Latest

Posts

Cyber Security

What is Endpoint Security?

The question “What is Endpoint Security?” seems innocent enough, but answering it triggers a few complex conversations. These span hardware and software, network architecture, network security and more. This article…

by Hugh Taylor

posted Apr 22 2020
Cyber Security

24 Cybersecurity Statistics That Matter In 2020

The cyber-threat scene is ever-changing. Stay up to date with this year’s malicious trends to ensure your business’ infrastructure isn’t caught off guard.

by Nicolas Poggi

posted Apr 22 2020
Cyber Security
Hacking Protection 101

Have I Been Hacked? Find Out and Protect Yourself

It seems like everyone is getting hacked these days. You may be feeling left out if you haven’t been! The reality is that you have likely been hacked in some…

by Hugh Taylor

posted Apr 21 2020
Remote Work

How to Work From Home Without Becoming a Security Risk

It is key that remote workers separate their work/personal digital environments, and take protective measures to avoid an attack results in a chaotic domino effect that puts company and personal data at risk.

by Nicolas Poggi

posted Apr 16 2020
Releases
What's New

Unattended Installer for Windows | Feature Release

The new remote installation link method comes to help remote device managers deploy Prey faster, and more effectively in fleets without prior preparation.

by Nicolas Poggi

posted Apr 16 2020
Cyber Security
Hacking Protection 101

How to Tell If Your Computer Has Been Hacked

Hacking, most of the times, isn’t personal. Hackers carry out massive campaigns and you might just be unlucky! Learn how to detect it, and how to react.

by Hugh Taylor

posted Mar 29 2020
Cyber Security
Security 101

The Evolution of Mobile Theft & Loss | MTLR 2020

The second edition of our theft and loss statistics report brings new insights on where mobile devices are stolen the most, and who is responsible for it.

by Nicolas Poggi

posted Mar 13 2020