News & Publications

News

In The Press

  • With core conversions, the question isn't if, but when

    American Banker; Online; March 2017

    Expense and risk has kept many U.S. banks from modernizing their core systems, but executives at one community bank that completed the project this past summer say they are happier for having done it.

    Two Rivers’ bank unit went live in early August with a NuPoint core system from Computer Services, Inc.
    Read More
  • No Easy Answers as E-Retailers Contend With Compounding Payments Developments

    Digital Transactions; Online; March 2017

    Rattle off a selection of payment trends—EMV, tokenization, fraud—and many e-retailers may be beset by apprehension.

    That’s especially true if the retailer looks to support emerging payment types, according to Matt Herren, director of payments analytics at Computer Services Inc., a Paducah, Ky.-based financial-technology provider.

    Read More
  • How Will Machine Learning Affect the Financial Services Industry?

    WIB Tech & Security Digest; Online; March 2017

    Since the dawn of the Industrial Revolution, society has grappled with what man could produce versus a machine, and with each mechanical invention, man ultimately benefited. This century will be no different, and one of the key business disrupters will be machine learning. 

    Read More
  • Customers buy experiences now, not products and services

    Banking Exchange; Online; February 2017

    It has been said many, many times that the key to growth in these technology-heavy times is boosting customer satisfaction, which in turn requires improving the customer experience.

    A survey of more than 160 bank executives by Computer Services, Inc. found that 55% plan to increase spending on customer experience initiatives this year. At the top of this list of initiatives, 41% of respondents cited digital banking enhancements.
    Read More
  • Turning the Spotlight on Information Security Programs

    BankNews The Guide to Compliance 2017 (page 10); Online; February 2017

    Lately, the FFIEC has its hands full keeping stride with the accelerating speed of technological advancements and increasing sophistication of cyberattacks.

    The agency’s recent Information Security Booklet revision focuses on information security programs in an effort to increase security awareness, effectiveness and resiliency. To help institutions digest the 98-page update, we’ve analyzed the September 2016 booklet and discovered seven key takeaways on which financial institutions must act. 
    Read More
  • Transform Your Branch Using 3 Essential Components

    TBA Services Company; Online; February 2017

    Smart technology continues to change the behaviors and expectations of all consumers, from baby boomers to millennials. It’s a fact that’s part of our lives now, and it’s certainly true regarding the ways consumers currently view the bank branch.

    But, even though branch traffic and transactions are decreasing as customers enjoy the autonomy of digital channels, they still want to visit bank branches—they just expect more when they do. So in order to meet their expectations, banks should consider a total branch transformation.

    Read More
  • The road not token: How fraudsters beating EMV could hit a dead end in 2017

    BAI Banking Strategies; Online; January 2017

    When the EMV liability shift occurred in 2015, millions of mag-stripe debit and credit cards were traded in for chip-enabled cards. The goal: to prevent consumer data theft and tighten security at point-of-sale terminals. However, criminals are adaptive creatures. Making theft more difficult in one arena only pushes crime to a more vulnerable one: in this case, card-not-present transactions.

    Read More
  • What You Don’t Know About Network Defenses Can Definitely Hurt You

    FinXTech.com; Online; December 2016

    Hackers have many avenues to choose from when it comes to attacking your organization, the most obvious of which is “breaking in from the outside,” or attacking your network’s perimeter. But they also can choose to attack from the inside-out by targeting your employees and internal weaknesses.

    Read More