top of page
  • Writer's pictureNisarg Naik

Back-up Plan For A Device Theft Situation

With the increasing use of electronic devices such as laptops, tablets, cell phones, and other personal gadgets, device theft cases have also increased. Victims have become the target of thieves everywhere.

Though these devices make it easier to store and access personal and professional data, simultaneously, they may also put the personal data at risk.

A stolen device is one of the biggest fears of users, primarily if they use such devices (laptop, mobile phones) to access their personal information, bank accounts, or work on the go.

The cost of a stolen tablet, laptop, or other electronic item is not only the cost of replacement, but also the cost of accessories and accessories, installed software, and the cost of any damaged information from that device.

The biggest cost (if your employer removes your device) is the potential disclosure and liability that may arise from any confidential company and customer information.

What to do if your device has been stolen?

The tips below provide effective theft prevention strategies and effective measures to protect your devices and personal data.


Get to know the three most common places where mobile devices and laptops are stolen: airports, crowded traffic and cars - and always keep your belongings hidden when in public. When traveling, carry your devices with a small nondescript case, bag or purse while traveling. Putting these items in a computer-generated box is an instant warning to thieves who have these important items.


If you do not use it, lock your device in a cupboard or cupboard, use a security cable, or take it with you.


If your device looks different, chances are someone stole your device and said that they thought it belonged. Sometimes tagging makes it difficult for a laptop to resell, so it is less likely to be stolen. Use permanent marking, recording, or interrupting product tracking marker.


Use a password, password, or fingerprint to protect your device from malicious intrusion. If you choose to use a password, it is important that you make sure you choose different passwords for different programs or devices.


Install and use tracking and retrieval software installed on multiple devices (e.g., the "Find My iPhone" feature on iOS) or invest in commercial products such as LoJack for Laptops or Prey. Some software includes remote wipe. This feature allows you to sign in to an online account and delete all information on your device. There are subscribers and free versions of this type of software, and each offers a different set of features. Search online for the best combination of performance and cost to meet your needs.


Find out if your device is automatically encrypting your data, and make sure you're always updating your information. Keep an external copy of any important files stored on your devices in a safe place. If your device does not use encryption automatically, enable or install encryption software.


Record the manufacturer, model, and serial number of your mobile devices and keep the information in a safe place. This information can assist in filing a police report and verifying your device, if available.


If your phone or any device is stolen, file a police report immediately.

Notify providers.

Keep important phone numbers as your mobile provider or IT support department can use, so you can quickly report if a device is lost or stolen. In some cases, your mobile phone provider or support desk may disable, lock, or wipe the device remotely.

Device theft and data loss increase the concerns of all users. According to the FBI, 97 percent of stolen devices are not recovered. As we move more and more and rely on more mobile devices including laptops, smartphones, and tablets to do business, the crime associated with these services is also growing. Criminals are increasingly innovating and are clever at finding ways to steal important information on mobile devices and laptops that don't have proper security. Be careful, secure, and most importantly, be ready for your backup plan.

23 views0 comments
bottom of page