Laptop Theft – 5 Protection Steps

Laptop Theft – 5 Protection Steps

Posted on 05. Jan, 2011 by in laptops

What really hurts?

When people steal a laptop, they are not just stealing a piece of expensive hardware. They may be stealing the intimate details of a person’s personal life, financial secrets and details and information that may be crucial to running one’s life. Losing the hardware hurts, but losing the data hurts even more.

Besides the tremendous inconvenience of not having access to important people or institutions at your fingertips, there are other worries. If the thieves use the passwords and other information to do identity theft, they can introduce a whole new world of hurt. Buzzblog reports on the case of laptop which had personal information about Boeing Wichita employees and the tale of woe of one of those employees that was victimized. Multiple accounts were opened with his information and it took him years to clear his name and he is still not free of problems.

The Stages of Laptop Theft Protection

These are the stages of laptop theft protection

  1. Detection – if they don’t know that you have a laptop,  they won’t try to steal it. Hiding it avoids problems.
  2. Access – Don’t allow a thief to have free access to your laptop. Stay near it and don’t leave it unguarded. Lock it, secure it and/or alarm it
  3. Data Protection – Back it up so that even if the laptop is stolen or destroyed, you still have your information. Encrypt it so that unauthorized people can’t get at it.
  4. Make it recoverable – Mark it or stamp it with personal identification. Register it with the manufacturer.
  5. Locate it – Use tracking software to find it if it was lost or stolen.

1.Detection Prevention

There’s nothing that broadcasts the fact that you have a valuable laptop more than a fancy special laptop case. The best way to store the laptop when you travel or move is to put it in a nondescript bag or briefcase. eBags sells Pacsafe bags which include backpacks that don’t have any hint that they are carrying a laptop. They are also made of rugged materials which can’t easily be slashed open. Additionally, they offer rugged locks which can be used to anchor the bag to some immovable object such as a pole or heavy table.

Don’t leave it in your car exposed on the seat. Don’t even leave it on a conference table at work unattended.

2.Deny Access

Don’t leave it in an open or exposed place where someone can easily grab it and make a quick getaway. If you are out eating with friends, make sure someone is watching it if you step away. Don’t get up to greet anyone in a crowded cafeteria or meeting place without taking it with you.

Airport security lines are very vulnerable areas. Don’t put your laptop through the security machine until you are ready to go through the metal detector. Don’t go into the metal detector until the laptop is in the machine and take it as soon as it gets out.

Even when you are using your laptop and you want to look at something or talk to someone, it pays to keep a hand or a finger on the laptop so that you are always aware of its status.

An extra level of protection can be provided by installing a lock or alarm. In an office environment, it makes sense to use a docking station which will secure the laptop to your desk.

3.Data Protection

The most valuable part of a laptop is actually the data that is on it. Protect it by backing it up. This is true even for desktop computers. Acronis and Fabs are 2 very powerful and effective backup programs. Back up to an external drive and keep it somewhere away from your laptop when not in use. In this way, even if your laptop is lost, destroyed or stolen you will be able to recover all your data.

Get 15% off on Acronis True Image Home 2011 with Coupon Code FMAATIH15

Online backup is especially useful for notebooks, ipads or laptops that are taken from place to place. They are always backing up wherever you are. However, this should not be the only form of backup that you use for a number of reasons described in . Idrive, Carbonite and Mozy are good programs with Idrive being my favorite.

Protect your personal and sensitive data from others by putting it into unreadable code. Encrypt your data so that only you or someone you trust can see it. I personally do this with Truecrypt which is free. For a full discussion of encryption see Security and Encryption.

Turn off your encrypted volume or drive when your laptop is not in use so that it will not be available to anyone that gets your laptop.

4.Make It Recoverable

If your laptop is lost or stolen, you want and honest finder to be able to return it and you want to be able to prove ownership in case the authorities locate it.

You should register your backup with your computer vendor. They can vouch for your ownership.

Another good idea is to tag it with and identification tag. It will have anonymous return information and may offer a reward for return. They are made to be difficult to remove. ArmorTag is one company that provides this service. Trackitback also provides for tagging and supports a reward and return service.

5.Locate the Stolen Laptop

You can also install location software which will use GPS technology to let the authorities locate your laptop when lost or stolen. The software also allows for disabling the computer or destroying sensitive data remotely. Once you indicate that the laptop is missing, the program will start transmitting its location to a central server and police agencies are alerted and can get it back.

LoJack for Laptops


Follow the 5 steps above to insure that your laptop stays safely with you. A few simple steps can save a world of grief.

Be Sociable, Share!

Tags: , , ,

47 Responses to “Laptop Theft – 5 Protection Steps”

  1. dieta

    22. Aug, 2011

    .An open laptop…If you are like millions of other people you dont always back up all of your most important information from your laptop. Unfortunately this causes a deep panic if your laptop is ever lost or stolen. Its difficult to depend on someone else to find the laptop for you such as police so be sure you have some kind of plan in place if you do lose your laptop..

  2. Sheli Sod

    24. Aug, 2011


    Review the LoJack description within the post for the solution to your issue.

  3. Aleda158

    29. Apr, 2012

    Hi there very nice website!! Man .. Excellent .. Superb .. I’ll bookmark your site and take the feeds also

  4. תאורה

    02. May, 2012

    Pretty! This was an incredibly wonderful article. Thanks for supplying this info.

  5. Sheli Sod

    02. May, 2012


    Very enlightening comment.

  6. Hey. Very nice site!! Man .. Beautiful .. Superb .. I will bookmark your site and take the feeds also…I am happy to locate a lot of useful information here in the post. Thank you for sharing..

  7. Reuben Moncur

    23. May, 2012

    Does your site have a contact page? I’m having problems locating it but, I’d like to send you an e-mail. I’ve got some suggestions for your blog you might be interested in hearing. Either way, great site and I look forward to seeing it grow over time.

  8. Its superb as your other blog posts : D, regards for posting . “A gift in season is a double favor to the needy.” by Publilius Syrus.

  9. ny post jobs

    10. Jul, 2012

    Great blog right here! Also your website so much up fast! What web host are you the use of? Can I am getting your associate hyperlink to your host? I desire my website loaded up as fast as yours lol

  10. Sheli Sod

    10. Jul, 2012

    @ny post jobs,

    Please replace your article spinner or get someone who is proficient in English to check.

  11. Leglas Artichoke

    13. Jul, 2012

    Excellent. And they said I was crazy..

  12. pusher furnace

    27. Jul, 2012

    There are some interesting points in time in this article however I don’t know if I see all of them heart to heart. There is some validity however I will take maintain opinion till I look into it further. Good article , thanks and we wish more! Added to FeedBurner as effectively

  13. romo

    21. Aug, 2012

    Hi! I just wanted to ask if you ever have any trouble with hackers? My last blog (wordpress) was hacked and I ended up losing a few months of hard work due to no data backup. Do you have any solutions to protect against hackers?

  14. Sheli Sod

    21. Aug, 2012


    You can protect yourself in a number of ways. First, use a router and don’t connect diretly to the modem. Secondly, install good anti virus software like Microsfot Security Essentials. Also get Malwarebytes to check anytime you suspect some viruses or illegal activity. See Computer Internet Security for the whole lowdown.

  15. dubturbo 2

    26. Aug, 2012

    It¡¦s actually a nice and helpful piece of info. I¡¦m glad that you simply shared this useful information with us. Please stay us up to date like this. Thanks for sharing.

  16. wozki widlowe

    08. Sep, 2012

    As soon as I detected this site I went on reddit to share some of the love with them.

  17. Geodezja Bielsko

    23. Sep, 2012

    Undeniably believe that which you stated. Your favorite justification appeared to be on the net the easiest thing to be aware of. I say to you, I definitely get annoyed while people think about worries that they plainly don’t know about. You managed to hit the nail upon the top and defined out the whole thing without having side-effects , people could take a signal. Will likely be back to get more. Thanks

  18. polo outlet

    14. Oct, 2012

    Thank you for the sensible critique. Me and my neighbor were just preparing to do a little research on this. We got a grab a book from our local library but I think I learned more clear from this post. I am very glad to see such fantastic information being shared freely out there.

  19. IBCBET

    24. Oct, 2012

    I like the valuable info you provide in your articles. I will bookmark your blog and check again here regularly. I am quite sure I will learn a lot of new stuff right here! Good luck for the next!

  20. Effie Kreiter

    14. Nov, 2012

    I have two computers: I call one the “good” computer — it has two monitors. The other is my “junk” computer with one screen where I download a lot of stuff to it.. . If I wanted to continue using both computers but only with the dual monitors, what would I need to buy? Is there some sort of splitter I can buy that will allow me to switch between each CPU? Where can I buy one if it does in fact exist? Will I still be able to use one mouse and keyboard?.

  21. Sheli Sod

    15. Nov, 2012

    Use a kvm switch for all the peripherals

  22. PPI Claim

    24. Nov, 2012

    I make a reply when I like a posting on an online site or if I’ve a little something to add up to the conversation. Generally it is brought on by the passion exhibited in the post I browsed. And after studying this specific posting on Laptop Theft – 5 Protection Steps | Computer Sales and Support. I was truly motivated enough to leave a response 😉 I really do have a few queries for you if it’s okay. Could it be only me or do a couple of these responses appear just as if they are written by brain dead people? 😛 And, if you are posting at additional websites, I would like to follow you. Would you prefer to share your community pages like your twitter feed, Facebook or linkedin account?

  23. seo link wheel

    05. Dec, 2012

    Thankyou for this post, I am a big fan of this web site would like to continue updated.

  24. I will right away snatch your rss feed as I can’t to find your e-mail subscription link or newsletter service. Do you have any? Kindly permit me know in order that I may just subscribe. Thanks.

  25. Sheli Sod

    19. Dec, 2012

    Just click on the orange RSS symbol next to the word posts on the top of the home page.

  26. technik administracji

    16. Jan, 2013

    I regard something really special and informative in this site, I will bookmark this site and continue reading your other blogs and your recent updates.

  27. Very good info. Lucky me I ran across your website by chance (stumbleupon). I’ve saved as a favorite for later!

  28. Cathern

    18. Feb, 2013

    You should absolutely do a 2nd part to this content.
    Many of us have unanswered concerns and we definitely want you to answer them for us,
    am I right guys?

  29. sant ritz

    04. Mar, 2013

    Howdy! I just want to give you a big thumbs up for your great info you have right here on this post. I will be coming back to your web site for more soon.

  30. kurye

    17. Mar, 2013

    This is a topic which is close to my heart… Many thanks! Where are your contact details though?

  31. I wanted to thank you for this wonderful read!! I absolutely loved every bit of it. I have you saved as a favorite to look at new stuff you post…

  32. Paczki do angli

    04. Apr, 2013

    This blog is faultless. I’m amazed.

  33. xenariojoure

    13. Apr, 2013

    you could check here

  34. data recovery mac

    16. Apr, 2013

    her comment is here at The Computer Doc

  35. online gambling

    21. Apr, 2013

    navigate to the Computer Doc

  36. online gambling

    21. Apr, 2013

    Great information. Lucky me I came across your website by chance (stumbleupon). I’ve saved as a favorite for later!

  37. Rude Manager

    22. Apr, 2013

    I needed to thank you for this good read!! I definitely loved every bit of it. I have got you saved as a favorite to look at new stuff you post…

  38. marwiko

    28. Apr, 2013

    Everyone loves it whenever people come together and share ideas. Great site, stick with it!


    29. Apr, 2013

    This is a topic that’s near to my heart… Best wishes! Where are your contact details though?

  40. Maynard Dubuque

    30. Apr, 2013

    fantastic points altogether, you simply received a new reader. What may you recommend about your publish that you made some days ago? Any sure?

  41. serviced office

    17. Nov, 2013

    WOW just what I was looking for. Came here by searching for %keyword%|
    serviced office

  42. Home security

    11. Dec, 2013

    I am not sure where you are getting your information, but good topic. I needs to spend some time learning much more or understanding more. Thanks for excellent info I was looking for this information for my mission.

  43. chiropractic friendswood

    08. Jan, 2014

    This is wonderful information that you gave us!

  44. Archie Boulware

    08. Mar, 2015

    Very interesting details you have noted , thanks for posting . “The earth has music for those who listen.” by William Shakespeare.

  45. Fraud Online

    05. Jul, 2015

    Hey there! I’m at work browsing your blog from my new iphone! Just wanted to say I love reading through your blog and look forward to all your posts! Keep up the superb work!

  46. Renaldo Frump

    23. Jul, 2015

    I really like your writing style, fantastic information, thanks for putting up :D. “In every affair consider what precedes and what follows, and then undertake it.” by Epictetus.

  47. mushiiiz

    09. Feb, 2016

    That is really attention-grabbing, You’re an overly skilled blogger. I’ve joined your feed and look forward to in the hunt for more of your magnificent post. Also, I have shared your web site in my social networks!

Leave a Reply

FireStats icon Powered by FireStats