By Distributel
It sucks to have your device stolen, but that’s an unfortunate reality of a world where we all carry around expensive phones, laptops, headphones, and more. Here’s how you can prevent the theft of your expensive electronics, or, if the worst happens, limit your damages.
Apple, Samsung, Google, and other major manufacturers have digital programs where you register your device. You can then use said programs to locate missing devices or, in a worst-case scenario, brick them so the thieves can’t get any information.
DriveStrike (and other similar programs) are a step up from the standard Find My Device stuff. DriveStrike lets you remotely access a device, then wipe, lock, locate, or encrypt it. These are usually used by business owners who have a bunch of laptops, so it might be overkill for you. But if you’re concerned about security, you want a program that can do all these things to your devices.
A laptop lock securely affixes your laptop to something else, such as a fixture secured to a wall or a table leg. Obviously, if you’re out in a coffee shop or something, you’re not going to leave your laptop just sitting there. However, if you’re in an office (or other work space) with a lot of people or strangers coming in or out, a laptop lock might make sense. Note that looping the cable of your laptop lock around a table leg might dissuade a sticky-fingered visitor just passing by, but it won’t help if there’s no one around and the thief can lift the table without attracting attention.
Say your laptop is stolen and chopped for parts. You don’t want your hard drive slotted into a new device and then accessed, do you? Well, if it has TPM technology installed, your hard drive can’t be accessed by an unfamiliar computer.
Stick an AirTag or other tracker in your briefcase and luggage. You never know when you’ll need to track your stuff. And if anything, looking up your AirTag location will give you peace of mind when you’re getting off the plane.
If you want to tell a potential thief that you have a laptop, use a laptop bag. Briefcases, rolling luggage, or a backpack make a less obvious target.
You step up to the conveyor belt with other travellers and start putting your stuff on it. Scammer one puts his stuff down and zips through the metal detector. Scammer two, who is right in front of you, steps up to the metal detector but then has to step back and make a big show of emptying his pockets and wasting time. Meanwhile, scammer one is helping himself to your laptop and phone that you’ve already sent through. Easy solution here: just wait until you’re ready to go through before you put your laptop on the conveyor belt. You have to separate it from your bag anyway.
If the worst happens and you get your laptop or phone stolen, you’ll be a smidge happier if you have everything backed up and can reinstall with minimal fuss. So back up now. You’re done reading this post, so now is a great time.