Basically it comes down to implementing full disk encryption, creating an encrypted volume inside this with an easy password and a hidden encrypted volume with a hard password which people won’t bother to find. Then installing a tracker to find your laptop back if it gets stolen.
Three steps to properly protect your personal data – CSO Online – Security and Risk.
Robin Edgar
Organisational Structures | Technology and Science | Military, IT and Lifestyle consultancy | Social, Broadcast & Cross Media | Flying aircraft
robin@edgarbv.com
https://www.edgarbv.com