Basically it comes down to implementing full disk encryption, creating an encrypted volume inside this with an easy password and a hidden encrypted volume with a hard password which people won’t bother to find. Then installing a tracker to find your laptop back if it gets stolen.
Three steps to properly protect your personal data – CSO Online – Security and Risk.
![Robi nEdgar sitting in a chair](https://www.linkielist.com/wp-content/uploads/2023/11/IMG_20210918_163549_small-150x150.jpg)
Robin Edgar
Organisational Structures | Technology and Science | Military, IT and Lifestyle consultancy | Social, Broadcast & Cross Media | Flying aircraft
robin@edgarbv.com
https://www.edgarbv.com