WE'VE GOT YOU COVERED!

The Prey Blog
Straight from our labs

The Current State of Handling Device Security in a BYOD system

by Matias Wolff February 14, 2017

There are many benefits for an institution that applies a BYOD system. Reduced costs, better use of the device’s capabilities, quick use and a shorter implementation. But letting users bring their own devices makes an IT department lose its iron grip of the security and data gathering department, since they won’t have control over it anymore, opening the doors for security breaches and lack of behavioral reports.

Read More

IT management: who’s first, the CIO or the CTO?

by Matias Wolff February 10, 2017

Depending on their size and structure, organizations have a Chief Information Officer (CIO) and a Chief Technology Officer (CTO) in charge of corporate software and IT management . But the difference between their roles raises many people’s eyebrows.
 
Company IT asset management has changed completely from what it looked like 5 years ago. Office work is more flexible. CEOs have implemented bring your own device (BYOD) environments, software as a service (SaaS) and cloud-based servers .

Read More

Top 5 Apps For Data and Device Protection

by Matias Wolff February 8, 2017

If you’re here it means you care about your devices, right? Security is your top priority and keeping your data safe is what you want to do to keep those pesky evildoers out of your sensitive information.

Read More

Phishing Attacks - How to improve your data security

by Matias Wolff February 3, 2017

Phishing is one of the oldest scams in the books, and with a success rate of 30%, no matter how well prepared you are and how many anti-malware software you have installed, it is you who will be the main culprit if you fall for this, putting your data security at risk.

Read More

Cyber Security Threats  IT Professionals in Education Face

by Matias Wolff February 1, 2017

If the Death Star's plans could be stolen by a bunch of young rebels, what about the strategic data of your educational institution? Is it safe enough?

Schools and universities are highly connected environments, every day there are hundreds, or even thousands, of students, academics and employees, walking around and using their laptops, tablets and smartphones, accessing institutional data every single minute.

Read More

Why Advanced Search in mobile security is a must-have

by Matias Wolff January 27, 2017

X-wings, B-wings, Y-wings, managing all these different kind of battle starships was not a piece of cake for the rebel alliance when they attacked the Death Star (twice!). In the same way, managing different sort of devices in a company is a challenging job because every unit has its own specifications and requirements.

Read More

Data security software: geofencing corporate leaks

by Matias Wolff January 25, 2017

IT asset management has changed. With corporate bring your own device (BYOD) practices, data security needs advanced anti theft security and enterprise mobility solutions such as geofencing technology, to add invisible layers of access restrictions based on location. 

Read More

Getting the most of your asset management with our new advanced search

by Matias Wolff January 23, 2017

Have you ever had trouble looking for a device among the hundreds you’re supposed to manage? Maybe you keep track of them using a notepad with all the serial numbers, or maybe you’re just able to recognize one just by looking at them, but hey, it can be done way easier, and we’re here to show you how to do It using the new features of the new Prey advanced search.

Read More

Device security: internal threats and how to solve them

by Matias Wolff January 19, 2017

“There is no patch for careless, greedy or stupid.”

This quote was recently said by Chuck Norris. No! Just kidding! It was the former FBI computer intrusion head Don Codling to Computer Weekly. He was talking about how companies of every size deals with computer security and internal threats and how -despite all the efforts that IT asset management do to avoid attacks, data breaches, and failures- businesses should always be prepared for the human factor.

Read More

10 books every IT Manager should read

by Matias Wolff January 16, 2017

Don't worry, I get it. Reading an actual physical book is so ten years ago. Today with the technology there could even be an app for VR where a mystical elf reads you the book while you rest on a stump. But there is something about them that really helps us understand the original vision of the authors, and there are great pieces for IT Management to learn from.

This is why we have compiled our list of the ten books an IT Manager should read, in no particular order, because rankings are for very organized people and popular YouTube channels.

Read More