CR-T Blog

CR-T has been serving the Orem area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

What to do if your Laptop is Stolen

The problem with carrying around an expensive, portable piece of equipment is that it's possible for someone to pick it up and run with it. According to LoJack, a security firm that focuses on stolen property, two million laptops are stolen each year. What should you do if you are a victim of laptop theft?

Your laptop is likely more than just an expensive investment in hardware. It can store plenty of data, passwords, credit card information, and much more, and a person doesn't have to be very savvy to crack into your user account and gain access to everything.

There are plenty of proactive measures you can take to calm the stress of laptop theft and even help you retrieve your stolen laptop, but let's assume that you haven't done this. What should you in the event of a stolen (or lost) laptop?

Let's think of a worst case scenario, where the thief doesn't just wipe your data and attempt to sell the laptop. In this case, yes, you just lost your investment but you can go to the store and pay money to get it back. In a worst case scenario the thief will hunt around for any juicy data that they can find, such as credit cards, passwords, bank accounts, company documents, and the like. As mentioned, password protecting your user account doesn't do you very much good for a savvy thief.

Tighten Security

Go through your accounts, starting with your email, and change your passwords. Don't reuse a password - create a new one with letters, numbers, and a symbol or two whenever possible. You will want to do this quickly before the thief has a chance to change them first. Once you change your email password, change passwords on your bank accounts, paypal, social networking sites, ecommerce sites, and anywhere else you can think of. If you've surfed to it before on your stolen laptop, the thief will find it. Don't forget accounts like instant messengers and other services.

Contact Authorities

File a police report. If possible, give the authorities your laptop's model and serial number. If your laptop hasn't been stolen yet, it's suggested that you jot it down right now. You can file a report with your computer manufacturer, especially if the thief didn't get a power cable to charge it with - they may try to go straight to the manufacturer. You can also check pawn shops and online sites like Craigslist and eBay for laptops that match yours. It's worth a shot to see if the thief simply tried selling it immediately.

Monitor your Money

You will want to put either a fraud alert or a credit freeze on your credit cards. If you bought anything on your laptop your credit card information is likely stored, and even if you know you haven't used your credit card on your laptop, it is still better to be safe than sorry. There are credit monitoring services that will help you keep track of fraud as well - check with your bank or credit card company for reporting and monitoring services. Be sure to change your pin numbers associated with your bank accounts as well. You may even want to contact companies you do business with to flag and monitor your accounts.

Be Prepared

There are plenty of things you can do to protect your laptop and proactively safeguard yourself in the event of your laptop getting stolen. If you own a laptop, now is the time to take the necessary precautions so that if it is lost or stolen you can retrieve it or at the very least protect your identity. Give us a call at 801.222.0930 to find out what you can do to prevent identity theft.


No comments yet
Already Registered? Login Here
Saturday, 22 October 2016
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Security Technology Microsoft Business Management Tip of the Week Internet Saving Money Privacy Small Business Workplace Tips Managed Service Provider Backup Hardware Software Quick Tips Mobile Office Productivity Cloud Data Social Media Gadgets Best Practices Hackers Email Business Computing Google Users Malware Mobile Devices Network Virtualization Hosted Solutions Windows Business IT Services IT Support Computer Upgrade Microsoft Office Smartphones Communication VOIP Passwords WiFi Business Continuity Windows 10 Miscellaneous Efficiency Smartphone Innovation Disaster Recovery Mobile Device Management Holiday User Tips Server Marketing Vendor Management Facebook Best Practice Office Alert Apple Operating System Current Events Remote Computing Android Browser Outlook App Health Going Green Bring Your Own Device Mobile Computing Spam Remote Monitoring Lithium-ion Battery Trending Wireless Technology The Internet of Things History Apps Gmail Ransomware Customer Relationship Management IT Solutions Tutorials Windows 8 Printer Information Technology Humor Big Data Content Filtering Maintenance Avoiding Downtime Unified Threat Management Automation Robot BYOD Retail Save Money Internet of Things IT Consultant Application Excel Computer Repair Saving Time Network Security Office Tips Social Password Fax Server Artificial Intelligence Administration Virus The Cloud iPhone Inbound Marketing User Error Phone System Hard Drives Google Analytics Education Tech Support Hacking Computers Hacker Sports Business Growth Money Router Digital Payment Proactive IT Antivirus Twitter Data Management Firewall Customer Service PowerPoint Presentation User Social Networking Business Owner Bandwidth Tablet Running Cable Printing Search Video Surveillance Display Hosted Solution Computing Mobile Settings Analyitcs Cybercrime Downtime Piracy Website End of Support Chrome LiFi Augmented Reality Samsung Cortana Employer-Employee Relationship Touchscreen Laptop Legal Mouse Tools Competition IBM Point of Sale Safety Phishing Risk Management VPN Net Neutrality How To Recovery Data storage Wi-Fi Upgrades Emoji Hacks Webcam Conferencing Statistics Java Web Marketing Refrigeration Storage USB Remote Support Leadership 5G 3D Printing Black Market Managed Service Providers Help Desk Dark Data Consumers Work Station Skype Two-factor Authentication Unsupported Software Processors IT service Value Debate 3D Undo Print Server Collaboration Co-managed IT communications Recycling LinkedIn Office 365 Mobile Data Notifications Google Wallet Streaming Media Intranet Law Firm IT Halloween Specifications Unified Communications Best Available Fun Physical Security Crowdsourcing Entrepreneur Drones Business Intelligence Programming Computer Accessories Windows 8.1 Update Gadget Domains Network Congestion Disaster Scary Stories Personal Information Government Budget Admistrator Outsourcing Public Speaking Monitors Bluetooth Electronic Medical Records Deep Learning Keyboard Shortcuts Crowdfunding Knowledge Work/Life Balance Licensing Buisness Online Currency Mobile Device Writing Virtual Reality Alt Codes Scheduling Experience Word Save Time Scam Encryption Macro Training IP Address Social Engineering SaaS eWaste Typing Memory Google Drive Hiring/Firing YouTube Phone Systems Company Culture Managed IT Services Update Environment Cryptocurrency People Gaming Console Google Docs ebay Document Management It Issues Wireless Chromebook Troubleshooting Bitcoin Trojan Text Messaging File Sharing Webinar Wearable Technology Virtual Desktop Alerts PC Care

Latest Blog Entry

How many hours a day do you work? Chances are that, as a business owner, you put in more than the average worker. Your team might put in the requisite eight hours, but you might find yourself putting ...

Latest News

  • Private Screening of The Hobbit III

    By invitation only

    CR&T’s 18th annual client appreciation event: THE HOBBIT III. This is a private pre-screening before the world premiere.

    Location: Thanksgiving Point Theater
    Time: December 16th 8:30AM (REMEMBER THIS IS 1 DAY PRIOR TO THE WORLD PREMIERE) seating is first come.


Contact Us

Learn more about what CR-T can do for your business.


Call us today    801.222.0930

116 South Mountain Way Drive
Orem, Utah 84058

facebook twitter linkedin#