About Us | Contact Us
View Cart

Management Talking Points for Mobile Banking

By Dan Hadaway | Monday, June 7, 2010 - 2 Comments

Consider forwarding this to your management team!

As promised, I’m posting material that some of you already have (if you attended the Mega Conference). Because most smaller community-based banks are slow to adopt Mobile Banking, the following talking points could be shared with your management team to help them get on the same page about some facts related to the adoption of this technology.  This is a result of my research I conducted to “reduce new bank technology trends to the three most important.”

Management Team Talking Points for Mobile Banking:

Why we must develop a plan immediately:

  • Smartphones are the ultimate extension of the ongoing megatrend called “convergence.”  Provisioning for growth in smartphones is our most important, urgent technology planning job.  We must have a plan by the end of this quarter.
  • In June, 2007 Apple introduced the iPhone.  Three years later smartphones are the #1 technology trend across all industries.  Smartphones comprise 20% of all mobile phones today.  This penetration was predicted (in December 2009) by Apple Computers to reach 50% in three years, and is already outpacing that prediction.
  • In two years, smartphones will be the #1 device used to “browse” the Internet.  Currently, the average cell phone user spends 80% of the time making and receiving calls.  Currently, the average smartphone user spends 80% of the time using “web apps.”
  • Forty percent (40%) of business owners are currently using smartphones.  RIGHT NOW, our commercial accounts are wondering what’s wrong with our mobile banking approach.
  • We HAVE to be early adopters, rather than early majority adopters, of this technology.

Considerations for Mobile Banking Deployment:

  • The reason mobile banking is so much in demand is because it addresses Information Overload.  The average American currently processes 100,000 words per day.  The way to tackle Information Overload is to provide specific, meaningful information.  Mobile banking, if implemented properly, achieves meaning.
  • Mobile banking involves the use of “middleware” . . . . an application that is downloaded to your customer’s smartphone that communicates with more sophisticated software hosted by the mobile banking provider then integrates with the bank’s information system.  The applications currently available offer threshold alerting, balance checking, even billpay and other more sophisticated services.
  • Authentication is an important feature of mobile banking to investigate.  Smartphone users will not key in a password . . . . but there are other means of authentication including pattern and voice recognition methods.
  • Usability is a hallmark feature of successful smartphone applications.  The iPhone has 185,000 apps, all customizable to the user’s specific needs.  The iPhone has a 150+ page user manual that has never been read.  It’s easy to use . . . the phone is smart so the user doesn’t have to be.
  • There is VERY LITTLE tolerance in the Smartphone Apps world for getting things wrong.  The cost of a second chance is far more expensive than the cost of doing it right the first time.   We will be paying more than we would have to if we wait, but it will be worth it because:
    • Enrollment is key.  We must enroll our users before somebody else does.
    • When selecting a mobile banking provider, we should first determine who the dominant wireless carrier is in our market, and then determine which smartphone they are peddling.  Then we must find solutions that are designed for that particular smartphone.
    • See mega2010.infotex.com for list of mobile banking providers.

Let us know if you have additional information, thoughts, links,
or disagreements.   Simply comment on this article.

We will keep your comment private unless you give us permission to post it on the blog.


This has been a Dan’s New Leaf posting . . . . a weekly post about whatever happens to be on Dan’s mind at the time, related of course to IT Governance in banking.


2 Responses to “Management Talking Points for Mobile Banking”

Comment from Ali
Time 01/15/2015 at 1:42 am

The points are relevant and well thought out but lot of water has passed under the bridge since it was published. It needs to be updated.

Comment from Dan Hadaway
Time 02/26/2015 at 8:57 am

Good point. I’m adding it to my article list! (Sorry for the late reply . . . . too busy writing, I guess!)

Latest News
    PRESS RELEASE – FOR IMMEDIATE RELEASE SERVICE NEWS Dateline: Dayton, IN, June 22, 2022 We are proud to announce that infotex will now be supporting Endpoint Detection and Response (XDR/MDR)! We can manage/monitor solutions you already have or offer one as part of our service while still maintaining a segregated response posture. In recent years […]
    Over 85 percent of surveyed companies report having no  centralized monitoring of networked industrial devices… An article review. If you are involved in IT within your organization, you’re probably aware of the importance of being able to monitor relevant activity from your networked devices, especially if your organization is involved in healthcare, finance, or government.  […]
    Another awareness poster for YOUR customers (and users).  Now that we have our own employees aware, maybe it’s time to start posting content for our customers! Check out posters.infotex.com for the whole collection! Download the large versions here: Awareness Poster (Portrait) Awareness Poster (Landscape)   You are welcome to print out and distribute this around […]
    We always strive to bring you the best content that we possibly can. Your opinion on any content, presentation, service, or anything else you have received from us is important! Please click the button below to let us know how we are doing!  
    What to Expect in an Annual Information Security Report to the Board Webinar-Movie Information security ranks as a top risk to financial institutions, both in terms of likelihood and overall impact. It is important that boards receive annual comprehensive reporting from management about the information security risks and incidents, and the actions taken to address […]
    The Five Precepts of IT Vendor Management Webinar-Movie We’re going back to basics on Vendor Management. This webinar will give you a training tool to help out that new person that is starting to take on the gargantuan task that is Vendor Management.
    Another awareness poster for YOUR customers (and users).  Now that we have our own employees aware, maybe it’s time to start posting content for our customers! Check out posters.infotex.com for the whole collection! Download the large versions here: Awareness Poster (Portrait) Awareness Poster (Landscape)   You are welcome to print out and distribute this around […]
    The joint cybersecurity advisory includes the 15 most exploited vulnerabilities reported in 2021… An article review.  While a lot of attention is focused on previously undisclosed or “zero day” attacks, some of the most likely attack vectors are vulnerabilities that have been widely known for weeks or even months.  That’s according to a new joint […]
    Threats are changing, EDR can help us adapt . . . Today’s advanced persistent threat (APT) understands that the IT landscape has changed. In the post-COVID age, more and more organizations have adopted some form of work from home.  While WFH offers many conveniences, it also imparts increased risks. BitSight conducted a 2021 study of […]
    A new way of helping people “read” new guidance… Look for more in the future! To save you time, we are proud to present “Adam Reads” . . . recorded versions of our Guidance Summaries! Below you can find an embedded player for the audio file. If you are having issues with that working, you […]