Links in “Technology”
- The Double-Edged Sword of Technology
Using technology in financial institutions is a double-edged sword. On the one hand, it exponentially increases efficiency and accessibility; on the other, insufficiently trained technology staff often fail to prevent security breaches. Attorney Anthony Hendricks gives sage advice on how to avoid the potential problems ushered in with growing technologies. [12/18]
- Huge Uptick in Cloud Computing in 2014 Foreseen
One prognosticator anticipates a huge increase in spending on cloud computing technology as banks become more comfortable with the practice, one of four predictions for technology in banking for 2014. [12/5]
- Survey Finds Hunger for Better BYOD Solutions
56% of respondents say their companies are looking to replace their current Bring Your Own Device security solutions. [11/19]
- Hearing Looks at Need for Protection from Patent Trolls
Members of the House Judiciary Committee heard testimony yesterday about a credit union that was served with a demand letter for patent infringement for technology it was using with features on its online banking service. Other credit unions have had similar and very costly experiences. [10/30]
- Survey: Half of Young Employees Would Break BYOD Policies
Survey finds that about half of younger employees (21-32) would break company policies that ban bringing personal devices to work (Bring Your Own Device). [10/25]
- Banking Technology in the Next 20 Years
Voice recognition, paperless transactions foreseen as becoming the norm in banking over the next two decades. [10/17]
- The Key Is Encryption Key Management
10th anniversary of the first National Cyber Security Awareness Month is good time to take a look at that sometimes glossed over element of a sound security plan: encryption key management. [10/17]
- FFIEC Notes Windows XP Support to Expire
Microsoft's cessation of support for XP in 2014 means that FIs have need to assess impact on any personal computers, servers, and purpose-built devices that use XP. Focus on completion of the risk management cycle (assess, mitigate, plan, monitor and report) recommended. [10/8]
- The Delicate Dance of Tech Innovation and Security
The competition to be technologically innovative makes it a challenge to guarantee security, but that is the charge facing today's institutions. [10/4]
- The Dropbox Problem
When enterprise tools don't support working mobile, employees turn to consumer tools, such as Dropbox, which can mean that sensitive customer information can end up in an environment outside the enterprise's control. [10/3]