CSI Resources

The Advisor logo

Appendix J and Your BCP: Are They Aligned?

  • by Computer Services, Inc.
  • Jun 01, 2015

Feb. 6 through today—that’s just over a four-month span, but consider what has happened in that relative blink of an eye. Record-breaking snowfall crippled sections of New England. Multiple twisters ravaged parts of tornado alley. A U.S. hospital treated the 11th healthcare worker suffering from Ebola. The worst measles epidemic in years sparked fierce debates about vaccines. And an ISIS fringe group threatened the U.S. with a cyberattack.

code on a computer screen

How to Put Money and Time Back in Your Pocket with Managed IT Services

  • by Computer Services, Inc.
  • May 27, 2015

For many banks, the struggle to manage IT in-house becomes time consuming and detracts from strategic initiatives. And when your IT systems go down or a user can’t access his or her account, managing IT becomes an urgent priority that you have to make time for.

multiple charge cards

Understanding EMV: Easy as 1, 2, 3?

  • by Derrick Bretz
  • May 20, 2015

Whether it’s big-name merchants falling victim to security breaches or increasing levels of counterfeit card fraud among customer transactions, bank card security is a growing priority for your bank, your customers and merchants across the U.S.

row of law books

Changes for Community Banks in Shelby’s Regulatory Relief Bill

  • by Amber Goodrich
  • May 14, 2015

A full discussion draft of Senate Banking Committee Chairman Richard Shelby’s regulatory relief bill was released on Tuesday, May 12. This legislation could mean some big changes are in store for community and regional banks.

The Source logo

Email Encryption Warrants a Higher Place in Cybersecurity Mindset

  • by Gary Hein
  • May 11, 2015

The latest cybersecurity threats have bankers focused on such initiatives as DDoS, social engineering and external penetration. But while these concepts are important, they shouldn’t distract from the more commonplace areas. So, in the hierarchy of cybersecurity controls at your organization, where does email encryption fall?

six thumbs up

What Lost Socks Taught Me About Customer Experience

  • by Andy Elliott
  • May 07, 2015

Recently, I was browsing Facebook and saw a post that caught my eye. It was a photo of a small wooden board. There were clothes pins attached and a painted heading that read: “Sole Mates.” The idea is to hang this board in your laundry room, and whenever you find a single sock, pin it to the board in hopes the missing sock will show up and find its “mate.”

The Advisor logo

Walking the UDAAP Tightrope

  • by Amber Goodrich, CSI Compliance Strategist
  • May 04, 2015

UDAAP: Is there a more concerning or confusing acronym in current financial regulatory jargon? This vague yet all-encompassing regulation is still in its infancy compared to many compliance laws, but its bite is proving as injurious as its initial bark had foreshadowed.

man signing a document

Crimea Sanctions Q&A with an International Trade Law Attorney

  • by Ronnie Wylie
  • Apr 30, 2015

As CSI’s data services manager and resident watch list expert, I do everything I can to stay on top of the latest updates to the OFAC SDN and restricted party watch lists. And with no sign of the Ukrainian crisis letting up, I sat down with Doug Jacobson, an international trade attorney in Washington, D.C. who specializes in sanctions and export controls. He gave us an update on the U.S. sanctions on the Crimea region—and what this means for financial institutions and other companies.

gavel on a keyboard

How Recent OFAC Sanctions are Cracking Down on Cyber Attackers

  • by Ronnie Wylie
  • Apr 27, 2015

With stories of cybercrime and cyberattacks buzzing in the headlines, it’s no surprise more sanctions, like those levied against North Korean officials and organizations, are back in the news. In fact, on April 1, 2015, President Barack Obama ramped up the OFAC sanctions program—and now he’s focusing on cyber-related threats.

The Source logo

Use Business Intelligence to Dig Deep into Data

  • by Jason Young
  • Apr 13, 2015

Your institution’s data is a veritable goldmine, but in order to really benefit from it, you must be able to fully analyze it. Enter business intelligence (BI) tools.