Stories by Jeff Vance

In pictures: 20 top Android and iOS productivity apps for 2014

Now that the holidays are over, reality has set in and you probably have a resolution or two to live up to. If any of your resolutions are along the lines of "be more efficient at work" or "find ways to boost productivity," you're in luck. These apps will help you meet and even exceed your work-related resolutions in 2014.

10 Cloud Security Startups to Watch in 2014

The market for cloud security tools is expected to grow significantly in the coming year. Here are 10 cloud security startups that could help boost cloud adoption in 2014 and beyond.

25 must-have technologies for SMBs

Running a small business isn't easy. I know. I run one. As a freelance writer, I’ve learned that you need to run your writing career as if you were running a business.

Free mobile apps put your BYOD strategies at risk

When CIOs worry about the Bring Your Own Device (BYOD) trend, one of the things that most concerns them is their lack of control over mobile apps. Rogue apps packing malware are a major concern, but many malware-free apps pose risks too.

Will tech industry ever fix passwords?

After the recent security breach that hit professional social networking site LinkedIn, social media companies are scrambling to patch over their poor security practices. Wait too long to address known security holes, and CIOs should worry about seeing their companies targeted, hacked and eventually vilified in the press.

7 steps to social media stardom

Social media is taking up more and more of our time, both at home and work. Many enterprises have even started to treat social media tools as mission-critical, meaning that if you don't start mastering them, your lack of knowledge could impede your career.

What you really need to know about Cloud security

Despite all of the hand wringing over cloud security, major Cloud security breaches haven't been grabbing headlines. The past year has seen major breaches, such as the ones that hit Sony and Epsilon, but we haven't heard much of an emphasis about the Cloud being a weakness.

How to make Android faster, more productive and more secure than iPhone

IPhone users love to brag about their phones. They line up around the block and stand in line for hours when a new one is released. Yet, for many users, Android is clearly the superior platform. Yes, its Achilles' heel is a big one: security. Android's openness and large market share mean that it's a juicy target for attackers.

Warning: you may be an e-hoarder

Hoarding shows are popular these days. Hoarders, Hoarding: Buried Alive, Confessions: Animal Hoarding and on and on. The images are consistent: Boxes stacked to the ceilings. Piles of newspapers dating back to the Nixon era. Feral cats skittering behind furniture. Empty cans of cat food, beans and soup scattered everywhere.

Analysis: the future of malware

Personal information belonging to a full third of Massachusetts residents has been compromised in one way or another, according to the state's attorney general, citing statistics gleaned from a tough new data breach reporting law.

[]