By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
1. Install laptop tracking software so that if it is stolen it can be traced and hopefully recovered. Some examples of such software are Lojack and Laptop cop.
2. Engrave identifying information on laptop and record any serial numbers.
3. Encrypt the drive or at minimum sensitive information.
While these items won't prevent a laptop from being stolen it will reduce the sensitive information lost and aid in recovery.
Dig Deeper on Network Security Monitoring and Analysis
Related Q&A from Michael Gregg
Enterprise security expert, Michael Gregg answers a question regarding port 3389 issues when a user tries to open port 3389 RDP on their router to ...continue reading
Security expert Michael Gregg notes the risks to enteprise security that mobile devices may cause.continue reading
Expert Michael Gregg answers a reader question about Snort and the interfaces it uses.continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.