Blog - Resources | CSI

CSI Resources

CoreProcessing_screens

8 Answers to Your .bank Questions

  • by Andy Shever
  • Jul 01, 2015

There’s a new buzz in the domain game, and you’ve probably heard of it‒.bank. Like most industry leaders, you’re probably still weighing the pros and cons, trying to determine what your strategy should be. Check out the following FAQ to break through the clutter and decide if .bank is right for your financial institution.


PrintAndElectronicDistribution_paperstack

Online Data Storage: Shred your Relationship with Paper Storage

  • by Eric Butterbaugh
  • Jun 24, 2015

Not only is paper expensive, it takes up a lot of space at your financial institution. Did you know that the comprehensive cost to print one piece of paper could be as high as $0.13 per page? That’s not sustainable.


PaymentsProcessing_gas

Understanding EMV: Preparing for the Great Mag-Stripe Migration

  • by Derrick Bretz
  • Jun 17, 2015

The road to EMV migration in the U.S. has been a rocky one. With complications stemming from federal regulations and ATM compatibility issues, migrating from the mag-stripe cards we rely on today to new chip card-based technology is proving a complex and costly undertaking.


RegulatoryCompliance_walk

Is Cuba Open for Business?

  • by Ronnie Wylie
  • Jun 10, 2015

For those of you wondering if Cuba’s now open for business, the answer is “well … not quite yet.” While there has been some ease of the restrictions placed on Cuba, travel is not permitted without a general or specific license from the U.S. Department of the Treasury.


RegulatoryCompliance_HallOfJustice

What the USA PATRIOT Act Expiration and the USA Freedom Act Mean to Your Financial Institution

  • by Amber Goodrich
  • Jun 03, 2015

Unless you’ve been hiding under a rock or otherwise detached from the news during the past week, you’ve probably heard that the USA PATRIOT Act has expired. The story has been dominating headlines since midnight on Sunday, May 31, when the expiration officially took effect.


Compliance_TheAdvisor

Appendix J and Your BCP: Are They Aligned?

  • by Chad Wagner
  • Jun 01, 2015

Feb. 6 through today—that’s just over a four-month span, but consider what has happened in that relative blink of an eye. Record-breaking snowfall crippled sections of New England. Multiple twisters ravaged parts of tornado alley. A U.S. hospital treated the 11th healthcare worker suffering from Ebola. The worst measles epidemic in years sparked fierce debates about vaccines. And an ISIS fringe group threatened the U.S. with a cyberattack.


CoreProcessing_code-1

How to Put Money and Time Back in Your Pocket with Managed IT Services

  • by Computer Services, Inc.
  • May 27, 2015

For many banks, the struggle to manage IT in-house becomes time consuming and detracts from strategic initiatives. And when your IT systems go down or a user can’t access his or her account, managing IT becomes an urgent priority that you have to make time for.


MobileandInternet_cards

Understanding EMV: Easy as 1, 2, 3?

  • by Derrick Bretz
  • May 20, 2015

Whether it’s big-name merchants falling victim to security breaches or increasing levels of counterfeit card fraud among customer transactions, bank card security is a growing priority for your bank, your customers and merchants across the U.S.


RegulatoryCompliance_Books

Changes for Community Banks in Shelby’s Regulatory Relief Bill

  • by Amber Goodrich
  • May 14, 2015

A full discussion draft of Senate Banking Committee Chairman Richard Shelby’s regulatory relief bill was released on Tuesday, May 12. This legislation could mean some big changes are in store for community and regional banks.


Compliance_TheSource

Email Encryption Warrants a Higher Place in Cybersecurity Mindset

  • by Gary Hein
  • May 11, 2015

The latest cybersecurity threats have bankers focused on such initiatives as DDoS, social engineering and external penetration. But while these concepts are important, they shouldn’t distract from the more commonplace areas. So, in the hierarchy of cybersecurity controls at your organization, where does email encryption fall?