Thursday, April 30, 2015

Regulator Sets New Rules on Credit-Union Membership

The chief regulator of U.S. credit unions passed a new rule designed to curtail how some in the industry gather new members, a move credit unions say is too tough and rival banks say is too weak.

Image source: Article
The National Credit Union Administration, the regulator for the more than 4,000 federally chartered credit unions, on Thursday approved final rules that prohibit credit unions from setting up charities and other associations designed solely to attract customers who otherwise wouldn’t be eligible for membership.

Read the full article.

Payment Innovation Outpacing Security: Study

Security hasn’t kept pace with technology and there is widespread concern that new payment technology such as virtual currencies, mobile payments and e-wallets increase a breach risk, according to a new study.

Image source: Article
The study found that emerging payments technologies coming in the wake of 2014’s mega retail breaches are threatening a landscape in which financial institutions, retailers, payment processors and credit card brands are facing more scrutiny than ever before.

Read the full article.

Credit Unions May Partner With Bitcoin Exchanges to Offer Competitive Products

Credit unions may consider partnering with Bitcoin exchanges such as Coinbase if they are to continue offering competitive international payments services to their customers.

Image source: Article
In the report titled Understanding Bitcoin’s Implications for Credit Union Services, the group touches upon the two grave concerns stemming the rise of Bitcoin, High Volatility and Security. Should the digital currency’s volatility reduce to generally acceptable levels and the security of private keys is ensured, credit unions may replace their core functions with Bitcoin.

Read the full article.

The Opportunity (In New Members, Revenue) For CUs In Mobile Wallets

In financial services, nobody builds personal relationships like credit unions can—and nobody understands your credit union’s members better than you do.

Image source: Article
More and more members want to connect with their credit union through the mobile channel.

Read the full article.

Next Frontier for Mobile Payments: Adding Loyalty Programs

Even as credit unions are figuring out the emerging space that is mobile payments, there already are glimpses of the next frontier — adding loyalty programs to mobile.

Image source: Article
For years the concept of loyalty was simple: consumers used their credit and debit cards to make purchases and earned rewards by doing so. With the advent of mobile payments, however, suddenly the picture becomes much murkier.

Read the full article.

Design Is The New Differentiator In Mobile Banking

As understanding of basic mobile banking applications increases and the differentiation between mobile banking apps becomes less defined, the importance of mobile design takes center stage. The key is to combine functionality with simplicity.

Image source: Article
A study from the Federal Reserve shows that there are untapped markets waiting for mobile banking. Millions of consumers are going to start banking on mobile in the next twelve months. But millions more aren’t interested.

Read the full article.

Wednesday, April 29, 2015

Self-Service Payment Revolution Keeps ATMs Relevant

The fact that ATM fee hikes still cause controversy shows consumers still demand ATMs, even in an era when payments and other transactions seems to be moving to a mobile platform.

Image source: Article
It is the self-service component of mobile and other digital payment and financial transaction technology that is actually contributing to ATMs' health.

Read the full article.

How Banks and Credit Unions Protect Your Personal Information

From regularly changing passwords to safeguarding credit card numbers, there’s no shortage of ways to protect yourself from hackers who are dead set on stealing your personal information. What may be less familiar, though, are the measures that financial institutions take to protect this data.

Image source: Article
Hackers can be relentless and difficult to stop. But that doesn’t mean financial institutions aren’t doing what they can to thwart them, or that the government hasn’t recognized the severity of the threat.

Read the full article.

Bank Websites Face 'Mobilegeddon' as Google Tweaks Formula

Many banks may need to overhaul their websites after Google made a significant change to its search algorithm last week that is influencing the way companies' pages show up in search results on mobile devices.

Image source: Article
The tech giant is favoring individual web pages it deems "mobile-friendly" — an algorithm revamp some experts and media outlets are calling "Mobilegeddon" because some brands are at risk of falling into the search results abyss.

Read the full article.

Monday, April 27, 2015

8 Security Practices to Use in Your Employee Training and Awareness Program

This might be hard to believe, but it is true: 59 percent of data breaches are happening not because of some smart hacker who wants to do harm to your company but because of your own employees.

Image source: Article
The suggestions included in this post are applicable regardless of whether your employees are using smartphones or computers, or if they’re using their own devices or company-provisioned equipment.

Some of the recommendations include:

1) Authentication
2) Network Connection
3) Access to the Device
4) Physical Security

... and 4 more.

Read all of the employee training and awareness program recommendations on the Tripwire State of Security blog.

Friday, April 24, 2015

Should ATM Operating Systems Float to the Cloud?

Many aspects of modern banking are undergoing a technological revolution, but in the ATM segment, a debate is raging over whether new is actually better.

Image source: Article
The controversy centers around whether it's time to move ATM operating systems to the cloud, and like the rest of the $335 billion enterprise software market, competition between cloud and on-premises software providers that make the country's 425,000 ATMs work is heating up.

Read the full article.

Thursday, April 23, 2015

Now that search engine giant Google has received Federal Deposit Insurance Company (FDIC) backing for its mobile payments app Google Wallet, according to a Yahoo Finance report, cash stashed with the Google platform – which allows users to pay for in-store or online retail purchases or transfer funds via an Android phone – will be insured up to $250,000.

Image source: Google Images
Should Google go bust, consumers' funds are protected, as if held by a banking institution.

Read the full article.

Wednesday, April 22, 2015

Data Breaches Affect One in Four Americans

Data breaches are changing consumers’ online and offline shopping habits, according to a March American Institute of CPAs (AICPA) phone survey conducted by Harris Poll with more than 1,000 adult U.S. households

Image source: Article
One in four Americans suffered through an information security breach in the past year, double the number of reported victims revealed by a similar survey (11%) conducted over a year ago.

Read the full article.

Tuesday, April 21, 2015

Waratek Wins RSA Innovation Sandbox

Saying it was an inventive solution to a "massive problem," judges at the RSA Conference's Innovation Sandbox, today, awarded the title of Most Innovative Company to Waratek, creator of a runtime application self-protection solution for Java.

Image source: Waratek
In addition to Waratek, the finalists included BugCrowd, Cybereason, Fortscale, NexDefense, SecurityDo, SentinelOne, TrustInSoft, Vectra, and Ticto, which was named runner-up. The judges have never named a runner-up in the Sandbox's 10-year history, but apparently the fight between Waratek and Ticto was so close, that the judges deemed it necessary.

Read the full article.

Monday, April 20, 2015

Call Center Threats Grow

With recent headlines focusing on the threats malware poses to financial institution security, less attention has been placed on the information vulnerabilities that exist through call center communication – something experts said mobile technology could help keep at bay.

Image source: Article
Call center fraud perpetrated through social engineering has recently taken place in banking call centers, and in these endeavors, fraudsters used stolen credit card information to activate Apple Pay accounts on new smartphones to buy expensive goods.

Read the full article.
Learn more about LogMote.
Learn more about Authentify.

Signal above the noise: Compelling RSA 2015 sessions

Starting today, thousands of cybersecurity professionals will flood San Francisco's Moscone Center for the RSA Conference, one of the industry's largest and most authoritative events.

Image source: Article
Over the next five days, attendees will see presentations that provide a snapshot of the nation's cybersecurity Id: A conference weighted toward government and corporate security, any given year's topics provide a summary of collective fears, fantasies, sales trends, pain points, and heaps of obsessive research.

Read the full article.

Key Steps to Take to Ensure Security of Remote Deposits

Rapid innovation in mobile and remote deposit technologies means members today have more choices when it comes to how, when and where they interact with their credit union or other financial service providers.

Image source: Article
While the dramatically more efficient remote deposit technology offers credit union members greater convenience and flexibility, it also magnifies potential risks. The potential for human error and fraud — such as a check being altered or deposited multiple times on different dates or at different credit union locations — are real and persistent challenges.

Read the full article.

Saturday, April 18, 2015

Mobile App Payments Raise Security Concerns

When Facebook revealed the availability of payments via its Messenger app, consumers and financial institutions raised new mobile payment system security concerns regarding data breaches and fraudulent transactions.

Image source: Article
Facebook made the announcement that end-users could soon use its Messenger app to send money on March 17, 2015.

Read the full article.

Friday, April 17, 2015

Misconceptions About the Cloud & What It Can Do For You

Cloud technology has received a significant amount of attention over the past year. Many financial institutions have had doubts about the cloud due to many infamous hackings.

Image source: Article
However, when considering cloud technology as it relates to credit unions, many executives have ignored the opportunity for enhanced member services due to several misconceptions.

Read the full article.

Wednesday, April 15, 2015

Cyber Fraud is on the Rise

Recently, Cyber Security has became a major concern for credit unions in North and South Dakota.

Image source: Article
Leaders from over 20 Credit Unions met in Bismarck to discuss issues facing smaller financial institutions throughout the Dakotas. One of the biggest topics was cyber fraud.

Read the full article.

Six Months Before EMV Deadline, Where Do CUs Stand?

With just six months to go before the EMV liability shift deadline, just how ready are credit unions? The answer depends on how members want to pay.

Image source: Article
Most CUs' credit card portfolios are well prepared for the October shift, after which the liability for card-present fraud falls to whichever party is the least-EMV compliant in a fraudulent transaction, say industry insiders and analysts.

Read the full article.

Monday, April 13, 2015

Credit card skimmer technology is getting harder to spot

Thieves are increasingly placing credit card “skimming’’ devices that collect personal information with every swipe at a gas pump, posing an ever-evolving threat to consumers’ bank accounts. And they’re getting better at it. The newest devices found on gas pumps in the Tampa Bay area show thieves are now more tech-savvy than ever.

Image source: Article
Because skimmers are such a new problem, law enforcement agencies don’t have a specific way of classifying them from other burglaries.

Read the full article.

Friday, April 10, 2015

Credit Union IT Leader Offers Advice on Integrating New Tech

The bleeding edge of technology can be exciting, offering new workflows and efficiencies that can be transformational. Think email in the workplace. Few people can imagine work life without it today.

Image source: Article
David Cooper, vice president of information systems at the Charlotte Metro Credit Union (CMCU) in Charlotte, N.C., recently spoke with the Credit Union Times about how his organization introduced electronic services, mobile banking and cloud computing to push the business forward.

Read the full article.

Thursday, April 9, 2015

Credit Unions Concerned About Insider Threats: Survey

The majority of credit unions have serious security concerns regarding insider threats according to the results of survey conducted by Westport, Conn.-based Awareness Technologies in partnership with the CUNA Strategic Services.

Image source: Google Images
Results indicated that 83% of surveyed financial institutions admit their biggest concern is confidential information transferred to unauthorized recipients, while another 52% say they are worried about sensitive data being transferred by use of removable media.

Read the full article.

Thursday, April 2, 2015

4 things iPhone 6 does that Samsung Galaxy S6 can't

Samsung and Apple are the undisputed kings of the smartphone world, and both own right approximately 20 percent of the global market, according to recent research from IDC. However, the iPhone 6 still does many things the Galaxy S6 phones can't. This article is not intended to point out all of them.

Image source: Article
Instead, it's meant to spotlight the things I miss most when I leave home with the Galaxy S6 and not my iPhone 6. As is always the case with these matters, there are two tales to be told, so make sure to check out my companion story, "6 things Galaxy S6 does that iPhone 6 can't."

Read the full article.

Human error cited as leading contributor to breaches, study shows

Human error accounts for 52 percent of the root cause of security breaches, according to a new study from CompTIA, which surveyed individuals from hundreds of companies in the U.S.

Image source: Article
“What is particularly troubling is that companies generally rate human error as a lower concern among other security issues [such as malware and hacking],” Seth Robinson, senior director of technology analysis with CompTIA.

Read the full article.

Wednesday, April 1, 2015

Bridging the Endpoint Security Gap

Current PC and Server security standards are no longer adequate to stop the latest generation of attackers. Despite your investments in security you are at greater risk than ever. You've spent a great deal of money and time building a multi-layer, defense-in-depth security strategy for your organization. But, is it enough?

Image source: Matrix White Paper
IT security vendors have acknowledged their inadequacy and are now pushing analytics – after an attack has been successful, learn about it faster than you do today. According to the latest Mandiant threat report, M-Trends 2015, based on their research the time from an organization’s earliest evidence of compromise to discovery of compromise in 2014 was 205 days. Further, only 31% of victim organizations discovered the breach internally while 69% were notified of the compromise by an external entity such as law enforcement.

Global uptake of biometrics expected to rise in 2015

ABI Research forecasts $3.1 billion global revenues in 2015 for biometrics in the consumer and enterprise sectors, with much of the growth coming from smartphone solutions.

Image source: EyeVerify
Rapid advances in the biometrics field will drive further smartphone hardware upgrades. Meanwhile, pioneering algorithm design and cloud computing services are transforming user authentication.

Are you using biometrics such as EyeVerify to protect mobile operations in your Credit Union?

Security firm reports vulnerabilities in 70 percent of mobile banking apps

People are becoming increasingly concerned about their security. They use two-step authentication, login alerts, and third-party security services to better protect their email and social media accounts.

Image source: Article
However, apparently we are all mistaken in that as many as 70 percent of the top 100 mobile banking apps on the Android operating system in the APAC region are vulnerable to security attacks and data leaks.

Think that because you are in North America that you're safe?