Geofencing technology is a recurring subject in our blog because it’s so useful and flexible.
The Boss, Bruce Springsteen, said it best in his 1992 hit “Human Touch”: In a world without pity, do you think I'm asking too much? I just want something to hold on to, and a little of that human touch.
I think of this song whenever I need Customer Support. As I listen to endless recordings, fill out never-ending forms, and wade through useless user forums, my frustration levels go waaaay up. To the point I just want to ask:
CBS 5 ran a story on how Prey helps recover lost devices and how all its features work, along with one of our many success stories by not only talking with an user who recovered his notebook, but also showing how Prey works in real time.
I hate to ask this, but, did you lose one of your iOS devices and forgot to install a security software with tracking?
Don’t worry, there are still some options that can help you recover an iPhone, iPad, or iPod without having proper security software. We hope that next time you’re way more prepared with an app like Prey ;).
It's likely that, on more than one occasion, you’ve entered a website only to discover that it's down for unspecified reasons. Soon enough, you come to know that the service was the target of an attack, and it had to shut down for a while. Hacking is usually the first conclusion, but actually, it could have been something far more subtle and direct than that. We are talking about a DDoS attack, one of -if not the most common type of attacks today, which cost millions every year to institutions.
Has your mobile device gone missing and you forgot to install a security software to track it? Don’t worry, there are solutions to recover it, be it a tablet or a cellphone, that we’ll show you in this post. Although we truly hope next time you don’t forget to install a security software app like Prey ;).
The past World Mobile Congress showcased many new things. We would have loved to be there! Thanks to the Internet we can meet the latest products that companies presented during this event aimed at the
Just as some things caught the eye of everybody, there were some lesser known models that worked as an experiment of things to come and trends that might be getting just a little bit too extreme.
A cyber attack is something no institution wants to be part of, but the chances of being affected by one never stop being a possibility, no matter how much you have spent on data security in your company, so being prepared is a priority. But, what happens once you’ve being targeted by an attack or are already affected? The costs involved in the process are so high that a new plan of action is needed, and there is one option taken straight from our daily life.
In this modern age, a higher education establishment isn’t just a place for books, encyclopedias and large places for studying, but instead, a big part of their information and resources are stored in computers, servers and workstations, making the handling of these assets one of the biggest roles of the device manager.
Being an IT professional has its perks. One thing that some might agree on is that when you work in IT you’re just sitting. A lot. Doing nothing but being worried with your asset management in front of a computer. But even if your hands and eyes are busy coding or preparing a workflow, your ears are still clear. You can use them to expand professionally, have fun and learn new things while you work.