CSI Resources

hand reaching out of computer screen grabbing a wallet

Take if from a Pro: Fraud Anomaly Detection FAQ

  • by Jonathan Ferguson
  • Dec 01, 2016

As fraudsters grow increasingly more sophisticated, reports of cybersecurity attacks and bank fraud are on the rise. To protect vulnerable customer data and bank assets, financial institutions have developed a variety of techniques for monitoring fraudulent money movement within online banking. But, the days of pouring through manual reports for anomalous customer behaviors are falling to the wayside, making way for more advanced anomaly detection techniques, like automated fraud detection software.


The Source logo

Tech Disruption: Are Banks Prepared?

  • by Computer Services, Inc.
  • Nov 18, 2016

The notion of technology disruption has been, and continues to be, a huge topic of discussion in the financial industry and beyond. As technology evolves and becomes more sophisticated, many experts believe that the industry needs to evolve with it to better serve customers who crave innovative ways to fulfill their banking needs.


The Advisor logo

FFIEC Takes Aim at Information Security Programs

  • by Steve Sanders
  • Nov 16, 2016

With four updates to its IT Handbook in 20 months, the Federal Financial Institutions Examination Council (FFIEC) has its hands full keeping up with the accelerating speed of technological advancements and the increasing frequency and sophistication of cyberattacks.


man drawing on chalked diagram

3 Ways to Get a Grip on Technology with Managed Services for Banks

  • by Computer Services, Inc.
  • Nov 10, 2016

For many community banks, holding on to IT staff equipped with the expertise and ability to manage various technology systems is a difficult and expensive task. Plus, finding qualified IT employees is increasingly challenging.


General_gear-bulb

CX16, Day 2: Tech Disruption, Generational Insight and Educational Breakouts

  • by Computer Services, Inc.
  • Nov 03, 2016

Though it stormed in the early morning hours of Wednesday in San Antonio, Texas, the agenda for day two of CSI Customer Conference 2016 was anything but watered down.


General_crowd

CX16, Day 1: Sightseeing, Product Education and Managed Services Insight

  • by Computer Services, Inc.
  • Nov 02, 2016

CSI Customer Conference 2016 kicked off in grand style on Tuesday, Nov. 1, at the beautiful JW Marriott San Antonio Hill Country Resort & Spa in San Antonio, Texas. More than 900 attendees from around the country registered for this year’s conference, where in similar fashion to CSI itself, the theme is all about the customer experience.


silver lock laying on letters and numbers

Strengthen Your Offense to Put a Hold on Cyberattacks

  • by Terry Anderson
  • Oct 27, 2016

Massive distributed denial-of-service (DDOS) attacks last week, which shut down powerhouses like Twitter, Spotify, Netflix and many others, remind us that the Internet is a vulnerable place. And while you have several areas within your business that require attention, protecting your financial institution’s network from external cyberattacks is major priority.


making a payment on an iPad

3 Elements of a Proactive Card-Monitoring Program

  • by Computer Services, Inc.
  • Oct 20, 2016

Managing card fraud is a high-stakes game for any financial institution. Case in point: Martinsville, Indiana’s Home Bank. Like many institutions, the bank was spending significant time mitigating card fraud and managing fraud resolution. And despite using a card-mitigation service, the bank was struggling to identify fraud trends and researching transactions became very difficult.


man standing in the middle of a maze

Has Your Bank Performed a Cyber-Incident Simulation Test Yet?

  • by Tyler Leet
  • Oct 13, 2016

For years, banks have been expected to test their business continuity plans. But now, with cybersecurity becoming a bigger and bigger priority in the financial industry, the lines between your cyber-incident response program and business continuity plan (BCP) are becoming blurred and combined. In recognition of National Cybersecurity Awareness Month, let’s take a hard look at testing cyber-incident response plans.


The Advisor logo

Three Troubling UDAAP Trends Emerge from the CFPB

  • by Amber Goodrich
  • Oct 05, 2016

After five years in operation, and under the auspices of preventing unfair, deceptive or abusive acts or practices (UDAAP), the CFPB continues to exert its power and authority over the financial industry in troubling ways. This year alone, it successfully argued against a statute of limitations for UDAAP violations and proposed a UDAAP rule on small-dollar loans that many believe could decimate this sector of the financial services industry.