Social Engineering: Exploiting CUs' Service Culture

May 01, 2006
Social Engineering: Exploiting CUs' Service Culture May 1, 2006 By Joseph Kirkpatrick Phishing attacks are a common threat against credit unions and their members. According to the Anti-Phishing Working Group, there were more than 48,000 reports of phishing incidents during the last quarter of 2005. During this time frame, more... READ MORE

9/11 Attacks Test CU Ingenuity and Recovery

April 01, 2006
9/11 Attacks Test CU Ingenuity and Recovery April 1, 2006 The date 9/11 is a grim reminder that preparedness is critical to our common safety. Skyline Federal Credit Union , New York, had been open and conducting business for about 45 minutes when the first terrorist attack on the city's... READ MORE

Physical Security: Prevent Or Limit Disasters' Impact

April 01, 2006
Physical Security: Prevent Or Limit Disasters' Impact April 1, 2006 By Marty Watts Physical security plan components Built-in safety & security The devastating impact of Hurricane Katrina on businesses' ability to function serves as a frightening reminder that the best disaster recovery plan may fail if organizations don't take steps... READ MORE

Protect The Online Channel: Four Top Considerations

April 01, 2006
Securing online transactions is a critical part of operating in the digital world. READ MORE

How To Keep Ahead Of FFIEC Mandates

April 01, 2006
How To Keep Ahead Of FFIEC Mandates April 1, 2006 By Vance Bjorn Online banking has increased 47% during the past two years, making it the fastest-growing Internet activity, according to a new survey by the Pew Internet & American Life Project. With that growth comes the prevalence of online... READ MORE

Multi-factor Authentication Tools And Techniques

April 01, 2006
Multi-factor Authentication Tools And Techniques April 1, 2006 On Oct. 12, 2005, the Federal Financial Institutions Examination Council (FFIEC), which consists of the National Credit Union Administration and the other four financial institution regulators, issued an advisory containing guidance about identity authentication procedures to protect consumers who access their accounts... READ MORE

Eliminate Three Barriers To Cooperation

April 01, 2006
Our credit union forefathers were truly visionary in developing the cooperative model. READ MORE

How Has Your Security Changed Since Sept. 11?

April 01, 2006
How Has Your Security Changed Since Sept. 11? April 1, 2006 Spare No Expense For Security It hasn't changed because the level of security we had prior to Sept. 11 exceeded what the government recommended following the attacks. We have a double entry with a vestibule that provides a cushion... READ MORE

Seven Ways to Keep Members Front and Center

April 01, 2006
Seven Ways to Keep Members Front and Center April 1, 2006 Consumers today have infinite choices. Any product or service they could desire is within their reach, usually only a mouse-click away. In our global economy, hundreds of competitors may rise and fall--practically overnight. What's more, today's consumer is smart... READ MORE

Computer Crime

April 01, 2006
Computer Crime April 1, 2006 How Consumers Protect Themselves OnlineTake steps to secure PC92% Install antivirus software81 Install antispyware68 Install a software firewall50 Change passwords34 Install a hardware firewall29 Install a security software suite23 Other6      Take no precautions4%   Source: Zone Labs and Harris Interactive . Multiple responses were allowed. READ MORE


What's Popular

Popular Stories

Recent Discussion

Great article! Unfortunately, most employees don’t feel valued or appreciated by their supervisors or employers. In fact, research has shown that the predominant reason team members quit their jobs is because they don’t feel valued. This is in spite of the fact that employee recognition programs have proliferated in the workplace – over 90% of all organizations in the U.S. has some form of employee recognition activities in place. But most employee recognition programs are viewed with skepticism and cynicism – because they aren’t viewed as being genuine in their communication of appreciation. Getting the “employee of the month” award, receiving a certificate of recognition, or a “Way to go, team!” email just don’t get the job done. How do you communicate authentic appreciation? We have found people have different ways that they want to be shown appreciation, and if you don’t communicate in the language of appreciation important to them, you essentially “miss the mark”. Additionally, employees need to receive recognition more than once a year at their performance review. Otherwise, they view the praise as “going through the motions”. A third component of authentic appreciation is that the communication has to be about them personally – not the department, not their group, but something they did. Finally, they have to believe that you mean what you say. How you treat them has to match the words you use. If you are not sure how your team members want to be shown appreciation, the Motivating By Appreciation Inventory (www.appreciationatwork.com/assess) will identify the language of appreciation and specific actions preferred by each employee. You then can create a group profile for your team, so everyone knows how to encourage one another. Remember, employees want to know that they are valued for what they contribute to the success of the organization. And communicating authentic appreciation in the ways they desire it can make the difference between keeping your quality team members or having a negative work environment that everyone wants to leave. Paul White, Ph.D., is the co-author of The 5 Languages of Appreciation in the Workplace with Dr. Gary Chapman.

Your Say: Who should be Credit Union Magazine's 2014 CU Hero of the Year?

View Results Poll Archive