WE'VE GOT YOU COVERED!

The Prey Blog
Straight from our labs

Fog computing or edge computing: I ain't afraid of no technology

by Matias Wolff June 15, 2017

Fog Computing or Edge Computing is so much more than the latest "hip term" in Silicon Valley.
 
It has nothing to do with misty graveyards or horror movies. It does have everything to do with the current and future viability of the Internet of Things (IoT).

Read More

3 Key Internet of Things trends to keep your eye on in 2017

by Matias Wolff June 9, 2017

If the Internet of Things (IoT) doesn't prove the future is now, nothing does.
 
 
For now the industrial sector leads the development of IoT solutions. Many promising use cases in business are coming to light.

Read More

Geofencing: 7 commercial and industrial use cases

by Matias Wolff June 1, 2017

Geofencing technology is a recurring subject in our blog because it’s so useful and flexible.

So far we have put greater focus on managing geofenced devices . But some commercial and industrial applications offer benefits beyond data and hardware security.

Read More

Customer Support should listen to The Boss and keep that human touch

by Fabián Núñez May 8, 2017

The Boss, Bruce Springsteen, said it best in his 1992 hit “Human Touch”: In a world without pity, do you think I'm asking too much? I just want something to hold on to, and a little of that human touch.

I think of this song whenever I need Customer Support. As I listen to endless recordings, fill out never-ending forms, and wade through useless user forums, my frustration levels go waaaay up. To the point I just want to ask:

Read More

Track your device, and snap the Prey ;-)

by Matias Wolff April 28, 2017

CBS 5 ran a story on how Prey helps recover lost devices and how all its features work, along with one of our many success stories by not only talking with an user who recovered his notebook, but also showing how Prey works in real time.

Read More

Security software: how to track your devices on iOS without it

by Matias Wolff April 10, 2017

I hate to ask this, but, did you lose one of your iOS devices and forgot to install a security software with tracking?

Don’t worry, there are still some options that can help you recover an iPhone, iPad, or iPod without having proper security software. We hope that next time you’re way more prepared with an app like Prey ;).

Read More

Data Security: what are DDoS attacks and how do they affect it?

by Matias Wolff April 6, 2017

It's likely that, on more than one occasion, you’ve entered a website only to discover that it's down for unspecified reasons. Soon enough, you come to know that the service was the target of an attack, and it had to shut down for a while. Hacking is usually the first conclusion, but actually, it could have been something far more subtle and direct than that. We are talking about a DDoS attack, one of -if not the most common type of attacks today, which cost millions every year to institutions.

Read More

How to track your Android devices without tracking software installed

by Matias Wolff April 3, 2017

Has your mobile device gone missing and you forgot to install a security software to track it? Don’t worry, there are solutions to recover it, be it a tablet or a cellphone, that we’ll show you in this post. Although we truly hope next time you don’t forget to install a security software app like Prey ;).

Read More

The oddities presented during the World Mobile Congress 2017

by Matias Wolff March 31, 2017

The past World Mobile Congress showcased many new things. We would have loved to be there! Thanks to the Internet we can meet the latest products that companies presented during this event aimed at the  specialized press and IT experts from all over the world. We got to know the weirdest and most interesting novelties of the convention. 

Just as some things caught the eye of everybody, there were some lesser known models that worked as an experiment of things to come and trends that might be getting just a little bit too extreme.

Read More

Cyber Liability Insurance: Is it really necessary for data security?

by Matias Wolff March 29, 2017

A cyber attack is something no institution wants to be part of, but the chances of being affected by one never stop being a possibility, no matter how much you have spent on data security in your company, so being prepared is a priority. But, what happens once you’ve being targeted by an attack or are already affected? The costs involved in the process are so high that a new plan of action is needed, and there is one option taken straight from our daily life.

Read More