Post COVID?
While the pandemic pushed adoption of digital channels, cash usage has remained strong. One trend that the article notes is that some ATM deployers are allowing users to withdraw larger amounts of cash in larger denominations. Two other trends are cash recycling and predictive technology via sensors and microprocessors to help automate ATM management processes and reduce operational costs.
~~~
Why QR Codes Are the Next Cybersecurity Battlefield
Invented in 1994 in the manufacturing industry, the QR code sank into obscurity for years, only to make somewhat of a comeback during the pandemic. Gartner sees the trend continuing: By 2024, 80 percent of order, checkout and payment services will be contactless. However, because a QR code obscures the underlying URL, users can’t tell whether the code will take them to the correct destination. This article goes on to cover the two types of QR codes and the security implications behind them.
~~~
How Remote Working Impacts Security Incident Reporting
A dispersed workforce poses some challenges for IT teams, not least of which is how remote work affects security incident reporting. Along with introducing and maintaining such protocols as remote-appropriate identity access and authorization practices, security teams must also review and adjust their reporting policies to reflect the nature of remote work or expose their organizations to significant security threats. One issue is that a remote workforce can create an overload of security incidents simply due to the diversity of networks created by a multitude of user home or remote setups, as opposed to an office environment whereby everyone is on the same network. This article covers some effective remote security incident reporting policies and techniques.
FIs Embrace Biometric Payment Cards
Last month, biometric payment cards that incorporate fingerprint scanners received a significant boost thanks to the publication of new specifications by EMVCo, the global card standards-setting body owned by Mastercard, Visa, American Express, Discover, JCB and UnionPay. Among other things, the new EMV Contactless Kernel Specification is intended to accelerate the evolution of biometric authentication for contactless card payments, setting the stage for widespread adoption of the technology. While there have been trials and small runs of these biometric payment cards since 2017, this article highlights biometric card deployments are rapidly picking up steam around the world.
~~~
6 Reasons Why Blogging Is Still Important for Marketing
Is blogging still relevant? The authors points out that the numbers certainly say so. She cites these 6 reasons: 1. Blogging Builds Loyalty And Trust; 2. Blogging Increases Visibility; 3. Blogging Creates Brand Awareness; 4. Blogging Generates New Leads; 5. Blogging Drives Engagement; and 6. Blogging Allows You To Understand Consumer’s Needs.
Flexible Designs, Floorplans & Branding Help Future-Proof Branches
Consumer behaviors are changing so quickly that in the time it takes to plan, fund and complete a branch redesign, new trends may make the changes obsolete. To stay on pace, this article suggests that FIs can benefit from flexible branch designs that enable them to adjust layouts as needs change. Open floorplans with flexible spaces can enable FIs to respond more quickly and frequently. Light refreshes and reinventions with a flexible floor place can help branches quickly evolve with little cost or interruption. Open floor plans also allow FIs to use more “plug-and-play” fixtures and furniture that isn’t as costly as in-place construction. Another big trend is to revamp branches to better support the advisory experience.
~~~
Online Banking/E-Commerce/Website Design
Household Debt Soars at Fastest Pace in 15 Years as Credit Card Use Surges
Households increased debt at the fastest pace in 15 years due to hefty increases in credit card usage and mortgage balances. The credit card balance collectively rose more than 15% from the same period in 2021, the largest annual jump in more than 20 years, according to the New York Fed. The increase stems from “a combination of robust consumer demand and higher prices,” a Fed official said.
The Acceleration of Faster ACH Payments Continues with Late Night ACH
Following the increase of the Same Day ACH dollar limit to $1 million in March 2022, Nacha and the ACH Operators - the Federal Reserve and The Clearing House - have completed the latest phase in the acceleration of ACH payments with the implementation of “Late Night ACH.” Implemented in mid-September 2022, the Federal Reserve and The Clearing House now deliver late night ACH files to all receiving FIs in the ACH Network by 11:30 p.m. Eastern Time on business days, accelerating the delivery of ACH payments that otherwise would be received on the next business morning.
~~~
OVHCloud: Anti-DDoS Protection Review
Typically, avoiding DDoS attacks requires a fairly sophisticated network and application design. And the most straightforward mitigation — having enough spare network and processing power to weather a DDoS attack — is also the most expensive. OVHcloud, a hosting and cloud provider, claims to offer a much simpler solution with its cloud-based DDoS protection, which is included at no charge with the company’s hosting packages. The OVHcloud solution is based on what the company terms a “VAC,” a set of physical and virtual routers and servers that the company purports can “vacuum” malicious traffic by redirecting it away from an organization’s application and web servers.
What's Coming for Cloud Computing in 2023
From the author's perspective, he does not think that next year will bring tactical shifts in cloud technology, such as more artificial intelligence in the cloud or a focus on zero-trust security. He is convinced that the focus as we go into 2023 will be on tackling a lack of ROI from cloud deployments, mostly caused by inadequate planning, too much complexity, and not enough discipline when it comes to strategic cloud cost management.
9 VOIP Security Best Practices to Consider
This article looks at why VOIP security is so important and the best security practices for your organization to consider. Specifically, they recommned these 9 best practices for VOIP security: 1. Ensure clear and comprehensive documentation is established and kept up to date; 2. Utilize end-to-end data encryption; 3. Utilize segmented subnets, firewalls and network address translation for on-premise equipment; 4. Mandate the use of complex passwords and multifactor authentication for all VOIP related devices; 5. Keep all VOIP software regularly updated; 6. Apply all security hotfixes, patches and firmware updates; 7. Regularly test your VOIP systems for security vulnerabilities; 8. Discourage the use of public Wi-Fi for VOIP devices; and 9. Train your employees for how to react to attempted or successful security breaches.
~~~
Call-back technology gets your callers off hold by offering them a call-back from the next available agent or at a time of their choosing. Call-back technology may be built into your existing contact center platform or added through a software provider. Those that need a more robust solution typically turn to a specialized third-party vendor. Either way, the author offers up 8 ways to maximize your call-back technology in this article.
~~~