There’s always a chance to recover your laptop, even when Prey isn’t around at first.
Learn how the work of third-party vendors who farm student data affected student privacy protection laws, and why EdTech should always be privacy-first.
– Case Type: MacBook Theft in a public space. – Location: Leeds, UK. – Date Lost: 07/28/2018. – Recovery Time: 4 Days. – Missing Item: Apple MacBook. Our User’s Story: Installed Prey After the MacBook…
– Case Type: Lost phone in the airport’s bathroom. – Location: Heathrow Airport, London, UK. – Date Lost: 08/29/2018 – Recovery Time: 2 Hours – Missing Item: iPhone Our User’s Story: Finding an iPhone
The cyber-threat scene is ever-changing. Stay up to date with this year’s malicious trends to ensure your business’ infrastructure isn’t caught off guard.
Mobile devices like Chromebooks and iPads are coming to change the way schools connect their students to new technologies. Out with stationary computers, in with mobile devices!
Location: Santiago, Chile Date Stolen: October 27, 2015 Date Recovered: October 28, 2015 Theft Type: Lost device Missing Items: Moto G Final Thoughts: I retrieved my phone very quickly thanks…
If there’s one thing we learned from Equifax’s catastrophic breach: many people don’t create unique passwords.
From Whatsapp, to Apple’s iPhone encryption, law enforcement has always looked for back-doors to access protected user data. The industry’s stand? With the users, always.
What’s on a remote worker’s company-owned device? Everything. From the marketing department’s next quarter program, to the sales team’s target accounts.