Author: Tim Schmidt

Two-Step Verification (2SV)

A majority of sites and applications typically require the use of a username, as an identifier, and a password, as a primary authentication method. Depending on assessed risks and the sensitivity of data accessed through the login form, a more secure login posture may be required. A MultiKey authentication system provides the opportunity to configure…
Read more


April 12, 2021 0

The New IoT

Is this the major technology trend of the decade? The International Computer Electronics Show (CES) just finished up last week in Las Vegas. There where over 3,900 exhibitors showing off their latest and greatest products and services. There were more than 170,000 attendees. CES is the largest annual tradeshow focusing on technology held each year.…
Read more


January 20, 2020 0

Could Security Tokens Be Bigger than Bitcoin?

Bitcoin is the world’s most recognizable encrypted, digital cryptocurrency coin; however, Bitcoin is just one of over 4,000 different types.  The top five largest, by market cap, are: Bitcoin (BTC), Ethereum (ETH), Ripple (XRP), Bitcoin Cash (BCH) and Cardano (ADA). Combined, these five are currently worth $250 Billion USD. Bitcoin makes up over half of…
Read more


September 30, 2019 0

Information Security

In today’s digital world, we see a great deal of news focused on cybersecurity, malware, phishing, viruses, and other topics related to online attacks.  There have been many publicized data breaches in the news over the last few years impacting large companies, including: Target, Sony, Equifax, JP Morgan.  You may be thinking, am I safe…
Read more


April 29, 2019 0

Front Office vs. Back Office

The terms front office and back office stem from the distinction – customer facing and support.  The front office is typically everything that is customer facing and generating revenue – the revenue or profit centers.  The back office is generally everything that is not customer facing, a cost center or an area of the bank…
Read more


March 1, 2019 0

Suspicious Packages

Within the last decade, there has been an uptick of incidents where police are called to evaluate a “suspicious package”. Inevitably, the bomb squad is called in and at times the item is destroyed or blown up in a controlled manner to neutralize the threat. No chances are taken and safety is not compromised on…
Read more


November 20, 2018 0

New IDS On-Time Processing Center Opening

Automated Systems, Inc.  and Insite Data Services are pleased to announce the opening of the new IDS On-Time Bank Services processing office within the ASI headquarters facility and the hiring of new staff to accommodate demand.  This newly constructed space provides greater capacity to support the growing demand from community banks for full service solutions.…
Read more


July 6, 2017 0

Securing Your Password

When it comes to passwords, most people don’t realize that hackers have many different methods they use to crack your codes. According to McAfee.com, there are 5 different ways that hackers can acquire your information including: Dictionary attacks Cracking security questions Simple passwords Reuse of password across multiple sites Social engineering This blog post reflects on simple…
Read more


April 27, 2017 0

Customer Security Awareness

Internet security is not just about protecting your business, but also sharing a commitment of utilizing “best practices” with those you work with and your customers to help mitigate and eliminate the viral component of most online threats. Throughout this you will read many tips and suggestions about security. While nothing can ever provide 100%…
Read more


August 12, 2016 0

IDS Announces Major Data Center Upgrade

Lincoln, NE — June 20, 2016 – Insite Data Services™ (IDS) today announced a major expansion to its data center infrastructure with a series of new storage, server and data protection solutions. This technology refresh; which powers Insite Data Services’ hosted banking solutions, will improve user experiences and allow them to better support their growing…
Read more


June 24, 2016 0