Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

What to Do Immediately If You’ve Lost Your Phone

What to Do Immediately If You’ve Lost Your Phone

In our last blog we gave you some advice on what to do if your phone has gone missing, but if it has been stolen or lost for good, there are more pressing issues than the anger and loss you feel; you need to ensure that you and the people you do business with are protected. Let’s take a look at what you need to do to make that happen.

Step 1: Assume Your Phone is Gone for Good

The first thing you need to be aware of is that you probably won’t be getting your device back. In fact, you should operate like you’ll never see it again. This is unfortunate as you’ll need to fork over hundreds of dollars to replace it, but in order to protect yourself and others and avoid even more cost, you have to take action. 

The truth is that your phone has access to a lot of different accounts. Think about how many apps you consistently use, and how many of them have access to your financial and personal information. Now think about how much data is on there from other people. Instant messages, contact info, social media, and your work profile all are exposed if someone is able to access the contents of your phone. 

Once it’s gone, it’s gone. Forget about that phone and forge ahead. 

Step 2: Remotely Lock and Wipe Your Device

Go ahead and wipe the device. You can do this with Apple’s Find My iPhone setting on iPhone or Google’s Find My Device application on Android. From these hubs you can track the device (if you want) but at this point you should just focus on getting the information off of the device as quickly as possible. 

To do this, Apple users will need to log into their iCloud account, while Android users will need to navigate to Google’s Find My Device page. Either one of these methods will give you the device’s exact location, which can be used in context. If it’s at the restaurant you last ate at, you could just go get it, but if it's some other place you haven’t been, you will want to wipe it and lock the contents of it down. 

If you haven't set the tools up, your wireless carrier or phone’s manufacturer may be able to help. Here are some links to information that you will need to get in touch with them:

Step 3: Report It

Now that you’ve come to the conclusion that you’ll never see your device again, you need to report it. If you own the device—not had it provided to you through work—you should contact your mobile carrier. They can block your phone from the network and make it much more difficult for people to siphon information off of it. 

For your convenience, here is some carriers’ contact information:

If your phone was given to you by your workplace, you definitely need to report it to them as well so they can take the steps to protect their company data. This goes for any device used for your work in any way. A lost device is a clear liability, with both your data and company data at real risk. Businesses need to have the capability to revoke access to company data and email remotely, or at least remove the device’s work profile.

Step 4: Change Your Passwords

It won’t be easy, it won’t be fun, but it’s time to fill a pot of coffee and change all of your passwords. You will have to change your passwords for your mobile account, and to be on the safe side, all of the accounts found on your phone. First start with these three, if you have them. 

Obviously, every password needs to be unique and complex. Don’t use the same password twice.

Then you will want to prioritize your next moves. Changing passwords is an extremely lengthy experience. We’ve given you an avenue of attack here, starting with: 

  • Email accounts (if you have others besides your main Apple/Google/Microsoft accounts)
  • Banking/financial accounts (bank accounts, credit cards, PayPal, merchant accounts, etc.)
  • Cloud storage accounts (e.g. Dropbox, Amazon, Box, iCloud, Google Drive, Onedrive, etc.)
  • Hosting/Domain-related accounts (e.g. GoDaddy, Network Solutions, Cloudflare, etc.)
  • Social media (e.g. LinkedIn, Facebook, Twitter, etc.)
  • eCommerce stores (e.g. Amazon, Best Buy, Walmart, ebay, etc.)
  • Services/utilities (e.g. Netflix, Hulu, your electric company, insurance companies, etc.)
  • Games and other apps

Again, this is going to take a long time. Take your time. You’ll feel better when all of your accounts are newly secured.

If You Suspect Your Phone Has Been Stolen, Report It to Authorities

After you are done with this, if it’s obviously been stolen, report it to the police. Why not? It probably won’t have any effect, but it is good to have a police record of the theft. These days, people don’t often steal phones, but it does happen occasionally. Most people today know that you can track a stolen phone, but those brazen enough to lift a smartphone are probably not the type of people you want to go confront over it. 

If You Find a Lost Phone

Now if you come across a phone in your daily jaunt out into the world, you will want to find someone to give it to. Typically if you find a phone it will be on a restaurant or bar room table. Just find the manager and give it over. It won’t take long and it could really help someone else out. 

We hope you never have to experience the loss of a phone, but if it does happen, we sincerely hope this guide helps.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 25 December 2024
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Network Security Google Business Microsoft Internet Email Malware Workplace Tips Backup Innovation Data User Tips Computer Mobile Devices IT Services Hardware Android VoIP Disaster Recovery communications Smartphones Communication IT Support Business Continuity Miscellaneous Smartphone Mobile Device Browser Small Business Network Collaboration Productivity Cybersecurity Quick Tips Users Business Management Upgrade Phishing Managed IT Services Windows Outsourced IT Ransomware Data Backup Windows 10 Server Save Money Cloud Computing Data Recovery Office Windows 10 Passwords Chrome Social Media Virtualization Gadgets Saving Money Holiday Tech Term Automation Microsoft Office Managed IT Services Managed Service Operating System Facebook Cybercrime Computers Artificial Intelligence IT Support Hacking Internet of Things Health Wi-Fi BYOD Mobile Device Management Networking Remote Telephone Systems Managed Service Provider Information Technology Covid-19 Alert Information Spam Office 365 Router Social Engineering Mobility BDR Recovery Employer-Employee Relationship Bandwidth Applications App History Big Data Law Enforcement Human Resources Mobile Computing Data Breach Password Application Money Remote Monitoring Encryption How To Office Tips Training Government Data Storage VPN Patch Management Private Cloud Blockchain Paperless Office Managed IT Remote Computing Apps Mobile Office Google Drive Wireless Avoiding Downtime Gmail Vulnerability Settings Flexibility Windows 7 Word Marketing Two-factor Authentication WiFi Bring Your Own Device IT solutions Servers Entertainment Data Management Work/Life Balance Website Mouse Budget HaaS Infrastructure Voice over Internet Protocol Data Security Safety Sports HIPAA Risk Management Data Protection Redundancy Hacker Keyboard The Internet of Things Lithium-ion battery Vendor Managed Services Conferencing Display Scam Firewall Save Time Software as a Service Telephone System Employee/Employer Relationship Staff Virtual Reality RMM Machine Learning Apple Connectivity Remote Work Vendor Management Cleaning Social USB User Error End of Support Meetings Education Physical Security Workplace Strategy Robot Excel Remote Worker Net Neutrality Value Biometrics Cryptocurrency Help Desk PDF Spam Blocking Virtual Desktop Electronic Medical Records Printing Proactive IT Comparison DDoS Hiring/Firing Managed Services Provider Best Practice SharePoint YouTube CES Black Market Database Remote Workers Business Technology Content Management Virus Access Control Customer Service Environment Processor Document Management Business Intelligence Unified Threat Management Wireless Technology Virtual Assistant Solid State Drive Computer Accessories Authentication How to Audit Downtime Fax Server Worker Hard Drive IT Management Botnet SaaS Data storage Automobile IT Plan Update Computing Printer Bluetooth Unsupported Software Computing Infrastructure Network Congestion Google Docs eWaste Going Green Identity Theft Charger Compliance Digital Signage IT Consultant Battery OneNote Computer Care Shadow IT Current Events Telephony Legal Wearable Technology Augmented Reality Humor Fraud Retail Samsung Hard Drives Internet Exlporer Instant Messaging Procurement Skype Trending Running Cable Social Network Smart Tech Investment Addiction Amazon Data loss Notifications Memory Leadership Employees Troubleshooting Employee/Employer Relationships Consultant Recycling Outlook Start Menu Analytics Windows 365 Wiring ISP Practices ROI Cache Amazon Web Services Screen Mirroring Relocation Loyalty Video Conferencing Sales Books Bitcoin Safe Mode Shortcuts Best Available Criminal Frequently Asked Questions Mobile Video Games Windows 10s Point of Sale Personal Science GDPR Cryptomining WIndows 7 Hosted Computing Wireless Internet Worker Commute Online Shopping Cast Supply Chain Management webinar Monitoring Emergency Batteries File Sharing Experience Tip of the week Professional Services Scalability Specifications Distributed Denial of Service Public Cloud Windows 8.1 Customer Relationship Management Employer Employee Relationship Digitize Camera Inventory Analyitcs Windows Server 2008 R2 Wire Business Owner Evernote Assessment NarrowBand Customer relationships Programming Windows Server 2008 Travel Tools Search PowerPoint Millennials Windows Media Player Email Best Practices IT Assessment Printers Manufacturing User Smart Office Wireless Charging iPhone Television Antivirus Computer Tips Managed IT Service Security Cameras Workforce Virtual CIO OneDrive Windows 8 Virtual Private Network Biometric Security Managing Stress Cables Files IT service Public Computer Peripheral Chromecast Digital Security Cameras Transportation Using Data Regulations Cameras Nanotechnology Telecommuting Computer Fan Rootkit Copiers Tablet Project Management 5G Cortana Colocation Domains Uninterrupted Power Supply Quick Tip Workers Ergonomics Benefits Smartwatch Digital Signature IaaS FENG Monitor Maintenance Development Warranty OLED Bloatware Virtual Machine HVAC Google Apps IBM PCI DSS Printer Server 2FA Smart Technology Fiber Optics Employee Analysis Flash Devices Reputation Streaming Media Messaging Tablets Administrator Cabling Tech Support Policy Entrepreneur Hypervisor Enterprise Content Management Content Software Tips Supercomputer Techology Emails Laptop Dark mode Trend Micro MSP Accountants Sync Default App Thought Leadership Credit Cards Customers Shortcut SMS Microchip Procedure Cost Management Saving Time Password Management Audiobook Password Manager Multi-Factor Security Netflix Touchpad dark theme Social Networking Two Factor Authentication Shopping Google Search IT Infrastructure Twitter Root Cause Analysis AI Search Engine Knowledge FinTech Music NIST Bing Politics Business Mangement HBO Advertising

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code