If you’re dealing with a stolen company laptop, the first hour matters. Treat the loss as both a hardware and identity event: use device geolocation, trigger a remote lock or wipe, kill active sessions, rotate high-risk credentials, and document the chain of custody. This guide explains where a stolen work laptop most often ends up—and how IT can reduce risk fast. You’ll get a T+0–24h playbook, compliance checkpoints, an evidence checklist for a police report for stolen laptop or insurance claim laptop theft, and prevention steps for the workplace. Even if the hardware never returns, the right response protects sensitive information, users, and the business.
Key takeaways
- Use built-in and third-party tracking software to potentially locate, lock, and secure your stolen laptop and leverage encryption, data backup strategies, and physical security measures to protect against future theft incidents.
- Promptly report the theft to the authorities, notify your employer or school, and contact financial institutions to prevent misuse of your stolen laptop and to begin the recovery process.
- Immediately take digital security measures such as changing passwords, disabling autofill, clearing browsing data, and employing multi-factor authentication to protect your online accounts and personal information.
Where stolen laptops go (channels & likelihood)
Stolen work laptops usually follow four paths. Knowing which one you’re dealing with helps you choose the right incident response steps, what to share with law enforcement, and whether to lock or wipe the device.
Quick resale markets (local, fast, messy)
What it looks like: Pawn shops, street markets, peer-to-peer listings. Devices often sold “as is,” sometimes with obvious corporate stickers removed.
Risk to data: Medium. Opportunistic buyers may try a quick login before resale. If BitLocker/FileVault is on and the device is locked, risk drops.
Your move (IT):
- Trigger device geolocation and remote lock immediately; escalate to wipe functionality if encryption status is unknown.
- Preserve the audit trail (time, operator, command results) and start the chain of custody log.
- Provide police a concise description (make/model/serial/asset tag) and last known location.
Likelihood of hardware recovery: Medium. Speed matters more than anything.
Parts harvesting (data-safe, hardware gone)
What it looks like: Device is dismantled for valuable part resale (drives, RAM, display).
Risk to data: Low → High depending on disk encryption. Encrypted drives are often wiped or discarded; unencrypted drives are at high risk.
Your move (IT):
- Verify BitLocker/FileVault status; if unknown, remote wipe and rotate high-risk credentials (SSO, VPN keys, API tokens).
- Attach purchase invoice and warranty (yrs warranty) to your insurance case; record serials of replaceable components if you have them.
Likelihood of hardware recovery: Low. Prioritize identity containment and claims.
Cross-border export (organized, low recovery)
What it looks like: Devices collected into bulk lots and shipped abroad. IMEI/serials may be altered; listings appear weeks later.
Risk to data: Medium. Time to export gives attackers more attempts against cached user identities and work applications.
Your move (IT):
- Kill active sessions, revoke OAuth grants, and enforce tenant-wide MFA re-enroll.
- Provide law enforcement the evidence pack: last pings, IPs, photos, chain of custody, and your insurance claim laptop theft number.
- Shift quickly from recovery to post-incident reporting and user comms.
Likelihood of hardware recovery: Low. Focus on documentation and compliance.
Data-first crimes (the real risk for companies)
What it looks like: Thieves prioritize access over resale—testing saved browsers, SSO tokens, and VPN profiles within minutes.
Risk to data: High. This is where “stolen company laptop” becomes a potential data incident.
Your move (IT):
- Treat as an identity event: disable high-risk user accounts, rotate passwords/keys, invalidate refresh tokens.
- Decide lock vs. wipe based on data classification; if sensitive information or PHI/PII is plausible, wipe and assess notification thresholds.
- Launch a dark web and exposure sweep; enable breach monitoring alerts for execs and privileged roles.
Likelihood of hardware recovery: Variable. Data protection outranks device retrieval.
Likelihood & priority snapshot
Stolen work laptop: the T minus 24h IT playbook

Protect your data at all cost
Data risk comes before hardware recovery. When a stolen company laptop is confirmed, treat the device as a potential doorway into identities and data—not just a missing asset. The goal of this section is to help IT decide, quickly and defensibly, whether to lock or wipe, which identities to contain, and whether notifications (contractual or regulatory) are on the table.
What “encrypted” really buys you
- Full-disk encryption (BitLocker/FileVault) protects data at rest if the device is powered off or locked.
- It does not protect: already-unlocked sessions, cached browser cookies/tokens, saved VPN profiles, or synced app data.
- If encryption status is unknown, act as if it’s off and escalate to remote wipe.
Why identities are the first blast radius
- Stolen laptops often yield quick wins for attackers via cookies, refresh tokens, and SSO grants.
- Containment means: kill sessions, revoke OAuth grants, force MFA re-enroll, and rotate VPN/API/SSH keys tied to the user.
- Prioritize admin, finance, and engineering accounts; then expand by role or group.
Classify the data before you choose lock vs. wipe
Ask three fast questions:
- What’s on it? (PII, PHI, source code, customer reports, exported workbooks)
- Was it accessible? (device locked vs. unlocked; signs of recent use)
- Was it protected? (BitLocker/FileVault on? containerization? DLP?)
If high-risk data could be accessible and encryption is off/unknown → wipe.
If encrypted and no access signals → lock, continue monitoring, and document.
Signals that raise risk
- Browser shows active sessions to work applications (SSO still valid).
- VPN profile/privileged SSH keys stored locally.
- Recent telemetry (new IP/SSID) after the theft timestamp.
- User admits device was unlocked when stolen.
What to log for chain of custody
- Encryption status (with proof), last login, session revocations, tokens revoked, keys rotated.
- Lock/wipe command IDs, timestamps, operator, and results (with screenshots).
- Any file-/process-level alerts from EDR/MDM that indicate access.
Prey tip: Decide lock vs. wipe within the first 1–4 hours. If you’re unsure about encryption or see identity risk, err on wipe and document your rationale.
Data-risk matrix: encryption, identities, and sensitive information
Rule of thumb: If identities or sensitive information might be reachable, treat the event as an identity & data incident first; hardware recovery is secondary.
Dealing with the aftermath: Insurance claims and tech support
After a laptop theft, your IT or tech support team is your first and most important point of contact. They are the ones who can contain the risk, trigger remote actions, and coordinate next steps for insurance, compliance, and data protection.
step 1 — Report the incident to your IT helpdesk immediately
Don’t delay. Every minute counts. Your IT team can remotely lock, locate, or wipe the device using tools like Prey or your MDM platform. Provide them with every detail you have — when and where the loss occurred, last known connection, and any suspicious account activity. This helps preserve the chain of custody and supports compliance with data protection laws such as GDPR or HIPAA.
step 2 — Follow internal incident response procedures
Most organizations have specific workflows for stolen devices. Follow them closely:
- Confirm whether the device contained sensitive data or credentials.
- Notify your manager or data protection officer if required.
- Document all actions taken (lock, wipe, revoke access) — these records are critical for audits or insurance claims.
step 3 — Coordinate with external tech support or manufacturer
Once your internal tech team has contained the risk, contact your laptop manufacturer’s support line. They can:
- Flag the device’s serial number in their service database.
- Provide warranty guidance or replacement options.
- In some cases, assist law enforcement if the device is recovered or serviced later.
step 4 — Insurance claims (after IT validation)
Only file an insurance claim once your IT team has completed the technical containment steps. You’ll need:
- A copy of the police report.
- A confirmation from your IT or security team of the incident response actions taken.
- Device identifiers such as serial number, asset tag, or IMEI.
Being proactive and coordinated — not just with insurers, but with your tech support — can make all the difference between a contained incident and a costly data breach.
While the claim is moving, keep security moving too
Your insurance claim will cover the hardware — but your IT playbook should cover the risk. While the adjuster does their job, keep your own security track alive: verify there’s no credential abuse, notify the right people, and tighten controls so the same breach doesn’t happen twice. The sections below guide you through the parallel response tracks that matter most after a device theft.
Dark web & credential exposure sweep
A claim pays for the laptop; it won’t protect your logins. Stolen endpoints often expose cached tokens, cookies, or saved credentials that attackers reuse within hours. A quick dark web and credential sweep helps you confirm whether any identities tied to the device are already circulating — and where to focus containment.
What to do
- Check for @yourcompany.com exposures—start with admins, finance, execs, and service accounts.
- Look for fresh dumps and any password reuse on core systems (IdP, email, cloud, VPN).
- Turn on/verify breach monitoring alerts for high-risk roles.
If you find exposure
- Force resets for the affected users; invalidate refresh tokens/app passwords.
- Add a short-term step-up MFA policy for risky groups; block legacy auth.
- Widen the search to exec assistants, shared mailboxes, and automation accounts.
Legal / HR / Insurance: who to notify and when
Once containment is underway, communication becomes your shield. Knowing who to notify and what to share avoids regulatory missteps and keeps everyone aligned. From legal and HR to insurance and possibly clients, clear coordination ensures every requirement is covered — and nothing is disclosed prematurely.
- Legal/Privacy: Confirm encryption status, signs of access, and whether regulations/contracts require notice. Approve wording (facts only).
- HR: Guide the employee (replacement process, safety), document policy steps without blame, coordinate offboarding if needed.
- Insurance: Submit the evidence log (invoice/warranty, Prey/MDM logs, police case #, lock/wipe timestamps). Follow carrier instructions.
- Clients / DPAs (if required): Check DPAs/MSAs for windows (e.g., 72 hours). Notify with essentials: what was lost, encryption status, actions taken, current risk.
Hardware recovery reality: expectations & safety
Chasing a stolen laptop can quickly turn risky — and rarely yields results. Setting the right expectations helps your team focus on what truly counts: securing data and maintaining compliance. Share verified info with law enforcement, but never attempt recovery yourself. Your goal now is visibility, not heroics.
- Do: Share verified coordinates and logs with law enforcement; keep collecting events for the case.
- Don’t: Attempt self-recovery, meet sellers, or confront anyone. Safety first.
- 72-hour pivot: If there’s no signal after ~72 hours, shift fully to identity protection, compliance, and the claim. Continue passive monitoring for late pings.
Prevention hardening pack (post-mortem controls)
The best incident response ends with learning. Once the immediate storm passes, use what you’ve learned to harden controls. Review identity, device, and operational gaps exposed by the theft. Each fix — from enforcing encryption to running remote-wipe drills — helps close the loop and reduce your next-time risk window.
Top recomendations:
Access & identity
- MFA everywhere, disable legacy auth, move to Just-in-Time admin.
- Quarterly access reviews for admin/finance/engineering.
Device & data
- Enforce BitLocker/FileVault with escrowed keys; verify at enrollment.
- Baseline endpoint tracking and run remote-wipe drills twice a year.
- Short screen-lock timers; startup password on macOS.
Operations
- Align MDM policies across Windows/macOS with your IdP (SSO/MFA).
- Store this playbook + templates in your ticketing system.
- Label assets clearly; track warranty/replacement SLAs.
Vendors & travel
- Create travel profiles with smaller data footprints and tighter policies.
- Bake encryption/MDM/reporting SLAs into vendor contracts.
Metrics that matter
- % devices with verified encryption
- Median time to session kill
- Median time to lock/wipe
- % admins on JIT
- Drill completion & success rate
Frequently asked questions
What to do if a company laptop is stolen?
Contain identities (SSO reset, session revocation), locate/lock/wipe, file reports, assess compliance, and start an insurance claim laptop theft.
Is it illegal to keep a company laptop?
Company devices are work equipment. Keeping one without authorization can be theft or conversion—escalate to HR/Legal.
What happens if you don’t report it?
You extend the window of opportunity thieves have to access data and accounts, increasing breach and compliance risk.
Do police ever find stolen laptops?
Yes, police can find stolen laptops, but success depends on the details you provide, like the serial number, make, and model. Smaller departments may have limited resources, so using tracking software like Prey can help provide location data to aid their investigation.
What to do if my laptop is stolen while traveling?
If your laptop is stolen while traveling:
- File a police report immediately with all laptop details.
- Notify your hotel or local authorities for additional support.
- Use tracking software like Prey to locate or lock the laptop remotely.
- Secure your online accounts by changing passwords and enabling multi-factor authentication.
- Contact your travel insurance provider if applicable.