2

Possible Duplicate:
Tips for locating my stolen computer

My laptop was recently stolen.

It was a corporate system running XP, which means it was part of a domain - I'm assuming that makes it impossible for someone to log into it, although I know there are ways to reset the local admin account. Is there any way to tell if someone boots it up?

I was logged into gmail, using two factor authentication. I will change my password, but is there any chance of tracking any attempted accesses?

Other than changing passwords on all my web accounts, is there anything else I need to do?

chris
  • 9,595

2 Answers2

1

Report the theft to your IT department with an urgent priority. In the event the thiefs do break into your account they may gain access to network resources. In any case if you report it and some data is compromised then you've done everything you can and you can't (at least shouldn't) be held responsible.

Celeritas
  • 8,341
1

If your laptop was stolen, you have to make the assumption that everything has been compromised. On any OS, if a technical person physically has the machine, they have the capability to read the hard drive. Most likely, they will simply erase the hard drive, but you need to assume the worst.

The best way to prevent this is to use whole disk encryption programs such as TrueCrypt, BitLocker, PGP, etc. If the laptop is stolen and the disk is encrypted, then you can rest assured that no one can get the data.

Change all your domain password and website passwords. This is made easier with password programs like KeePass. If you use these password programs, you then have a complete list of everything you have a password for and will then know what to change. People often dont know how many passwords they actually use.

You might have had saving passwords off in your browser, but you might be surprised how easy it is to get past them. Often websites will offer to mail you a new password on reset, which isnt any good if someone has access to your mail. Another problem is websites will ask you a series of questions to reset your password. Many times automatic form completion can fill that info in.

I said it before and I will say it again, get disk encryption. Many are free. If a machine leaves a secure environment, you need to assume it will get stolen.

As for tracking attempts, thats a different story. Your IT department should be able to track attempts to log into a VPN or internal websites. However, everything else is unlikely.

Keltari
  • 75,447