Technology

Social Networks That Boost Your Business

June 18, 2010
Innovative companies are embracing Web 2.0 to enhance communication, information sharing, and collaboration. READ MORE

Going Mobile? Be Safe

March 30, 2010
Patrick Totty The complexity of mobile banking makes security particularly challenging. At last count, modern credit unions offered members at least six product and service delivery channels: in person, snail mail, ATMs, e-mail, Web sites, and call centers. Mobile banking gives credit unions another way to connect with members. But... READ MORE

The 'Paperless' Myth

March 30, 2010
Rudy Pereira ECM systems can help with information overload. Experts have touted the “paperless” office for decades. The truth is, although we’ve seen progress, paper still overwhelms many organizations. And now added to the paper piles are endless e-mails, faxes, reports, and other unstructured content. We aren’t paperless, and in... READ MORE

Emerging Security Threats

March 30, 2010
Jennifer Garrett In this age of cyber crimes and brazen thieves, don’t let security lapses compromise members’ trust. Focus • Educate members on the latest schemes, spoofs, and scams. • Prepare staff to guard against security compromises. • Board focus: Support CU investment in preventive tools and technologies. Security is everything when it... READ MORE

Social Media Policy a Must

March 30, 2010
Social media is woven into the business fabric for many credit unions and employees. But how far should you go to guide employees’ social networking activities and prevent or reduce employment-related problems? Consider eight tips from workforce.com : 1. Develop a social media/networking policy. Use it to frame acceptable and... READ MORE

Phony listings poison search engine results

March 23, 2010
Over 18 months, TraceSecurity  Co-founder/Chief Technology Officer Jim Stickley employed his talent for exploiting security flaws to show how easily search engine listings could be poisoned by malicious schemes. The Credit Union of Southern California in Whittier allowed Stickley to mimic its Web site as part of the experiment. “We... READ MORE

Leverage Technology to Ease the Compliance Burden

March 10, 2010
Steve Gibbs : Use technology to lessen the compliance burden and control costs. By Steve Gibbs Compliance has always been a tedious process involving much reading and even more research. In the “good old days,” disclosures were reviewed word by word and annual percentage rates were determined on a hand-held... READ MORE

Ten Tweets You Should Never Send

March 09, 2010
"You’re boring. That’s why people are ignoring you.” Seth Godin , marketing guru By Jeffry Pilcher If you’re at all familiar with Twitter , then you know its users have struggled with one basic problem since the service was launched: mundane and trivial tweets. Things have improved recently, and now... READ MORE

2010's Top 10 Information Security Threats

February 09, 2010
The start of a new year is a great time for companies to evaluate their information security practices and prepare for threats they’ll face in the coming year, says Kevin Prince, chief technology officer for Perimeter eSecurity , Milford, Conn. “As these security threats become more serious and difficult to... READ MORE

Social Media Guidelines and Policies

February 08, 2010
Conference to Offer Social Media Guidance The 16th Annual CUNA Human Resources/Training & Development Council Conference will feature a session on social media for HR, plus more than 25 other sessions covering industry-essential issues such as: Mergers ; Performance management ; and Remote workforces . The conference will be held April 11-14... READ MORE

What's Popular

Popular Stories

Recent Discussion

Your Say: Does Your CU Offer Subprime Loans?

View Results Poll Archive