Talk With an Expert

Protecting Laptop Computers

Protecting Laptop Computers (PDF, 3.26MB)Published: 11 Jun, 2010
Created by:
Gregory Hill

Both individuals and organizations may suffer serious losses measured in dollars, time and reputation when laptop computers are stolen, lost, broken or hijacked. While it would be impossible, not to mention expensive, to anticipate and thwart every possible risk, by taking a systematic approach, the vast majority of them can be avoided. The first step is to build a Threat Model to identify the dangers, estimate their costs, and determine the likelihood of their occurrence. A cross-platform, all purpose Protection Plan can be built based on the Threat Model, ready to customize for any situation, using the five most common OSes, Microsoft(R) Windows XP(R), Windows Vista(R), Windows 7(R), Apple(R) Mac OS(R) X and Linux.