TECHNOLOGIES THAT CAN HELP SAVE YOUR COMPANY'S LAPTOPS\t\t\t\t\t\t\t\t\t\t\u00a0Cable Locks\t\t\t \t\t\t\tMakers: Anchor Pad, Kensington, Kryptonite, others Cost: $30-$70\t\t\t\tPro: Stops petty theft Con: Inconvenient\t\t\t\tCable locks are about as simple as it gets. Think basic bicycle locks for your laptop. The idea here is you chain it to your desk so that while you're in the bathroom or grabbing a cup of coffee, no one can walk off with it.\t\t\t \t\t\t\t\u00a0Motion Alarms\t\t\t \t\t\t\tMakers: Caveo, TrackIt Cost: $50-$100\t\t\t\tPro: Could deter thieves Cons: Alarm could trigger accidentally, limited range\t\t\t\tWouldn't it be nice if your laptop could holler "Stop! Thief!"? In effect, that's what motion alarms do. If your laptop is vulnerable, the alarm goes off, and presumably thieves aren't going to want to carry around a shrieking notebook\t\t\t \t\t\t\t\u00a0Tracking Devices\t\t\t \t\t\t\tMakers: Computrace, CyberAngel, Stealth Signal, others Cost: $20-$60 (Computrace and CyberAngel also have yearly fees)\t\t\t\tPro: Some versions delete data Cons: Varying police cooperation, requires perp to connect to Net\t\t\t\tThink LoJack for your laptop. Tracking devices secretly send a message whenever the computer is logged on to the Internet, allowing it to be tracked and recovered. Some also are set up to delete the data on the machine once it's plugged in, which can offer some protection.\t\t\t \t\t\t\tTECHNOLOGIES THAT CAN HELP SAVE YOUR COMPANY'S DATA\t\t\t \t\t\t\t\u00a0Encryption\t\t\t \t\t\t\tMakers: Various Cost: Varies\t\t\t\tPro: Protects most data Cons: Inconvenient, potential for lost passwords\t\t\t\tHard drives with encryption software use algorithms to take stored files and make sure they can be read only by those who have the key. There are a variety of ways to implement encryption schemes on a laptop; IBM has even built an algorithm into a chip in its laptops. Encryption is also getting easier to use, addressing a longstanding issue with the software.\t\t\t \t\t\t\t\u00a0Fingerprint Biometrics\t\t\t \t\t\t\tMaker: TargusCost: $80\t\t\t\tPro: Simple concept Con: Unreliable\t\t\t\tLet your fingers do the talking, at least as far as getting at your data is concerned. Fingerprint biometrics made by Targus is offered as an option by Gateway and others.\t\t\t \t\t\t\t\u00a0Tokens\t\t\t \t\t\t\tMakers: Authenex A-Key, SecuriKey, othersCost: $15-$129\t\t\t\tPro: Can't forget password Cons: People lose their keys, have to remember to keep it with you\t\t\t\tJust like having an ignition key for your computer. A token is a USB-device that's small enough to fit onto a key chain, and stores authentication data. Without it, no one can access files on your computer. Some devices offer more security features as well.\t\t\t \t\t\t\t\u00a0Motion-Activated Encryption\t\t\t \t\t\t\tMakers: Caveo, TargusCost: $50-$100\t\t\t\tPros: Prohibits access, encrypts dataCon: Could go off at wrong time\t\t\t\tThis motion alarm does more than just sound an alarm; it automatically encrypts data and prevents access to the screen if it believes a laptop has been stolen.\t\t\t \t\t\t\t\u00a0Remote Data Wiping\t\t\t \t\t\t\tMakers: Computrace, CoreStreetCost: $50-$80\t\t\t\tPro: Prevents damage from employee theft Con: Not widely used, so battle testing is needed\t\t\t\tRemote data wiping devices vary, but in general they work by sending messages that either vaporize the contents of a hard drive or lock them so that they can't be read. They can depend on someone reconnecting to the Internet, but in the case of CoreStreet's device, it's designed to disable the laptop after a certain period even if it is never reconnected.