Stories by Jen A. Miller

The real cost of unused software will shock you

A new study shows that, on average, each computer in every office around the world has about $259 of unnecessary, unwanted or unused software on it. That’s a lot of shelfware – and it’s costing companies big-time.

Written by Jen A. Miller20 Jan. 16 23:15

The year in fraud: 2015 in 13 numbers

It's that time of year: Round ups, hot takes and eulogies for the year abound. We're no different, but we're going to tell the story of 2015 a little differently -- though numbers. Ten of them to be exact. In no particular order, here's how hackers and scammers and the many security flaws they found got us on edge for this year … and the next.

Written by Jen A. Miller16 Dec. 15 15:16

Are fake online reviews crushing consumer confidence?

While a certain percentage of them are almost certainly suspect, customer-driven online ratings and reviews are just too powerful to simply ignore. But does anyone really trust them?

Written by Jen A. Miller30 Nov. 15 15:18

Welcome to the Internet of stupid (hackable) things

The rise of IoT technology brings with it the promise of innovation the likes of which we’ve never seen. But the reality of everything being connected can have unintended consequences, not all of them useful.

Written by Jen A. Miller27 Nov. 15 15:00

How to recognize an online fraudster

The capability to profile potential cybercriminals, along with the implementation of chip-and-pin credit cards, may produce a reduction in the amount of money lost to online fraud each year. But that doesn’t mean the threat will go away entirely.

Written by Jen A. Miller11 Nov. 15 16:40

Malvertising – the new silent killer?

Malicious ads on the websites you visit aren’t a new phenomenon. The fact that they now avoid detection and don’t need you to click on ‘em to infect your computer is new, and increasingly troublesome.

Written by Jen A. Miller21 Oct. 15 16:01

Mobile device management has become alphabet soup

The BYOD movement, once looked on as the holy grail of employee satisfaction and IT mobile device security, is increasingly being supplanted by a number of options – such as COBO, CYOD, COPE – that draw a thicker line between personal and business uses.

Written by Jen A. Miller01 Oct. 15 14:45

Is a lack of enterprise apps killing BYOD?

Bring-your-own-device policies in the workplace often pit employee satisfaction and privacy against corporate security. And as the number of employees and companies participating in BYOD programs continues to fall, can enterprise apps be the linchpin of BYOD success in the workplace?

Written by Jen A. Miller23 Sept. 15 15:14

Four new cybercrime trends threaten your business

A mid-year report shows that people aren’t necessarily getting smarter about security, even in the face of increased attacks from cybercriminals.

Written by Jen A. Miller07 Sept. 15 15:00

BYOD – the tech revolution that wasn’t

Once upon a time, BYOD and the consumerization of IT was held up as a paragon of productivity and cost savings for enterprises that embraced the concept. Now? Not so much… What happened?

Written by Jen A. Miller20 Aug. 15 14:59
[]