More Banks Join Bankers Private Cloud® Service

Another Kansas bank recently joined the Bankers Private Cloud® service. While there are many great reasons for a bank to use BankOnIT's Bankers Private Cloud® service, one reason stood out to this bank in particular.

First National Bank in Girard, Kansas, joined to obtain services that were not available from other vendors.

October: National Cybersecurity Awareness Month

October is the 13th annual National Cybersecurity Awareness Month (NCSAM). Many organizations including the Department of Homeland Security, U.S. Department of State and many state banking associations are promoting awareness of this important subject.

“Cybersecurity Awareness Month is an opportunity for financial institutions to take stock of their level of understanding of cyber threats and their ability to respond to potential cyber attacks,” said Thomas J. Curry, FFIEC Chairman and Comptroller of the Currency.

Your Bank’s Board is Referenced 40 times in the FFIEC’s Newest Release

With regulators commenting over the past 24 months that information security is the biggest threat banks face today, more and more emphasis is being placed on the bank’s board of directors. Regulators expect the directors to effectively manage your bank’s technology risk, similarly to how the board manages credit, interest rate, liquidity and other risks your bank faces.

Your Newest Security Threat: Your Car

Did you know that you car’s infotainment system may be automatically downloading your mobile device’s data? The Federal Trade Commission (FTC) is warning consumers to be aware that personal information stored in a vehicle’s infotainment system can tell the next person all sorts of things about you.*

Colorado, Kansas and Missouri Banks Join Bankers Private Cloud®

More and more banks are joining BankOnIT’s Bankers Private Cloud® service.

Here is the reason why.

Banks are unique compared to the other businesses in their communities. Banks have requirements they must meet including having 100% uptime, maintaining a proven business continuity plan, upholding robust security and meeting the ever increasing regulatory requirements. All of these components must be met while also undergoing reoccurring audits and exams that test internal controls and a bank’s compliance with those regulations.

FRB, OCC and FDIC Are Preparing New Mandatory Cybersecurity Standards; FDIC Announces New IT Risk Examination Program Effective July 1

If your primary Federal regulator is the FDIC, your bank’s IT examinations will now be conducted using a new 60-page examination form that the FDIC has just released in its FIL-43-2016.* The FDIC’s new Information Technology Risk Examination (InTREx) Program is designed for examiners to fill out electronically and is effective July 1, 2016.

Using Technology to Outperform Your Peers: Higher earnings & improved efficiency

Do you see your bank’s technology as a “negative”— something that creates a drag on earnings and eats up management’s time in dealing with constantly occurring issues? Instead, what if your bank’s technology could be a source of strength, helping your bank to achieve its strategic objectives while at the same time reducing risk, reducing regulatory burden, adding capabilities and allowing management to spend more time on other, more important goals?

Adams Dairy Bank is Newest Bankers Private Cloud® Client

Adams Dairy Bank in Blue Springs, Missouri, has joined BankOnIT as the firm’s latest Bankers Private Cloud® client.

“We’ve partnered with BankOnIT to ensure that we spend our time focused on our clients and our community, not managing IT,” David Charles Chinnery, President & CEO of Adams Dairy Bank, said when asked why he chose BankOnIT as his bank’s IT provider. “Banks are measured by how well they execute,” Chinnery added.

FBI Warns Attacks are Increasing

The FBI announced that it’s seen a dramatic rise in ransomware. These attacks entice users to open an email attachment or click on a link that downloads malware that “locks-up” or encrypts data on a computer, shared files or files on a server that’s accessible from the computer. The attacker then demands payment to unlock the data or provide the decryption key. These infections can be devastating and recovery can be a difficult and timely process.