All posts by Ron Miller

Ron Miller is a freelance technology reporter and blogger. He is contributing editor at EContent Magazine and enterprise reporter at TechCrunch.

Single sign-on can simplify life for your employees

Single sign-on can simplify life for your employees

As you company collects cloud services, it can be a pain tracking logins. A good way to get around that problem is providing your users with a single sign-on. This is a delightful concept that gives your users a single...

/ September 21, 2018
Two-factor authentication can solve the worst password problems

Two-factor authentication can solve the worst password problems

Small to medium-sized businesses often struggle with identity management because they lack the resources of big companies to implement enterprise solutions, but something as simple as two-factor authentication can help keep your company secure. Two-factor authentication simply means that after...

/ September 14, 2018
Today’s hackers are definitely not your father’s hackers

Today’s hackers are definitely not your father’s hackers

There was once a hacker stereotype — the prototype was a pimply-faced teenage boy living in his parent’s basement in some nondescript suburb. His end goal was proving he could get into your network and show off his bonafides to...

/ September 4, 2018 / 2 Comments
Foreshadow vulnerability
When the vulnerabilities hit your CPU, you can only wait for patches

When the vulnerabilities hit your CPU, you can only wait for patches

Just when you thought it was safe to open up your computer, word emerged this month of another Intel chip vulnerability called L1TF / Foreshadow or more commonly just Foreshadow. According to TechRepublic, it’s eerily similar to the Spectre/Meltdown issues discovered...

/ August 27, 2018
fax security
When it comes to security, even your fax machine could be vulnerable

When it comes to security, even your fax machine could be vulnerable

The fax machine, that ancient document-transmission tool, is still in use in many offices. You would think that technology that was invented in the 19th century, and popularized in offices in the 1980s, would be fairly safe when it comes...

/ August 14, 2018
Cloud 5: A cloud history and what’s coming next

Cloud 5: A cloud history and what’s coming next

Welcome to the final Cloud 5, our weekly feature where we scour the web searching for the five most intriguing and poignant cloud links we can find. Before we jump into this week’s links, please have a look at one...

/ July 27, 2018
Lessons from the Amazon Prime Day fiasco

Lessons from the Amazon Prime Day fiasco

Earlier this month, Amazon held its annual Prime Day. It’s a day when thousands of Amazon Prime customers come together on the Amazon website to pick through the hundreds of bargains being offered by the shopping site. It’s supposed to...

/ July 26, 2018 / 1 Comment
How Google neutralized phishing attacks and what you can learn from them

How Google neutralized phishing attacks and what you can learn from them

Google announced a remarkable achievement this week — not one of its 85,000 employees has been the victim of a phishing attack since the beginning of 2017. Phishing refers to when a hacker sends an email that looks authentic for...

/ July 24, 2018
Cloud 5: Amazon Prime Day fiasco, Walmart cozies up with Microsoft

Cloud 5: Amazon Prime Day fiasco, Walmart cozies up with Microsoft

Welcome to The Cloud 5, our weekly feature where we scour the web searching for the five most intriguing and poignant cloud links we can find. Before we jump into this week’s links, please have a look at one of...

/ July 20, 2018
Cloud 5: 5G cloud impact, Amazon’s custom chip strategy

Cloud 5: 5G cloud impact, Amazon’s custom chip strategy

Welcome to The Cloud 5, our weekly feature where we scour the web searching for the five most intriguing and poignant cloud links we can find. And without further delay, here we go with this week’s links:

/ July 13, 2018