Scroll Top
Republic of Trinidad and Tobago

Hardware Protection & Data Recovery


In today’s world, almost everything is electronic or digitized. From homework assignments to proposal submissions to government forms and many other online applications, all of which require us to save some sort of document or photo on our computer. Computers are also the home too many of our personal photos and videos. It’s the place we store just about everything .

Are you prepared to quickly recover if your computer fails to start up tomorrow or even it it gets stolen or lost? Consider the amount of time and effort you’ll loose if you did employ a proper hardware protection and recovery strategy.

Here are some tips which you can follow to help you protect your hardware and data.


The three most common areas where mobile devices and laptops are stolen

  • airports,
  • public transport
  • vehicles

Always keep your items concealed when in a public place. When traveling, carry your devices in a nondescript carrying case, briefcase, or bag when moving about.

Placing these items in a case designed for computers is an immediate alert to thieves that you have these valuable devices.


Whether in a public place, at school or even at the workplace, once you’re not using the device, get into the habit of securing your device either in a cabinet or drawer, use a security cable, or take it with you.


If your device looks unique, it’s less likely that someone will steal your device and say they thought it belonged to them.

Sometimes identifying markings make the laptop harder to resell, so they’re less likely to be stolen.

Use a permanent marking, engraving, or tamper-resistant tracking tag or even go for the laptop that comes with a brightly colored shell instead of a standard black one.


Use a passphrase, password, or fingerprint to secure your device from prying eyes. If you choose to use a password, it is important to be sure to choose different passwords for different programs or devices.


Be aware of where you connect your laptop or mobile device to charge. In areas where there is an unreliable power supply, it is highly recommended that you use a portable power protection plug or if in a fixed location, a UPS (Uninterrupted Power Supply).

Avoid overloading power outlets by plugging in multiple extenders and plugs. This can lead to overloading and in some instances can be a fire hazard.

If you need to purchase a new or replacement power adapter for your device, consider getting the same brand or a brand known in the industry for providing proper replacement parts. Using cheap power supply and charging blocks and cables will adversely affect your computer battery and can also cause harm to your device through overheating.


Install and use tracking and recovery software included with most devices (e.g., the “Find My iPhone” feature in iOS) or invest in commercial products like LoJack for Laptops. Some software includes remote-wipe capabilities. This feature allows you to log on to an online account and delete all of the information on your device.

There are subscriber and free versions of this type of software, and each provides a different set of features.


Determine if your device automatically encrypts your data, and make sure that you regularly back up your information. Keep an external copy of any important files stored on your devices in a safe location.  If your device doesn’t use encryption by default, enable it or install encryption software.

Use the 3-2-1 Backup Strategy outline below:


Record the manufacturer, model, and serial number of your mobile devices and store the info in a safe place. This information can be useful for filing a police report and verifying your device, if it’s found.


If your device is stolen, file a police report immediately. Provide the authorities with the information you’ve written down along with any unique identification or custom personalization that you may have put on the device.


Contact your phone provider and notify them of the stolen device. They may be able to assist the police with tracking your device. You will also be able to stop any data plans currently on the device and avoid unnecessary charges.


Related Posts