Wednesday, March 4, 2015

How Same-Day ACH Transactions Will Affect Your Fraud Prevention Operations

by Damien Hugoo, Product Manager, Easy Solutions

The implementation of same-day Automated Clearing House (ACH) transactions has been getting a good amount of media attention lately. American Bankers Association (ABA) believes that widespread adoption of same-day ACH transactions represents a fundamental step to promote faster payments across the entire industry.

Image source: Article
Initial reaction has been that same-day settlement will pinpoint fraud more rapidly and as a result, customers will be alerted quicker. While part of this is true, there is major work to be done to pinpoint fraud faster.

In terms of fraud operations, right now most banks processes have a 2-day timeframe to tell the Federal Reserve that they want to return the ACH debit. With Same-Day ACH, banks will be forced to reengineer their entire fraud program and compress all their current processes into the 2-hour window. Subsequently, all ACH fraud prevention processes will have to start to be automated for those transactions.

Is your credit union prepared for these changes?

For information about real-time transaction monitoring download this whitepaper: An Introduction to Transaction Anomaly Detection.

Post provided by:

Tuesday, March 3, 2015

Apple Pay a haven for 'rampant' credit card fraud, say experts

Apple and its banker pals may have inadvertently lowered the barrier to credit card fraud by adding pay-by-wave technology to iPhones, security experts fear.

Image source: Article
Payment cards can be added to Apple Pay by taking a photo of the card, and allowing a device to run optical character recognition over the image to fill out the long card number, expiry dates and other details. These numbers can be entered manually, so physical access to a card is not needed.

Are you an early adopter putting your members at risk?

Monday, March 2, 2015

Brian Panicko demos CellTrust SecureLine for Good

With the integration of CellTrust SecureLine for Good and Good Work, financial advisors, agents, analysts, brokers and wealth managers can seamlessly and securely access corporate email, make secure phone calls to business contacts, and send secure text messages all from their personal device.

Because the employees’ personal devices are equipped with a second mobile business number, business and personal communications are kept separate and private.

Go to to learn more about CellTrust SecureLine for Good for financial services organizations. Alternatively, if you're ready, give the app a try.

Mobile Security By The Numbers

As ubiquity of mobility paired with the availability of cloud continues to drive major technological disruptions within just about every type of enterprise transacting business today, CIOs and CISOs are increasingly put on notice to incorporate mobile into their security plans or risk irrelevance.

Image source: Article
Over the past several months, numerous surveys and studies have done a good job offering up some statistical proof points about the scope of the mobile security dilemma.

Read the article to see a collection of salient stats, including:

Friday, February 27, 2015

Secure credit cards: Retailers are on board, banks and credit unions lag

Government and the private sector don't always see eye to eye, but we're working together on an issue of great importance to Californians and all Americans: making credit card purchases safer.

Image source: Wikipedia
One crucial sector of the business community, however, has yet to fully buy in.

Why is it credit unions continue to provide their customers with outdated, riskier technology?

Thursday, February 26, 2015

Three questions with a CU CEO on adapting to new technology

In October, the credit union had a soft opening of a new, innovative branch with only one employee. The branch features a computer touch screen table and wall, interactive loan consultation and an interactive teller machine (ITM) that video conferences in a remote representative.

Image source: Article
SEFCU President and CEO Michael Castellana said the credit union did not model the branch after any existing financial institutions.

Read the article to see how SEFCU is adapting to new technologies and read what is next for the credit union.

Tuesday, February 24, 2015

Windows? NO, Linux and Mac OS X Most Vulnerable Operating System In 2014

Apple’s operating system is considered to be the most secure operating system whether it’s Mac OS X for desktop computers or iOS for iPhones.

Image source: Article
But believe it or not, they are the most vulnerable operating system of year 2014. According to an analysis by the network and security solutions provider GFI, the top three most vulnerable operating system are: Apple’s Mac OS X, Apple iOS, and Linux kernel.

What operating system flavors are you using within your credit union?

Video Communication Isn't Just for Big Banks

The number of routine transactions conducted at community bank and credit union branches has gone down 10% annually over the past four years.

Image source: Article
Conversely, mobile traffic is skyrocketing with 50,000 customers downloading banks’/credit unions’ mobile apps each week and executing anywhere from 250 to 300 million online banking logins each month.

Customers are sending a message: Did you get it?

Monday, February 23, 2015

7 Reasons Millennials Are Turning to Credit Unions Instead of Banks

Reason 4: Mobile banking is the new norm - millennials gravitate toward technology and apps that are on the same level as big banks, and found that credit unions are offering “just as many” online services and apps.

Image source: Article
Some Millennials prefer to do all their banking from their cellphones and some feel that banks are not on par with their offerings. Switching to a credit union two years ago meant that Chris Kummer, 33, an associate account executive in public relations in Seattle, could keep using his favorite three financial apps and maintain the personalized service.

Is your credit union keeping up with the millennials needs and desires? Be sure to read the whole article for the other 6 reasons.

Hiring Hackers to Find Software Bugs

When it comes to finding and fixing software bugs, companies have a variety of priorities.

Image source: Article
But whether it’s protecting credit card data or personally identifiable information, securing intellectual property, or preventing online gamers from cheating, one fact remains: finding and fixing security bugs is difficult and labor intensive.

This article looks at the risks and rewards of offering software bug bounties to hackers.

Friday, February 20, 2015

IT's top 3 cloud migration errors

The good news is that most companies are now moving to the cloud; the bad news is that many are doing it poorly

Image source: Flickr
Despite all the best-practice information out there, huge mistakes are still widely made.

Have you migrated to the cloud? Did you do so successfully?

Wednesday, February 18, 2015

An updated list of the merchants, cards and apps that accept Apple Pay

Nineteen new banks and credit unions now support Apple Pay.

Image source: Article
These include: Affinity Federal Credit Union, Cabela’s CLUB, Central Bank, Credit Union of Southern California, Farmers & Merchants Bank of Long Beach, First National Bank of Omaha, First Sentry Bank, FirstBank, Grow Financial Federal Credit Union, Ideal Credit Union, Morgan Stanley, Redwood Credit Union, State Department Federal Credit Union, Teachers Credit Union, Technology Credit Union, The Northern Trust Company, TIB-The Independent BankersBank, United Federal Credit Union, and Utah First Federal Credit Union.

Read the article to see some of the businesses already using Apple Pay.

Morgan Stanley leads 20 new bank and credit union additions for Apple Pay

Apple continues to expand the reach of its popular mobile payment system, with the Cupertino company rolling out support for cards from nearly two dozen additional financial institutions — including major investment bank Morgan Stanley — on Wednesday.

Image source: Article
The addition of Morgan Stanley may seem odd, given that the firm offers no retail banking services, but that is not the case. Investment banks like Morgan Stanley often offer exclusive credit cards to customers who use the bank's wealth management services.

Read the article to see some of the more than 700 banks and credit unions that have signed up to integrate Apple Pay.

Cloud security certifications: How important are they?

More and more certifications are being created around cloud security. Expert Sean Martin looks at some of the more prominent certifications and examines their value.

Image source: Article
If you are a CSO working for a company that leverages cloud technologies to run its business, what should you look for in a candidate to add to your staff?

Read the article to of see what some of the top certifications are for cloud security.

Credit unions set to take on banks with launch of debit cards

Eleven of the largest credit unions in Ireland are set to launch debit card services, allowing them to compete head-on with banks by offering full current accounts.

Image source: Article
The move is set to transform the services offered by credit unions, which have been concentrated on small loans and savings facilities up to now.

How does your CU stack up to those in Ireland?

Tuesday, February 17, 2015

SMBs Prep for EMV Shift: How Ready is Your Business?

There is a lot of work involved in implementing [EMV], and some banks have decided to go with a simpler more expedient roll-out, and are still meeting the minimum requirements of the card association while avoiding the time and overhead costs of issuing pins.

Image source: Article
Long Island City, NY-based UNFCU was an early adopter of EMV and one of the only credit card companies that issues chip cards.

Are you EMV ready?

Bank Hackers Steal Millions via Malware

In late 2013, an A.T.M. in Kiev started dispensing cash at seemingly random times of day. No one had put in a card or touched a button. However, the errant machine appears to be the least of the bank’s problems.

Image source: Article
The scope of this attack on more than 100 banks and other financial institutions in 30 nations could make it one of the largest bank thefts ever — and one conducted without the usual signs of robbery.

No bank has come forward acknowledging the theft. Is your firm one of them?

Monday, February 16, 2015

Banking Trojan Dyreza sends 30,000 malicious emails in one day

A massive spam wave is installing banking Trojan Dyreza on tens of thousands of computers to steal sensitive financial data from unsuspecting customers.

Image source: Flickr
30,000 malicious emails were sent in just one day from spam servers in the UK, France, Turkey, US and Russia.

Read the article to learn more about server-side polymorphism.

App Economy Demands "Security-First"

Protection is still the main driver for security, but organizations understand the application economy demands a new view and approach to security.

Image source: Article
Key findings include the following: mobility matters, the desire to innovate quickly, new attitudes adopted, and increase in security investment.

Read the article to access additional details uncovered by the research.

Thursday, February 12, 2015

A Credit Union Cyberattack Defense Manual

With the ever increasing risks that are associated with cyberattacks, companies across industries are realizing the importance of having a cybersecurity team.

Image source: Article
Cyber criminals are becoming more sophisticated, and they are able to hack into the biggest financial institutions across the globe, like JP Morgan Chase and HSBC. Any small dropping of the guard can result in catastrophic theft of customer financial records, business data and syphoning of a large amount of funds.

Have you dropped your guard?

Tuesday, February 10, 2015

The Day Memory Scraping Malware Lost

Every organization today is, or should be, concerned about the spread of dangerous malware being launched in targeted attacks. An example of a recent trend is the aggressive use of memory scraping malware by cyber-criminals against any organization that accepts credit cards – this incudes retail, healthcare, financial services, governmental entities and others. The headlines reflect the scale of the issue – every week there are new headlines of record setting data loss and credit card data theft in organizations of all sizes.

Image source: Wikipedia
The issue that causes the most concern about these damaging attacks is that each of these breached organizations had invested a great deal of money and effort to put in place and support a multi-layered in-depth security solution. In addition, they were in certified compliance with standards like PCI DSS, HIPAA, GLBA and other regulations. Doubt has surfaced for many organizations who are now wondering “If these large sophisticated companies that take security seriously were breached, how can I be safe?”

CU InfoSecurity Conference 2015 in Las Vegas

The Credit Union InfoSecurity Conference, the original and premier conference dedicated solely to credit union security, is holding its next summit on June 3-5, 2015 at the Golden Nugget Hotel & Casino in the heart of Fremont Street in Las Vegas.

Register for the event

Image source: CU News
The conference, which features industry leaders in their respective fields sharing their firsthand knowledge and practical advice on securing credit unions, is an incredible opportunity to gain new insight, network with credit union peers, and browse the Security Vendor Reception.

Possible topics to be covered at the upcoming summit include ransomware, active defense, cloud security, data encryption, breach prevention, pervasive security, device configuration, social media compliance, virtual branch security, virtual machine security, account takeover prevention, network security strategies, and cyber security intelligence.

If you are interested in attending the event, be sure to register here (

Monday, February 9, 2015

Networking Your Way to a Datacenter in the Cloud

As the dream of the fully virtualized data center comes closer to reality, the race is on to integrate SDN into the cloud stack.

Image source: Wikipedia
According to U.K. researcher Companies and Markets, an expanding cloud is expected to spur the growth of network fabric topologies as top organizations look to build key functions like continuous data availability, application flexibility and rapid architecture deployment.

What is your firm's place in the SDN cloud race?

Friday, February 6, 2015

Study: Cloud, Mobile Computing to Drive Financial Services Security Market Growth

Research and Markets has forecast the global market for cybersecurity offerings within the banking, financial services and insurance sector to yield a 13.14 percent compound annual growth rate through 2019.

Image source: Article
The increasing use of cloud security and mobile platforms is projected to drive the BFSI cybersecurity market’s growth over the next four years, the research firm said.

Does your firm use any of the firms profiled in the report? (BAE Systems, Booz Allen Hamilton, Computer Sciences Corp., FireEye, IBM and Symantec)

Mobile fraud hits enterprises in the pocket to tune of $240m, report finds

New survey data from mobile identity provider TeleSign has found that enterprises have lost up to $240m (£157.3m) a year because of mobile e-commerce fraud.

Image source: Article
The study, conducted by J. Gold Associates and sponsored by TeleSign and RSA, EMC’s security division, found average revenue loss due to mobile fraud was $92.3m per year (£60.54m).

Is your firm one of the many companies not prepared – or just not bothered – about potential repercussions with respect to the state of mobile security?