CR-T Blog

This is some blog description about this site

  • Home
    Home This is where you can find all the blog posts throughout the site.
  • Tags
    Tags Displays a list of tags that has been used in the blog.
  • Archives
    Archives Contains a list of blog posts that were created previously.
Posted by on in IT Blog

What to do if your Laptop is Stolen

The problem with carrying around an expensive, portable piece of equipment is that it's possible for someone to pick it up and run with it. According to LoJack, a security firm that focuses on stolen property, two million laptops are stolen each year. What should you do if you are a victim of laptop theft?

Your laptop is likely more than just an expensive investment in hardware. It can store plenty of data, passwords, credit card information, and much more, and a person doesn't have to be very savvy to crack into your user account and gain access to everything.

There are plenty of proactive measures you can take to calm the stress of laptop theft and even help you retrieve your stolen laptop, but let's assume that you haven't done this. What should you in the event of a stolen (or lost) laptop?

Let's think of a worst case scenario, where the thief doesn't just wipe your data and attempt to sell the laptop. In this case, yes, you just lost your investment but you can go to the store and pay money to get it back. In a worst case scenario the thief will hunt around for any juicy data that they can find, such as credit cards, passwords, bank accounts, company documents, and the like. As mentioned, password protecting your user account doesn't do you very much good for a savvy thief.

Tighten Security

Go through your accounts, starting with your email, and change your passwords. Don't reuse a password - create a new one with letters, numbers, and a symbol or two whenever possible. You will want to do this quickly before the thief has a chance to change them first. Once you change your email password, change passwords on your bank accounts, paypal, social networking sites, ecommerce sites, and anywhere else you can think of. If you've surfed to it before on your stolen laptop, the thief will find it. Don't forget accounts like instant messengers and other services.

Contact Authorities

File a police report. If possible, give the authorities your laptop's model and serial number. If your laptop hasn't been stolen yet, it's suggested that you jot it down right now. You can file a report with your computer manufacturer, especially if the thief didn't get a power cable to charge it with - they may try to go straight to the manufacturer. You can also check pawn shops and online sites like Craigslist and eBay for laptops that match yours. It's worth a shot to see if the thief simply tried selling it immediately.

Monitor your Money

You will want to put either a fraud alert or a credit freeze on your credit cards. If you bought anything on your laptop your credit card information is likely stored, and even if you know you haven't used your credit card on your laptop, it is still better to be safe than sorry. There are credit monitoring services that will help you keep track of fraud as well - check with your bank or credit card company for reporting and monitoring services. Be sure to change your pin numbers associated with your bank accounts as well. You may even want to contact companies you do business with to flag and monitor your accounts.

Be Prepared

There are plenty of things you can do to protect your laptop and proactively safeguard yourself in the event of your laptop getting stolen. If you own a laptop, now is the time to take the necessary precautions so that if it is lost or stolen you can retrieve it or at the very least protect your identity. Give us a call at 801.222.0930 to find out what you can do to prevent identity theft.

Last modified on
Tagged in: Passwords Security
My Background has been developing CR&T, an IT services MSP (managed services) and enterprise fulfillment company. I enjoy helping companies and individuals find their way through the thick of things. I think technology is only as good as it is used.

Comments

  • No comments made yet. Be the first to submit a comment

Leave your comment

Guest Thursday, 21 August 2014

Archive

Categories

Tag Cloud

Marketing Company Culture Virus Work Station Software Firewall Business Computing Online Currency Printer History IT Solutions Help Desk Disaster Recovery IT Consultant Congratulations Business Continuity Macro Gaming Console Phone Systems VPN Document Management Backup ebay Tutorials Data Upgrade Spam Samsung Value Alerts Trending Hard Drives Managed Service Provider Managed Service Providers Mobile Device Vendor Management Point of Sale Digital Payment Microsoft Office Crowdfunding Mobile Device Management LinkedIn Save Money Net Neutrality Streaming Media Law Firm IT Mobile Twitter Money Security Browser Hosted Solutions Inbound Marketing Proactive IT Java Webinar Server Windows Health Network Apple Maintenance VOIP Remote Computing Privacy Wireless Technology Gadgets Smartphone Saving Time Wearable Technology Computer Accessories Efficiency Application Avoiding Downtime Antivirus Business Intelligence Phone System PowerPoint Scheduling Small Business Operating System BYOD People Android Workplace Tips Print Server Innovation Apps Hackers Touchscreen Leadership Outsourcing Alert Computer PC Care Tools Saving Money Users Internet Google Technology User Tips Windows 8 Mobile Computing Video Surveillance Display Microsoft Recycling Current Events Remote Support Customer Relationship Management File Sharing Analytics Unified Threat Management Communication Trojan Admistrator Webcam Outlook Intranet Bluetooth Web Marketing Content Filtering Quick Tips Malware Router Gadget iPhone Email It Issues Lithium-ion Battery Remote Monitoring Mobile Devices IBM Facebook Thank You Best Available Scam Passwords IT Services Humor Business Management Social Networking Conferencing Miscellaneous Holiday Hardware Fax Server Training Artificial Intelligence Skype Social Productivity Cloud The Cloud Information Technology User Error Bring Your Own Device Best Practices 3D Mobile Office The Internet of Things Keyboard Shortcuts Best Practice Tablet Administration Memory Social Media Windows 8.1 Update Smartphones Excel Going Green Office IT Support Virtualization Text Messaging Augmented Reality WiFi Tech Support Piracy Co-managed IT App Computer Repair Sports Mouse

Twitter

Latest Blog Entry

Hairballs and WiFi Data are What the Cat Dragged In
For Washington D.C. residents, there's a dubious threat looming in their backyards putting their personal data at risk. It's Coco, a Siamese cat wearing a high-tech collar designed for hacking WiFi ne...
Continue Reading...

Latest News

Our Site Has Launched!

flag

Welcome to Our New Site!
We are proud to announce the unveiling of our new website at CR-T!

Read more...

Contact Us

Learn more about what CR-T can do for your business.

callphone

Call us today    801.222.0930

116 South Mountain Way Drive
Orem, Utah 84058

facebook twitter linkedin#