Recover a stolen laptop, or prepare for the day your laptop is stolen

You may or may not be able to recover your stolen laptop, but the precautions you take beforehand can put the odds in your favor.

Sylvia Chepkurui asked, "Can I recover my stolen laptop using the serial number?"

Probably not, but having the serial number gives you at least some chance of recovery. Without it, even if the police find your laptop in a stash of stolen property, you would have no way of proving it's yours.

And no, booting the computer, entering your password, and showing your files won't work--unless it's recovered in the first few hours after the theft. Stolen computers' hard drives are almost always wiped clean of any record of the lawful owner.

[Have a tech question? Ask PCWorld Contributing Editor Lincoln Spector. Send your query to]

So it's important to keep a written record of your PC's serial number--and make sure that record isn't stored exclusively on your PC. Put it on paper or in the cloud.

If your laptop is stolen, report the crime to the police, and give them the serial number. They're not going to put their top detective on the case, but if they happen to find your PC, they'll contact you.

But you can do some detective work of your own. Check Craigslist for a laptop that sounds like yours. Don't stick to your immediate location; search in nearby counties as well. If you find something that really matches your property, report it to the police.

And yes, I know someone who recovered his stolen bicycle this way.

To greatly increase the recovery odds while you still have your laptop, you can subscribe to a special service such as Absolute LoJack. Your laptop likely already has the hardware built in, but it's useless without the $40-a-year-subscription.

Another service, GadgetTrak, charges only $20 a year.

Both of these services have their own investigators and claim a very high rate of return. But I have no way of testing or judging their claims.

You may get your hardware back, but you will never get the files back from a stolen laptop. What's more, criminals just might get their hands on files that contain your private information.

I've said it before and I'll say it again: Back up your library folders on a daily basis. And encrypt your sensitive files.

Join the CSO newsletter!

Error: Please check your email address.

Tags pcworldCraigslistsecurityhardware systemslaptops

More about LoJack

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Lincoln Spector

Latest Videos

  • 150x50

    CSO Webinar: Will your data protection strategy be enough when disaster strikes?

    Speakers: - Paul O’Connor, Engagement leader - Performance Audit Group, Victorian Auditor-General’s Office (VAGO) - Nigel Phair, Managing Director, Centre for Internet Safety - Joshua Stenhouse, Technical Evangelist, Zerto - Anthony Caruana, CSO MC & Moderator

    Play Video

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

More videos

Blog Posts

Market Place