The Power of Prototyping
Vincent Mysliwiec offers a behind-the-scenes look at software development and unveils its most powerful tool: the prototype.
Security Weaknesses You May Be Overlooking
As part of cybersecurity month, Emily Claus shares why credit unions need to carefully consider who they partner with, how they’re creating friction in the user experience, and what risks might slip through the cracks.
Cybersecurity: Tips from Experts
Julie Gessner interviews a panel of cybersecurity experts to get answers to some of your biggest questions and discusses what steps you can take to protect your credit union and your members.
Differentiating Types of Malware
As part of October’s cybersecurity month, Keegan Krajniak delves into the different types of malware and the various ways they work to get your members’ information.
Contactless and Digital: The Shift of Payment Options and Where They Go from Here
Linda Stearns reflects on the shift to contactless payments and digital wallets over the last couple years and how this will affect payments going forward.
Trust, But Verify: How Not to Potentially Lose Out on Thousands
Are you putting your credit union at risk for losing thousands of dollars? Cody Smith argues that failing to validate results after a software change is released can lead to big losses over time.
Beware of Ideas That Are Not Your Business
John Beauchamp urges credit unions not to be blinded by flashy ideas and technologies that bring nothing to the business—or their members—except glitz and glamor.
It’s Time to Say Goodbye to Internet Explorer
If you’re one of the few left holding onto Internet Explorer as it slowly dies—Keegan Krajniak want you to reconsider. He covers some of the potential security risks behind using the browser and why you should finally let it go.
Counseling Members When Identity is Compromised
When a member faces a potential account breach, they turn to their credit unions for help, but what happens when the teller isn’t sure what to do either? Jim Vilker offers up key steps to take when identity and accounts are compromised and resources to help you better support your members during the recovery process.