Report a Lost or Stolen Laptop or Phone

Report a Lost or Stolen Laptop or Phone

Report a Lost or Stolen Laptop or Phone

Overview

If your work laptop or phone goes missing, the device itself matters less than the data and accounts on it. Acting fast lets us lock the device remotely and protect your company. This guide walks you through what to do in the first hour.

Before You Begin

  • Do not wait to retrace your steps. Report first, search second.
  • Have another device handy (a personal phone or coworker's computer) so you can sign in and reach support.
  • Note the time and place you last had the device.

Steps

  1. Contact support right away. Call or open a ticket at support.bostonmit.com. Provide:
    • Your name and email.
    • The device type (laptop model, iPhone, etc.) and any asset tag if you know it.
    • The last time and place you had it.
    • Whether you think it was lost or stolen.
  2. Tell your manager. Even if you plan to find it, your manager needs to know within the hour.
  3. Change your work password. From any other device, follow Reset Your Microsoft 365 Password. This kicks an attacker off the device if they are using a saved session.
  4. Sign out everywhere. Go to https://mysignins.microsoft.com on another device, click Sessions, and choose Sign out everywhere.
  5. Use Find My to locate the device. For an iPhone, sign into icloud.com/find using your personal Apple ID. For Android, go to android.com/find. For a Windows laptop, support can locate it through Intune.
  6. Mark it lost. In Find My iPhone, tap Mark as Lost. This locks the device and shows a custom message. Android has the same option in Find My Device.
  7. File a police report if it was stolen. A report number helps with insurance and is required if the device held regulated data. Send the report number to support.
  8. Let support wipe the device remotely. We will erase company data when you confirm there is no chance of recovery, or sooner if a wipe is the safer choice.

Troubleshooting

  • If you find the device after reporting it: tell support immediately. We will un-mark it lost and confirm it is safe to use again.
  • If you cannot reach support and the device contains client data: start with the password reset and Sign out everywhere. Those two steps protect most of the risk.
  • If a personal device that held work email is the one missing: the same steps apply. We can remove the work account remotely.
  • If the device was used to access regulated data (HIPAA, CMMC, financial): mention this on the ticket. Additional notifications may be required.

Related Articles

Need More Help?

Submit a ticket at support.bostonmit.com or email support@bostonmit.com.

    • Related Articles

    • Use a Hardware Security Key for Multi-Factor Authentication

      Use a Hardware Security Key for Multi-Factor Authentication Overview A hardware security key is a small USB or NFC device that proves it is really you when you sign in. It is the strongest form of MFA available because attackers cannot phish a ...
    • What to Do If Your Account Is Compromised

      What to Do If Your Account Is Compromised Overview If you think someone else has gotten into your work account, every minute counts. This guide walks you through the immediate steps to lock the attacker out and recover safely. Read it now, before ...
    • Report a Suspicious Email

      Report a Suspicious Email Overview When a phishing message slips into your inbox, reporting it helps protect your coworkers and trains your company's filters to catch similar messages next time. This guide shows you how to report a suspicious email ...
    • Set Up Multi-Factor Authentication with Microsoft Authenticator

      Set Up Multi-Factor Authentication with Microsoft Authenticator Overview Multi-factor authentication (MFA) adds a second check to your sign-in so a stolen password alone cannot get into your account. This guide walks you through setting up the ...
    • Recognize a Phishing Email

      Recognize a Phishing Email Overview Phishing is the most common way attackers get into a work account. The messages look like ordinary email but are designed to trick you into clicking a bad link, entering your password, or paying a fake invoice. ...