Network Brainiacs
Tip #23·Remote & mobile

Your laptop was just stolen — what now?

A stolen laptop is a breach waiting to happen. The four things you do in the next 30 minutes decide whether it's a property loss or a data incident.

A stolen work laptop is not just a piece of hardware gone. It's a potential breach sitting in someone else's hands. What you do in the next 30 minutes decides whether it's a $2,000 property loss or a six-figure data incident.

Why it's worse than most people assume

A determined thief with the right tools can bypass a Windows login in about twenty minutes if the drive isn't encrypted. That means everything on the machine — emails, saved passwords, cached documents, SharePoint sync folders — is theirs. If the laptop was still logged into email or company systems, they can walk right into your tenant.

Two real scenarios

A sales manager's laptop was stolen from her car in a hotel parking lot during a trade show.

Red flag: No disk encryption. Thief cloned the drive and sold client data on a forum. Six months of breach fallout.

A consultant left his laptop in an Uber and realized only when he got home.

Red flag: BitLocker was on and MDM was enrolled. Laptop was remote-wiped that evening. Insurance replaced it. No data impact.

The 30-minute checklist

  • Remote-wipe the device from MDM (Intune, Jamf, Google) the moment you know it's gone.
  • Revoke all active sign-in sessions for that user in Microsoft 365 / Google Workspace.
  • Force a password reset on every account the user had access to.
  • Rotate any saved credentials — password manager master password, browser saved passwords.
  • Report to police and file an insurance claim — keep documentation for compliance.

What you should already have in place

  • Full-disk encryption on every work device (BitLocker, FileVault).
  • MDM enrollment for remote wipe capability.
  • Short screen auto-lock — five minutes, not thirty.
  • A published 'lost device' policy so employees know exactly who to call.

No MDM yet?

Deploying Intune or Jamf takes a day for a small team and costs less than a single breach. Ask us about it.

Do this today
  • 1Verify every work laptop has full-disk encryption enabled today.
  • 2Enroll every device in an MDM platform so you can wipe remotely.
  • 3Publish a lost/stolen device policy — who to call, what happens next.
  • 4Set screen auto-lock to 5 minutes or less on every device.
  • 5Practice the wipe process in a test so you know it works when it matters.

Want help securing your business?

Schedule a quick security review with our team. 15 minutes, no sales pressure — walk away knowing exactly where your gaps are.

Schedule a quick security review

Keep reading