Blog

Atris Technology And Advanced Fraud Solutions Partner To Deliver Instant, Automated Check Fraud Prevention At The Teller Line

Atris Technology And Advanced Fraud Solutions Partner To Deliver Instant, Automated Check Fraud Prevention At The Teller Line

HIGH POINT, N.C., March 6, 2018 /PRNewswire/ — Atris Technology, a Gainesville, FL IT services provider offering automation solutions to the banking/financial sector, announced today that it has established a partnership with Advanced Fraud Solutions, a leading fraud prevention and risk mitigation SaaS (software-as-a-service) company. AFS’s TrueChecks® software is now integrated into Atris’ FlexTeller21 platform, giving financial institutions a fast, automated way to review check deposits for possible fraudulent activity. The TrueChecks® service screens for counterfeit...

Read More

A Real-World Example of Social Engineering

A Real-World Example of Social Engineering

A social engineering test presents a challenge to your IT security team like no other.  Typically, advanced systems can manage technical points of entry into your environment with firewalls, logging, SIEM systems, malware scanners, etc.  However, when the point of entry into your system is user error, things become much more difficult to manage. During one of our network vulnerability assessments, we were engaged to perform a social engineering test.  We decided the most effective test would be a spear phishing attempt.  Spear phishing is a modified form of phishing where the attacker...

Read More

Integrating Instant Issuance Cards

Integrating Instant Issuance Cards

While instant issuance eliminates waiting for a debit card to arrive in the mail, it is important financial institutions closely evaluate the solution from an integration standpoint. Multiple systems are often involved with card – and cardholder – information. And because the goal is to make the card immediately usable, the integration tasks must be completed as close to real-time as possible.

Read More

How to protect yourself from ransomware.

How to protect yourself from ransomware.

You have a top-flight antivirus solution deployed and managed on your system. Your hardware firewall is automatically updated and continuously monitored by a great security team. You’ve blocked access to all known malicious and questionable web sites. Your email and web surfing is filtered by the best service money can buy. You just paid $1,000 worth of Bitcoin to somebody you’ve never met in a country you’ve never heard of.

Read More

Why EMV cards won’t stop CNP fraud.

Why EMV cards won’t stop CNP fraud.

As U.S. banks deploy chip-enabled EMV debit and credit cards, most articles on the subject imply the new cards will dramatically reduce fraud. Because EMV card technology utilizes a unique one-time code created by the chip for each transaction, it is unlikely fraudsters will be able to produce counterfeit cards which mimic the original, meaning fake cards will essentially disappear. Is it time to celebrate?

Read More

Protecting your virtual infrastructure just got easier.

Protecting your virtual infrastructure just got easier.

With the release of version 8, Veeam introduced Cloud Connect. This new feature allows you to easily send your backup data off-site to a third party data center. As opposed to on-line backup systems like Carbonite or Mozy, Veeam allows you to maintain complete control of your data. If you’re in a highly regulated network environment like a bank or credit union, it’s in your best interest to know where your data is stored. Having your data “in the cloud” isn’t a good enough answer for your examiners.

Read More