If My Laptop Is Stolen What Should I Do? | Lock Accounts Now

Start by locking each account, filing a police report, and triggering remote lock or erase if it’s already set up.

A stolen laptop feels personal. It’s photos, logins, work files, messages—gone in one grab. You can still cut the damage fast if you move in the right order. This article gives you that order, with steps you can do from your phone or a borrowed computer.

If My Laptop Is Stolen What Should I Do? A Calm First-Hour Plan

Work down this list. If one step isn’t possible, skip it and keep going.

  1. Get safe and confirm it’s theft, not a misplace.
  2. Lock your main email and change that password first.
  3. Sign out of sessions for email, password manager, and cloud storage.
  4. Run tracking and lock or erase if you already enabled it.
  5. Freeze payment risk by checking bank activity and turning on alerts.
  6. Report it to the venue plus local police and save the report number.
  7. Start a record with dates, calls, and screenshots.

What To Do In The First 10 Minutes

The first 10 minutes are about one thing: stopping password resets and stopping “already signed in” access.

Secure The Email Account Tied To Your Laptop

Email is the reset button for almost all other accounts. Change your email password from a trusted device, then turn on two-step verification if it isn’t on.

  • Check the “sent” folder for messages you didn’t send.
  • Review backup email and phone numbers.
  • Log out of other devices and web sessions when the provider offers it.

Lock Your Password Manager And Cloud Storage Next

If you use a password manager, change that master password and force a sign-out on other devices. Then secure cloud drives where files sync. Think tax PDFs, scans of IDs, invoices, medical files, or client docs.

Capture Device Details While You Still Can

Write this down now so you don’t chase details later:

  • Brand, model, color, and any distinct marks
  • Serial number (from a receipt, box, or account page)
  • Device name shown in your account dashboard
  • Whether the drive was encrypted (BitLocker, FileVault)

Stop Access On The Laptop Itself

If remote tools were enabled before the theft, use them right away. They can show a last location, lock the screen with a message, and in some cases erase data. If the laptop stays offline, you may only see older locations. Still useful for reports.

Windows: Find And Lock If It Was Set Up

On Windows, “Find my device” can locate and lock a laptop when it’s online and location was turned on. Sign in to your Microsoft account devices page and look for your laptop in the list. If you see a location, screenshot it with the time shown.

macOS: Use Your Apple Account Device Tools

On a Mac, the same idea applies: use the device tools tied to your Apple Account. If Find My was enabled, you may be able to show a message, lock it, and erase it when that’s the right call.

Decide Between “Locate” And “Erase”

Erase is final. Do it if you think someone can get past your login, or if the laptop held files you can’t risk leaking. If you’re confident your drive encryption is on and your login password is strong, you may track first, then erase if the laptop appears in a risky place or moves in a pattern that suggests theft rings.

Lock Down Accounts In The Right Order

Work from the center outward: email, password manager, cloud storage, banking, shopping, then social and messaging.

Reset Passwords In A Way That Ends Active Sessions

When you change a password, look for options like “sign out of all devices,” “log out of other sessions,” or a device list where you can remove access. Do it, even if it feels repetitive.

Handle Money And Purchases

Open each bank and card app and check these three areas:

  • Recent transactions and pending charges
  • New payees or transfer rules
  • Alerts for each purchase, transfer, or login

If you spot anything odd, call the fraud line from the number on the back of your card or inside the official app. Ask for a card replacement and a block on new transfers until you regain control.

Don’t Forget Browser Sync And Autofill

If your browser profile was signed in, passwords and sessions can sync. Sign out of that profile from the account security page when you can. Then rotate passwords for the accounts that can cause the most damage: email, banks, payroll, and shopping sites that store card details.

Report The Theft So You Can Prove It

Paperwork feels slow, yet it’s what makes claims and disputes work. Get clean facts and keep them in one place.

Notify The Place Where It Happened

If it was a cafe, hotel, school, rideshare, or office building, ask for security staff. Request that camera footage be kept. Write down the person’s name and any incident number.

File A Police Report

Bring your notes: serial number, description, and any tracking screenshots. Ask for the report number and the officer’s name. If you have renters or homeowners insurance, that report number is often required.

Tell Work Or School IT Right Away

If the laptop touched work or school systems, report it even if it’s your personal device. IT can revoke access tokens, reset sign-ins, and cut off sensitive apps faster than you can do alone.

First-Day Action Map

After the first hour, use this as your same-day map. It’s built to catch delayed risks like shared file links, saved forms, and test charges.

Time Window Action What You Get From It
0–15 minutes Change email password; turn on two-step verification Blocks password resets across your accounts
15–30 minutes Sign out of sessions for email, cloud drive, password manager Kicks out active logins from the stolen device
30–45 minutes Run tracking; lock screen; save screenshots Creates a clean timeline for reports
45–60 minutes Check bank and card activity; turn on alerts Catches fraud early and stops test charges
Same day File police report; notify venue security; save case numbers Proof for insurance and later disputes
Same day Tell employer/school IT; revoke access; rotate work passwords Protects accounts tied to work systems
Within 48 hours Review cloud storage sharing links and shared folders Closes open links that can leak files
Within 7 days Change passwords for shopping, social, messaging, gaming Stops account takeover attempts

What To Do After a Laptop Is Stolen From Home Or Travel

Where the theft happened shapes your next moves.

If It Was Taken From Your Home

  • Check for missing paper files: passports, tax records, checkbooks.
  • Change home Wi-Fi password and router admin password if the laptop had saved access.
  • If entry items were taken too, change locks or codes.

If It Was Taken While Traveling

  • Notify the hotel, transit office, or airport desk right away.
  • Review your receipts and photos so your report timeline stays tight.
  • Rotate passwords sooner if you used public Wi-Fi or shared chargers.

Keep Identity Risk Under Control For 30 Days

Identity misuse often shows up later. Treat the next 30 days as a watch window.

Watch For Login Alerts And Reset Emails

Turn on security alerts anywhere you can. If you get a reset email you didn’t trigger, don’t click links inside it. Open the service in your browser or app and change the password from there.

Place A Fraud Alert Or Credit Freeze If Needed

If the laptop held scans of IDs, tax forms, or saved card numbers, you may want a fraud alert or a credit freeze. Use the official FTC flow at IdentityTheft.gov’s device and info loss steps so you finish the paperwork in the right order.

Area What To Check What To Do If You See Trouble
Email Forwarding rules, unknown sign-ins, restore changes Remove rules, reset password, sign out on all devices
Banking Transfers, new payees, small test charges Call fraud line, block transfers, replace cards
Shopping Saved cards, new shipping destinations Remove cards, change password, add purchase alerts
Mobile carrier Port-out settings, account PIN, SIM changes Add a port-out PIN and account lock
Cloud storage Shared links, recent downloads Disable links and tighten sharing
Social accounts New logins, posts, DMs sent Reset passwords and revoke sessions

Set Yourself Up So This Is Easier Next Time

Once you’re back on your feet, set three guardrails on your replacement device.

Turn On Full-Disk Encryption

Encryption makes the drive unreadable without your login. Pair it with a strong password you haven’t used on other sites.

Use Two-Step Verification On All Accounts

Use an authenticator app or hardware token when possible. Text messages can fail during phone number attacks, so treat SMS as a fallback, not the main lock.

Stop Saving Passwords In The Browser

If you use a password manager, keep your browser from storing extra copies. Clear saved cards and remove extensions you don’t fully trust.

Printable Checklist For Your Notes App

Copy this list into your phone now, before you ever need it:

  • Change primary email password; enable two-step verification
  • Sign out of sessions: email, cloud drive, password manager
  • Use device tracking; lock screen; decide on erase
  • Check bank and card activity; set alerts; replace cards if needed
  • Notify venue security; ask that camera footage be kept
  • File police report; save report number and officer name
  • Tell employer/school IT; revoke access tokens
  • Review cloud sharing links and shared folders
  • Watch login alerts and reset emails for 30 days

References & Sources