The Prey Blog
Straight from our labs

Data security software: geofencing corporate leaks

by Matias Wolff January 25, 2017

IT asset management has changed. With corporate bring your own device (BYOD) practices, data security needs advanced anti theft security and enterprise mobility solutions such as geofencing technology, to add invisible layers of access restrictions based on location. 

Read More

Getting the most of your asset management with our new advanced search

by Matias Wolff January 23, 2017

Have you ever had trouble looking for a device among the hundreds you’re supposed to manage? Maybe you keep track of them using a notepad with all the serial numbers, or maybe you’re just able to recognize one just by looking at them, but hey, it can be done way easier, and we’re here to show you how to do It using the new features of the new Prey advanced search.

Read More

Device security: internal threats and how to solve them

by Matias Wolff January 19, 2017

“There is no patch for careless, greedy or stupid.”

This quote was recently said by Chuck Norris. No! Just kidding! It was the former FBI computer intrusion head Don Codling to Computer Weekly. He was talking about how companies of every size deals with computer security and internal threats and how -despite all the efforts that IT asset management do to avoid attacks, data breaches, and failures- businesses should always be prepared for the human factor.

Read More

10 books every IT Manager should read

by Matias Wolff January 16, 2017

Don't worry, I get it. Reading an actual physical book is so ten years ago. Today with the technology there could even be an app for VR where a mystical elf reads you the book while you rest on a stump. But there is something about them that really helps us understand the original vision of the authors, and there are great pieces for IT Management to learn from.

This is why we have compiled our list of the ten books an IT Manager should read, in no particular order, because rankings are for very organized people and popular YouTube channels.

Read More

Worst data security breaches of 2016

by Matias Wolff January 13, 2017

2016 was a busy year for our arch-nemesis, The Hackers. Data security and theft recovery is a serious issue. Sometimes people and companies take it for granted.

Read More

5 great Chrome extensions for IT Managers

by Matias Wolff January 10, 2017

Chrome is the world’s most used web browser, and whether you like it or not, 73% of Internet users have it as their preferred option, and this number keeps increasing each month.

Read More

5 useful Slack integrations and bots

by Matias Wolff January 7, 2017

Remember when chat rooms were huge in the early 00s? Slack takes this concept and turns it into a very useful tool for teams, which can be improved upon using the numerous Apps and integration options available to this highly customizable experience.

IT Professionals can truly take advantage of this tool, which they’re probably already using, by adding the ones that fit their and their organization’s needs. We’ve compiled a list of five options that are bound to be useful if used properly.

Read More

5 Great Events and Keynotes for IT Managers this 2017

by Matias Wolff January 5, 2017

Being an IT Professional has its ups and downs, and one of the main perks of being one is that you must always be informed of how your own area of work is growing and evolving. This is something that progresses along with you, and there is so much room to be explored, and because of this it is almost mandatory for a good IT Manager to be up to date on the latest trends.

Read More

Corporate device security: Main threats that are lurking the industry

by Matias Wolff December 26, 2016

Are you ready to pay a ransom for your own personal data? You better have your digital weapons prepared, because cyber attacks of this kind  against mobile device security are rapidly growing. The 2016 Internet Security Threat Report, developed by Symantec, stands that ransomware has increased 35% in the last year, and now it isn’t only attacking PCs but also smartphones, Mac and Linux systems.

Read More

How to make device security in educational institutions unbreakable

by Matias Wolff December 21, 2016

Nearly 97% of U.S. college students have a cellphone, and 79% own a laptop. That’s a lot, right? Problem is that both devices are a very attractive loot for campus thieves - 4.5 million smartphones were lost or stolen in the United States in 2013 - and who’s responsible for computer security in educational institutions? Yeah, you, the IT avenger.

Read More