• 01/02
    Cyber Security

    Mobile Security With Real Consequences: How Secure Should President Trump’s Phone Be?

    Every phone is a potential open door for hackers to steal information. If the President of the United States doesn’t prefer the secure lines -and risk revealing confidential information to spies- that doesn’t mean you should too, specially if you handle key assets for your organization.

    Continue Reading
  • 02/02
    Releases
    What's New

    The Device Loan Manager is Here! | Feature Release

    This week a new user-requested tool sees the day of light, the Loan tool. Manage your computer loans through Prey and assign user, return dates, and counter-measures to protect the device in case of a late return.

    Continue Reading
The Essentials to Cybersecurity eBook
The Essentials to Cybersecurity eBook

Kickstart your IT cybersecurity strategy with this crash course!

Free Download
Know Key Data Protection Laws and How to Comply With Them
Know Key Data Protection Laws and How to Comply With Them

1 Week email course, no charge.

Get Email Course