Watch this video on YouTube
What is the MOST EFFECTIVE method to mitigate data loss if personal computing equipment is lost or stolen?