WE'VE GOT YOU COVERED!

The Prey Blog
Straight from our labs

5 great Chrome extensions for IT Managers

by Toncy Dunlop January 10, 2017

Chrome is the world’s most used web browser, and whether you like it or not, 73% of Internet users have it as their preferred option, and this number keeps increasing each month.

Read More

5 useful Slack integrations and apps for an IT Manager

by Toncy Dunlop January 7, 2017

Remember when chat rooms were huge in the early 00s? Slack takes this concept and turns it into a very useful tool for teams, which can be improved upon using the numerous Apps and integration options available to this highly customizable experience.

IT Professionals can truly take advantage of this tool, which they’re probably already using, by adding the ones that fit their and their organization’s needs. We’ve compiled a list of five options that are bound to be useful if used properly.

Read More

Data recovery software: what to do before wiping it all out

by Toncy Dunlop December 6, 2016

Anti theft security is not just about protecting your laptop or mobile phone, but the sensitive information that they store. As a CEO or CIO, you're not only concerned about mobile tracking devices. The value of a security software also lies in protecting your data. The cost of your device is nothing, but data recovery is everything. The fruit of your company’s labor is priceless and precious…

Read More

Why Is Prey Difficult to Uninstall on Android?

by Toncy Dunlop September 2, 2015

Don't you hate when it you download an app that's not what you expected? Even worse: what if you can't even remove it from your phone or tablet? We get it, because we hate that too  ¯\_(ツ)_/¯

Read More

If Your Device Was Stolen, Go to the Police (and Other Friendly Advice)

by Toncy Dunlop July 1, 2015

We’ve been recently hearing a lot about the potential dangers of using a tracking app to locate a stolen phone, tablet or laptop and going straight to the thief’s lair to retrieve it all by yourself.

Read More

Doing Customer Support Right: The Prey Way

by Fabián Núñez June 20, 2015

Unexpectedly good support. You put big companies to shame.
— David, United States.

You probably know Prey as a world-class anti-theft application that helps you track and recover your lost or stolen electronic devices. That's our product, after all, so you'd be 100% right. What you probably don't know about us is how satisfied our customers are that they chose Prey as their security solution, and how we do to make them so. Here's the first of several blog entries telling about our company's inner workings: How we nailed customer satisfaction making it one of our core values.

Read More

5 Tips to Boost Your Anti-Theft Protection With Prey

by Toncy Dunlop June 3, 2015

We know that sinking feeling of desperation that comes with losing a smartphone or a laptop - it’s not just about the money, it’s about so much more.

Read More

The new Prey for Android allows you to wipe your stolen device

by Fabián Núñez December 5, 2013

Pro Users: Did you lose your company's device, with all your customers' data on it? Don't worry. The latest version of Prey for Android now can wipe your device clean, in case you need to protect that sensitive information. Just a click on your Prey account will effectively reset the device to factory defaults, securing your company's secrets.

Read More

Tip: Enabling a guest account on Windows & Mac OS X

by Patricia Laurié May 29, 2013

We're going to show you how to enable guest accounts on Windows and Mac OS X so that you can protect your devices from identity theft, or from it just getting stolen.

If your laptop is ever stolen, there's a very high chance the guy will turn it on and try to use it, either to see if there's anything of interest to him, or maybe just to surf the good 'ol internets for a while -- which is when Prey is meant to kick in.

But what happens if your computer is password protected and he's unable to?

Even though Prey works even if no user is logged in, it's hard to imagine someone staring at the login box for more than a minute, after trying the usual "123456" and "password" combinations.

In other words, chances of recovery are drastically reduced when there's no way for these guys to use your computer, at least for a while.

That's why creating a dummy guest account is so important for Prey to work its magic. Guest accounts have been woefully overlooked as merely an account for guests, but as you see, having one is a pretty good idea, just as protecting your documents with an account password.

Plus, if someone logs into a guest account in your lappy, he or she won't be able to mess with your stuff or remove applications, because guest accounts are unprivileged and restricted to a tiny sandbox.

Here's how to achieve it.

Read More

Prey Labs: How to avoid buying a stolen laptop

by Patricia Laurié April 18, 2013

According to our database, about 20% of Prey's recovered devices were found in the hands of people who had bought them online. The most frequent sites used for these activities turned out to be EBay and Craigslist. It is important to emphasize that none of these sites condone the trading of stolen devices, and because of this reason, they have implemented their own rules and regulations to put an end to the commercialization of misappropriated electronics. Nevertheless, thieves still manage to bypass them, leaving users at their mercy.

We don't want you to become one of the victims and we are sure you don't want that either. So, we have gathered an assortment of advice for you to take into account when buying used devices from online classifieds.


Read More