IBT Apps Blog

Assess Your Core Provider's Service: Question 4 - Technology Costs

Jan 13, 2021 10:23:52 AM / by IBT Apps posted in coreprocessing, cybersecurity, assessing your core provider

0 Comments

Continuing with the last question of Assessing Your Core Provider's Service, we take a look at technology costs and we have to ask:

Read More

Assess Your Core Provider's Service: Question 3 - Technology Support

Jan 13, 2021 10:23:42 AM / by IBT Apps posted in coreprocessing, cybersecurity, assessing your core provider

0 Comments

Continuing with question three of Assessing Your Core Provider's Service, we take a look at technology support. Your core provider may support you through the conversion, but do they provide maintenance post-conversion to make sure your system continues to run as it should? And what about your back-office technology? How is it being serviced? 

Read More

Assess Your Core Provider's Service: Question 2 - Cybersecurity

Jan 13, 2021 10:23:31 AM / by IBT Apps posted in coreprocessing, cybersecurity, assessing your core provider

0 Comments

Continuing with question two on Assessing Your Core Provider's Service, we take a look at cybersecurity, which continues to be a critical issue in the industry and is especially heightened during the pandemic. Your core provider needs to be doing everything possible to minimize your risk, so we have to ask:

Read More

Keep Your Bank Safe in This Cyber Age

Nov 14, 2019 10:29:39 AM / by Mike Korthuis, CIO, CTO posted in communitybanking, compliance, cybersecurity

0 Comments

Being in the financial services sector, we hear the term 'security' a lot.  We are required by regulators to have policies and practices in place to protect the data in which we are entrusted. The question we must ask ourselves is how we allocate the budget we have to defend ourselves against an adversary that has better resources and greater funds then we do.  The US government spends billions of dollars on security, and we hear stories of their data breaches on a regular basis. If scammers can breach even their highest security level, how do we do it with budgets that are a fraction of theirs? 

Read More