Cyber Security
Security 101

Mobile Security With Real Consequences: How Secure Should President Trump’s Phone Be?

Every phone is a potential open door for hackers to steal information. If the President of the United States doesn’t prefer the secure lines -and risk revealing confidential information to spies- that doesn’t mean you should too, especially if you handle key assets for your organization.

by Norman Gutiérrez

posted Feb 21 2020
What's New

The Device Loan Manager is Here! | Feature Release

This week a new user-requested tool sees the day of light, the Loan tool. Manage your computer loans through Prey and assign user, return dates, and counter-measures to protect the device in case of a late return.

by Nicolas Poggi

posted Feb 20 2020
Cyber Security
Introduction to Cybersecurity

What Are Cyber Threats and What to Do About Them

From infiltrations on infrastructure and data breaches to spear phishing and brute force. Online threats are varied and they don’t discriminate organizations from individuals when looking for a target.

by Hugh Taylor

posted Jan 22 2020
Cyber Security

Utilizing Zero Trust Security to Create New Layers of Network Protection

What is Zero Trust security? In a nutshell, it is a way of approaching all types of digital and physical security, in which there are no preferences, no white-lists, and no trusted actors. All actors, both internal and external, are treated as possible threats and ‘blocked’ by default, applying the same high security protocols, access controls, and barriers for everyone.

by Hugh Taylor

posted Nov 29 2019

Understanding the Student Privacy Problem

The breach of a student’s data privacy is not a recent concern, but one that is only now starting to gain attention due to the consequences of a public lack of concern. It is time to understand this issue, and treat it

by Nicolas Poggi

posted Oct 10 2019