Your laptop was just stolen — what now?
A stolen laptop is a breach waiting to happen. The four things you do in the next 30 minutes decide whether it's a property loss or a data incident.
A stolen work laptop is not just a piece of hardware gone. It's a potential breach sitting in someone else's hands. What you do in the next 30 minutes decides whether it's a $2,000 property loss or a six-figure data incident.
Why it's worse than most people assume
A determined thief with the right tools can bypass a Windows login in about twenty minutes if the drive isn't encrypted. That means everything on the machine — emails, saved passwords, cached documents, SharePoint sync folders — is theirs. If the laptop was still logged into email or company systems, they can walk right into your tenant.
Two real scenarios
“A sales manager's laptop was stolen from her car in a hotel parking lot during a trade show.”
Red flag: No disk encryption. Thief cloned the drive and sold client data on a forum. Six months of breach fallout.
“A consultant left his laptop in an Uber and realized only when he got home.”
Red flag: BitLocker was on and MDM was enrolled. Laptop was remote-wiped that evening. Insurance replaced it. No data impact.
The 30-minute checklist
- Remote-wipe the device from MDM (Intune, Jamf, Google) the moment you know it's gone.
- Revoke all active sign-in sessions for that user in Microsoft 365 / Google Workspace.
- Force a password reset on every account the user had access to.
- Rotate any saved credentials — password manager master password, browser saved passwords.
- Report to police and file an insurance claim — keep documentation for compliance.
What you should already have in place
- Full-disk encryption on every work device (BitLocker, FileVault).
- MDM enrollment for remote wipe capability.
- Short screen auto-lock — five minutes, not thirty.
- A published 'lost device' policy so employees know exactly who to call.
No MDM yet?
Deploying Intune or Jamf takes a day for a small team and costs less than a single breach. Ask us about it.
- 1Verify every work laptop has full-disk encryption enabled today.
- 2Enroll every device in an MDM platform so you can wipe remotely.
- 3Publish a lost/stolen device policy — who to call, what happens next.
- 4Set screen auto-lock to 5 minutes or less on every device.
- 5Practice the wipe process in a test so you know it works when it matters.
Want help securing your business?
Schedule a quick security review with our team. 15 minutes, no sales pressure — walk away knowing exactly where your gaps are.
Schedule a quick security reviewKeep reading
Your public Wi-Fi is not safe.
Hotel, airport, and coffee-shop Wi-Fi are still hunting grounds. Your phone's hotspot or a business VPN is a two-minute fix that shuts them down.
ReadTip #17 · Remote & mobileThe remote worker security checklist.
Your employee's home network is now part of your company's security perimeter. Here's the ten-item checklist that actually protects it.
Read