Technology

Get Your E-Mail Messages Through

June 01, 2008
Get Your E-Mail Messages Through June 1, 2008 By Greg Crandell Spam is here to stay, and the enemy is gaining ground. But take heart: Spam filters are becoming more sophisticated, with forceful weapons that can fight off the worst of foes. That's good news, but where does it leave... READ MORE

Podcast: Harness the Power of New Marketing Media

June 01, 2008
Podcast: Harness the Power of New Marketing Media June 1, 2008 When people seek solutions to their problems today, the first place they go is the Web. So successful companies are publishing great content online, according to David Meerman Scott, author of "The New Rules of Marketing & PR ."... READ MORE

SAS 70 Reports Provide Peace of Mind

May 01, 2008
SAS 70 Reports Provide Peace of Mind May 1, 2008 By Alyssa G. Martin When the American Institute of Certified Public Accountants (AICPA) introduced Statement of Auditing Standards No. 70, Service Organizations (SAS 70) in 1992, many service organizations viewed it as an optional audit—an option determined by cost/benefit analysis.... READ MORE

Infuse Information Security Into IT Infrastructure

April 01, 2008
Infuse Information Security Into IT Infrastructure April 1, 2008 By Jeromie Jackson Capitalize on the rewards and minimize the risks of information technology (IT). To do so, make sure information security is ingrained in your systems—throughout each project lifecycle. While IT provides simplified user experiences, straight-through-processing, and technical agility, it... READ MORE

Stem the Data Leakage Tide

April 01, 2008
Stem the Data Leakage Tide April 1, 2008 By Andrew Plato There's a lot of talk now about data leakage protection (sometimes called extrusion prevention). Data leakage is an important information security issue facing organizations of all types. However, data leakage prevention is particularly important for financial services and health-care... READ MORE

Data Storage Remedies May Be Coming

April 01, 2008
Data Storage Remedies May Be Coming April 1, 2008 By Vicky Franchino As the numerous data breach scandals of recent years prove, there's an epidemic of inappropriate data storage, and credit unions are paying the cost. Remedies and solutions could come from the major card companies and legislative changes: Payment... READ MORE

Stay Ahead of the Bad Guys

April 01, 2008
Stay Ahead of the Bad Guys April 1, 2008 By Karen Bankston Information security challenges are continuous and ever-shifting. Hackers and identity thieves constantly are looking for ways to infiltrate the data systems of credit unions large and small, and members' accounts. Federal regulations, such as the Gramm-Leach-Bliley Act and... READ MORE

Three Ways to Fight Online Fraud

March 01, 2008
Three Ways to Fight Online Fraud March 1, 2008 By Tom Miltonberger Despite continued investment in online fraud prevention technologies, many credit unions' member accounts continue to be vulnerable to cyber crime. Three best practices decrease a credit union's vulnerability to online fraud: 1. Invest equally in back-end and front-end... READ MORE

Boost Member Loyalty Via E-mail

March 01, 2008
Boost Member Loyalty Via E-mail March 1, 2008 By Mike Darnell Credit union members enjoy the speed and convenience of online services—but while online they also visit the Web sites of other financial institutions. Today's online consumers have questioning minds: They want to "get the big picture," learn about their... READ MORE

SaaS: A Virtual Data Center

March 01, 2008
SaaS: A Virtual Data Center March 1, 2008 By William H. Matlack, Jr. Since its introduction a few years ago, Software as a Service (SaaS) has provided small and medium businesses with affordable access to comprehensive business applications and services comparable to what much larger enterprises deploy. Because SaaS solutions... READ MORE

What's Popular

Popular Stories

Recent Discussion

Your Say: Does Your CU Offer Subprime Loans?

View Results Poll Archive