Basically it comes down to implementing full disk encryption, creating an encrypted volume inside this with an easy password and a hidden encrypted volume with a hard password which people won’t bother to find. Then installing a tracker to find your laptop back if it gets stolen.
Three steps to properly protect your personal data – CSO Online – Security and Risk.
 
        
        
    Robin Edgar
Organisational Structures | Technology and Science | Military, IT and Lifestyle consultancy | Social, Broadcast & Cross Media | Flying aircraft
                            
                     robin@edgarbv.com                
                                
                     https://www.edgarbv.com                
                        
    
