Device Tracking

Stolen company laptop? Steps to track, lock & recover

juanhernandez@preyhq.com
Juan H.
Dec 13, 2024
0 minute read
Stolen company laptop? Steps to track, lock & recover

If you’re dealing with a stolen company laptop, the first hour matters. Treat the loss as both a hardware and identity event: use device geolocation, trigger a remote lock or wipe, kill active sessions, rotate high-risk credentials, and document the chain of custody. This guide explains where a stolen work laptop most often ends up—and how IT can reduce risk fast. You’ll get a T+0–24h playbook, compliance checkpoints, an evidence checklist for a police report for stolen laptop or insurance claim laptop theft, and prevention steps for the workplace. Even if the hardware never returns, the right response protects sensitive information, users, and the business.

Key takeaways

  • Use built-in and third-party tracking software to potentially locate, lock, and secure your stolen laptop and leverage encryption, data backup strategies, and physical security measures to protect against future theft incidents.
  • Promptly report the theft to the authorities, notify your employer or school, and contact financial institutions to prevent misuse of your stolen laptop and to begin the recovery process.
  • Immediately take digital security measures such as changing passwords, disabling autofill, clearing browsing data, and employing multi-factor authentication to protect your online accounts and personal information.

Where stolen laptops go (channels & likelihood)

Stolen work laptops usually follow four paths. Knowing which one you’re dealing with helps you choose the right incident response steps, what to share with law enforcement, and whether to lock or wipe the device.

Quick resale markets (local, fast, messy)

What it looks like: Pawn shops, street markets, peer-to-peer listings. Devices often sold “as is,” sometimes with obvious corporate stickers removed.

Risk to data: Medium. Opportunistic buyers may try a quick login before resale. If BitLocker/FileVault is on and the device is locked, risk drops.


Your move (IT):

  • Trigger device geolocation and remote lock immediately; escalate to wipe functionality if encryption status is unknown.
  • Preserve the audit trail (time, operator, command results) and start the chain of custody log.
  • Provide police a concise description (make/model/serial/asset tag) and last known location. 

Likelihood of hardware recovery: Medium. Speed matters more than anything.

Parts harvesting (data-safe, hardware gone)

What it looks like: Device is dismantled for valuable part resale (drives, RAM, display).

Risk to data: Low → High depending on disk encryption. Encrypted drives are often wiped or discarded; unencrypted drives are at high risk.

Your move (IT):

  • Verify BitLocker/FileVault status; if unknown, remote wipe and rotate high-risk credentials (SSO, VPN keys, API tokens).
  • Attach purchase invoice and warranty (yrs warranty) to your insurance case; record serials of replaceable components if you have them.

Likelihood of hardware recovery: Low. Prioritize identity containment and claims.

Cross-border export (organized, low recovery)

What it looks like: Devices collected into bulk lots and shipped abroad. IMEI/serials may be altered; listings appear weeks later.


Risk to data: Medium. Time to export gives attackers more attempts against cached user identities and work applications.


Your move (IT):

  • Kill active sessions, revoke OAuth grants, and enforce tenant-wide MFA re-enroll.
  • Provide law enforcement the evidence pack: last pings, IPs, photos, chain of custody, and your insurance claim laptop theft number.
  • Shift quickly from recovery to post-incident reporting and user comms.

Likelihood of hardware recovery: Low. Focus on documentation and compliance.

Data-first crimes (the real risk for companies)

What it looks like: Thieves prioritize access over resale—testing saved browsers, SSO tokens, and VPN profiles within minutes.

Risk to data: High. This is where “stolen company laptop” becomes a potential data incident.

Your move (IT):

  • Treat as an identity event: disable high-risk user accounts, rotate passwords/keys, invalidate refresh tokens.
  • Decide lock vs. wipe based on data classification; if sensitive information or PHI/PII is plausible, wipe and assess notification thresholds.
  • Launch a dark web and exposure sweep; enable breach monitoring alerts for execs and privileged roles. 

Likelihood of hardware recovery: Variable. Data protection outranks device retrieval.

Likelihood & priority snapshot

Channel Recovery odds Data risk IT priority
Quick resale Medium Medium Lock → verify encryption → wipe if unknown; hand off to police
Parts harvesting Low Low → High (encryption-dependent) Confirm encryption, wipe if needed; proceed with insurance
Cross-border export Low Medium Full identity containment; document thoroughly; compliance review
Data-first crimes Variable High Immediate session kills, token revocations, remote wipe, exposure sweep

Stolen work laptop: the T minus 24h IT playbook

Timeline Actions Decision Cues What to Record Prey Tip
T+0–1h:
Identity protection
  • Suspend or disable high-risk user accounts (admins, finance, engineering, execs).
  • Force SSO/MFA resets (Okta, Entra ID, Google Workspace); revoke refresh tokens and sessions tenant-wide.
  • Revoke OAuth grants to third-party apps (GitHub, Slack, Atlassian, marketing tools).
  • Rotate keys and secrets (VPN, API, SSH, cloud CLI).
  • Block risky network access: remove device from trusted networks or quarantine in NAC.
  • If the user confirms it was a company laptop (not misplaced), treat it as an identity event.
  • If disk encryption status is unknown, assume exposure.
  • Who initiated actions, timestamps (UTC), systems affected (SSO, MDM, EDR), and results.
  • Device identifiers: asset tag, serial, OS, last signed-in account.
Use Prey to geolocation-check silently while rotating credentials.
Never contact the suspected holder directly.
T+1–4h: Device response actions
  • Locate: Use MDM, EDR, or Prey to request a location ping and capture history.
  • If “Find My Device” or “Find My Mac” is enabled, query and screenshot results.
  • Lock vs. wipe (guide):
    • Lock → when BitLocker/FileVault ON, law enforcement involved, recovery plausible.
    • Wipe → when encryption OFF/unknown, privileged credentials, or PHI/PII/source code present.
  • Execute command and confirm success; retry if necessary.
If encryption is OFF or access attempts detected, escalate from lock to wipe.
  • Command (lock/wipe), operator, timestamp, and outcome.
  • Last IP, Wi-Fi SSID, and endpoint tracking data.
Lock first, then wipe if risk warrants it. A successful lock buys time; a documented wipe simplifies insurance claims.
T+4–24h: Notify & document (compliance)
  • Police: file report (include make/model/serial/asset tag, last coordinates, actions taken).
  • Insurance: submit claim with purchase invoice, warranty, MDM/Prey logs, and police case number.
  • Internal: brief Security/IT/Legal/HR with a 10-line incident summary.
  • Client/contractual: notify stakeholders per SLA or DPA if required.
  • Compliance: start the HIPAA/GDPR response clock if exposure is likely.
If encryption unknown or sensitive data possibly exposed, escalate to formal incident response.
  • Maintain one authoritative evidence log (asset details, timestamps, actions, outcomes).
  • Store artifacts immutably and assign an owner.
Export Prey reports (location history, command logs) and attach to the case.
Clean, timestamped artifacts accelerate legal and insurance review.

Protect your data at all cost

Data risk comes before hardware recovery. When a stolen company laptop is confirmed, treat the device as a potential doorway into identities and data—not just a missing asset. The goal of this section is to help IT decide, quickly and defensibly, whether to lock or wipe, which identities to contain, and whether notifications (contractual or regulatory) are on the table.

What “encrypted” really buys you

  • Full-disk encryption (BitLocker/FileVault) protects data at rest if the device is powered off or locked.
  • It does not protect: already-unlocked sessions, cached browser cookies/tokens, saved VPN profiles, or synced app data.
  • If encryption status is unknown, act as if it’s off and escalate to remote wipe.

Why identities are the first blast radius

  • Stolen laptops often yield quick wins for attackers via cookies, refresh tokens, and SSO grants.
  • Containment means: kill sessions, revoke OAuth grants, force MFA re-enroll, and rotate VPN/API/SSH keys tied to the user.
  • Prioritize admin, finance, and engineering accounts; then expand by role or group.

Classify the data before you choose lock vs. wipe

Ask three fast questions:

  1. What’s on it? (PII, PHI, source code, customer reports, exported workbooks)
  2. Was it accessible? (device locked vs. unlocked; signs of recent use)
  3. Was it protected? (BitLocker/FileVault on? containerization? DLP?)

If high-risk data could be accessible and encryption is off/unknown → wipe.

If encrypted and no access signals → lock, continue monitoring, and document.

Signals that raise risk

  • Browser shows active sessions to work applications (SSO still valid).
  • VPN profile/privileged SSH keys stored locally.
  • Recent telemetry (new IP/SSID) after the theft timestamp.
  • User admits device was unlocked when stolen.

What to log for chain of custody

  • Encryption status (with proof), last login, session revocations, tokens revoked, keys rotated.
  • Lock/wipe command IDs, timestamps, operator, and results (with screenshots).
  • Any file-/process-level alerts from EDR/MDM that indicate access.
Prey tip: Decide lock vs. wipe within the first 1–4 hours. If you’re unsure about encryption or see identity risk, err on wipe and document your rationale.

Data-risk matrix: encryption, identities, and sensitive information

On-device element Encrypted? Risk if stolen Immediate action
Disk (BitLocker / FileVault) Yes / No Low → High Verify status; remote lock if encrypted and no access signals; wipe if off / unknown or access suspected.
Browser cookies / SSO tokens N/A Medium–High Revoke SSO sessions, invalidate refresh tokens, force MFA re-enroll; review OAuth app grants for risky scopes.
Secrets (VPN, SSH, cloud CLIs, API keys) N/A High Rotate keys, remove profiles, disable stale credentials in PAM/IdP; audit for reuse elsewhere.
Local files (PII / PHI / source code / exports) Depends High if unencrypted or unlocked Wipe, then start notification assessment (HIPAA / GDPR / contractual) with evidence of controls and timeline.
Rule of thumb: If identities or sensitive information might be reachable, treat the event as an identity & data incident first; hardware recovery is secondary.

Dealing with the aftermath: Insurance claims and tech support

After a laptop theft, your IT or tech support team is your first and most important point of contact. They are the ones who can contain the risk, trigger remote actions, and coordinate next steps for insurance, compliance, and data protection.

step 1 — Report the incident to your IT helpdesk immediately

Don’t delay. Every minute counts. Your IT team can remotely lock, locate, or wipe the device using tools like Prey or your MDM platform. Provide them with every detail you have — when and where the loss occurred, last known connection, and any suspicious account activity. This helps preserve the chain of custody and supports compliance with data protection laws such as GDPR or HIPAA.

step 2 — Follow internal incident response procedures

Most organizations have specific workflows for stolen devices. Follow them closely:

  • Confirm whether the device contained sensitive data or credentials.
  • Notify your manager or data protection officer if required.
  • Document all actions taken (lock, wipe, revoke access) — these records are critical for audits or insurance claims.

step 3 — Coordinate with external tech support or manufacturer

Once your internal tech team has contained the risk, contact your laptop manufacturer’s support line. They can:

  • Flag the device’s serial number in their service database.
  • Provide warranty guidance or replacement options.
  • In some cases, assist law enforcement if the device is recovered or serviced later.

step 4 — Insurance claims (after IT validation)

Only file an insurance claim once your IT team has completed the technical containment steps. You’ll need:

  • A copy of the police report.
  • A confirmation from your IT or security team of the incident response actions taken.
  • Device identifiers such as serial number, asset tag, or IMEI.

Being proactive and coordinated — not just with insurers, but with your tech support — can make all the difference between a contained incident and a costly data breach.

While the claim is moving, keep security moving too

Your insurance claim will cover the hardware — but your IT playbook should cover the risk. While the adjuster does their job, keep your own security track alive: verify there’s no credential abuse, notify the right people, and tighten controls so the same breach doesn’t happen twice. The sections below guide you through the parallel response tracks that matter most after a device theft.

Dark web & credential exposure sweep

A claim pays for the laptop; it won’t protect your logins. Stolen endpoints often expose cached tokens, cookies, or saved credentials that attackers reuse within hours. A quick dark web and credential sweep helps you confirm whether any identities tied to the device are already circulating — and where to focus containment.

What to do

  • Check for @yourcompany.com exposures—start with admins, finance, execs, and service accounts.
  • Look for fresh dumps and any password reuse on core systems (IdP, email, cloud, VPN).
  • Turn on/verify breach monitoring alerts for high-risk roles.

If you find exposure

  • Force resets for the affected users; invalidate refresh tokens/app passwords.
  • Add a short-term step-up MFA policy for risky groups; block legacy auth.
  • Widen the search to exec assistants, shared mailboxes, and automation accounts.

Legal / HR / Insurance: who to notify and when

Once containment is underway, communication becomes your shield. Knowing who to notify and what to share avoids regulatory missteps and keeps everyone aligned. From legal and HR to insurance and possibly clients, clear coordination ensures every requirement is covered — and nothing is disclosed prematurely.

  • Legal/Privacy: Confirm encryption status, signs of access, and whether regulations/contracts require notice. Approve wording (facts only).
  • HR: Guide the employee (replacement process, safety), document policy steps without blame, coordinate offboarding if needed.
  • Insurance: Submit the evidence log (invoice/warranty, Prey/MDM logs, police case #, lock/wipe timestamps). Follow carrier instructions.
  • Clients / DPAs (if required): Check DPAs/MSAs for windows (e.g., 72 hours). Notify with essentials: what was lost, encryption status, actions taken, current risk.

Hardware recovery reality: expectations & safety

Chasing a stolen laptop can quickly turn risky — and rarely yields results. Setting the right expectations helps your team focus on what truly counts: securing data and maintaining compliance. Share verified info with law enforcement, but never attempt recovery yourself. Your goal now is visibility, not heroics.

  • Do: Share verified coordinates and logs with law enforcement; keep collecting events for the case.
  • Don’t: Attempt self-recovery, meet sellers, or confront anyone. Safety first.
  • 72-hour pivot: If there’s no signal after ~72 hours, shift fully to identity protection, compliance, and the claim. Continue passive monitoring for late pings.

Prevention hardening pack (post-mortem controls)

The best incident response ends with learning. Once the immediate storm passes, use what you’ve learned to harden controls. Review identity, device, and operational gaps exposed by the theft. Each fix — from enforcing encryption to running remote-wipe drills — helps close the loop and reduce your next-time risk window.

Top recomendations:

Access & identity

  • MFA everywhere, disable legacy auth, move to Just-in-Time admin.
  • Quarterly access reviews for admin/finance/engineering.

Device & data

  • Enforce BitLocker/FileVault with escrowed keys; verify at enrollment.
  • Baseline endpoint tracking and run remote-wipe drills twice a year.
  • Short screen-lock timers; startup password on macOS.

Operations

  • Align MDM policies across Windows/macOS with your IdP (SSO/MFA).
  • Store this playbook + templates in your ticketing system.
  • Label assets clearly; track warranty/replacement SLAs.

Vendors & travel

  • Create travel profiles with smaller data footprints and tighter policies.
  • Bake encryption/MDM/reporting SLAs into vendor contracts.

Metrics that matter

  • % devices with verified encryption
  • Median time to session kill
  • Median time to lock/wipe
  • % admins on JIT
  • Drill completion & success rate

Frequently asked questions

What to do if a company laptop is stolen?

Contain identities (SSO reset, session revocation), locate/lock/wipe, file reports, assess compliance, and start an insurance claim laptop theft.

Is it illegal to keep a company laptop?

Company devices are work equipment. Keeping one without authorization can be theft or conversion—escalate to HR/Legal.

What happens if you don’t report it?

You extend the window of opportunity thieves have to access data and accounts, increasing breach and compliance risk.

Do police ever find stolen laptops?

Yes, police can find stolen laptops, but success depends on the details you provide, like the serial number, make, and model. Smaller departments may have limited resources, so using tracking software like Prey can help provide location data to aid their investigation.

What to do if my laptop is stolen while traveling?

If your laptop is stolen while traveling:

  1. File a police report immediately with all laptop details.
  2. Notify your hotel or local authorities for additional support.
  3. Use tracking software like Prey to locate or lock the laptop remotely.
  4. Secure your online accounts by changing passwords and enabling multi-factor authentication.
  5. Contact your travel insurance provider if applicable.

Frequently asked questions

What is the technology strategy framework?

A technology strategy framework is essential for businesses to effectively leverage technology to enhance operational efficiency, customer experience, and foster innovation while managing risks. This framework is often referred to as IT strategy or digital strategy.

What is an IT strategy framework?

An IT strategy framework is essential for aligning technology initiatives with business objectives, providing a clear structure to achieve strategic goals. By implementing this framework, organizations can ensure that their IT investments effectively support their overall business strategy.

Why is aligning IT goals with business objectives important?

Aligning IT goals with business objectives is crucial because it ensures that IT initiatives directly support the overall business strategy, driving growth and efficiency. This alignment facilitates better resource allocation and maximizes the impact of technology on business performance.

How can emerging technologies be leveraged in an IT strategy?

Leveraging emerging technologies in your IT strategy can drive innovation and create competitive advantages through the development of new business models and increased market value. Embracing these technologies ensures your organization stays ahead in a rapidly evolving landscape.

What are some common challenges in IT strategy implementation?

Common challenges in IT strategy implementation include a lack of alignment with organizational goals, resistance to change from stakeholders, and the tendency to adopt new technologies without clear value, often referred to as "shiny object syndrome." Addressing these challenges is crucial for successful execution.

Discover

Prey's Powerful Features

Protect your devices with Prey's comprehensive security suite.