The best level of protection against brute force passwords is to use long and complex passwords. Of course, the longer and more complex the password, the more likely it will be forgotten, so it is best to construct the password using specific letters from a phrase and insert or replace certain letters with numbers, spaces, punctuation and special characters, including non-printable characters. Of course, if someone can gain physical access to the computer itself, then game over! All they have to do is install a parallel OS on it or boot it using a “live” OS on a DVD, USB drive, etc. and gain access to the resident volumes. Granted, they will not be able to read any of the data that is encrypted but decrypting it as well isn’t necessarily beyond the realm of possibility.