Laptop security in a nutshell

Imagine you’re at a coffee shop, sipping on a latte while working on your laptop. After all that coffee, you need to run to the loo. Would you leave your laptop for just a sec while you heed nature’s call?

Here’s another question: wouldn’t you hate it if your laptop disappeared? Your family photos, tax documents, and other personal stuff could vanish along with it. Unfortunately, it only takes a minor distraction for that to happen. And the last thing you’d want is for an identity thief to get their hands on your laptop.

We’ve got some tips to help you protect your laptop — and the valuable stuff on it. Here’s a fresh take on our popular laptop security bookmark. Want to score brownie points at work, school, a local library, or anywhere in your community? Get free copies of this bookmark and pass ‘em out. Order as many as you’d like!

Laptop Security bookmark


Want more details? Check out this article to learn the do’s and don’ts of laptop security. Would you rather play a game than read an article? Play Mission: Laptop Security to test your skills at keeping your laptop safe.

Mission: Laptop Security Game

Comments

HOW CAN YOU TELL IF AN E-MAIL IS A SCAM WHEN YOU GET AN E-MAIL SAYING YOU WON MONEY .

The FTC has an article about Prize scams. Here's one tip from the article: If you get a message that you have won, but you have to pay, or wire money or deposit a check they sent you, it's probably a scam.

Thanks for the 411

protect my iPad

That seems so legit. Especially now a days, streets pack with this scammers.

Yep another year another one of my dollars taken

Leave a Comment

Comment Policy

Read Our Privacy Act Statement

It is your choice whether to submit a comment. If you do, you must create a user name, or we will not post your comment. The Federal Trade Commission Act authorizes this information collection for purposes of managing online comments. Comments and user names are part of the Federal Trade Commission’s (FTC) public records system, and user names also are part of the FTC’s computer user records system. We may routinely use these records as described in the FTC’s Privacy Act system notices. For more information on how the FTC handles information that we collect, please read our privacy policy.