Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

What to Do Immediately If You’ve Lost Your Phone

What to Do Immediately If You’ve Lost Your Phone

In our last blog we gave you some advice on what to do if your phone has gone missing, but if it has been stolen or lost for good, there are more pressing issues than the anger and loss you feel; you need to ensure that you and the people you do business with are protected. Let’s take a look at what you need to do to make that happen.

Step 1: Assume Your Phone is Gone for Good

The first thing you need to be aware of is that you probably won’t be getting your device back. In fact, you should operate like you’ll never see it again. This is unfortunate as you’ll need to fork over hundreds of dollars to replace it, but in order to protect yourself and others and avoid even more cost, you have to take action. 

The truth is that your phone has access to a lot of different accounts. Think about how many apps you consistently use, and how many of them have access to your financial and personal information. Now think about how much data is on there from other people. Instant messages, contact info, social media, and your work profile all are exposed if someone is able to access the contents of your phone. 

Once it’s gone, it’s gone. Forget about that phone and forge ahead. 

Step 2: Remotely Lock and Wipe Your Device

Go ahead and wipe the device. You can do this with Apple’s Find My iPhone setting on iPhone or Google’s Find My Device application on Android. From these hubs you can track the device (if you want) but at this point you should just focus on getting the information off of the device as quickly as possible. 

To do this, Apple users will need to log into their iCloud account, while Android users will need to navigate to Google’s Find My Device page. Either one of these methods will give you the device’s exact location, which can be used in context. If it’s at the restaurant you last ate at, you could just go get it, but if it's some other place you haven’t been, you will want to wipe it and lock the contents of it down. 

If you haven't set the tools up, your wireless carrier or phone’s manufacturer may be able to help. Here are some links to information that you will need to get in touch with them:

Step 3: Report It

Now that you’ve come to the conclusion that you’ll never see your device again, you need to report it. If you own the device—not had it provided to you through work—you should contact your mobile carrier. They can block your phone from the network and make it much more difficult for people to siphon information off of it. 

For your convenience, here is some carriers’ contact information:

If your phone was given to you by your workplace, you definitely need to report it to them as well so they can take the steps to protect their company data. This goes for any device used for your work in any way. A lost device is a clear liability, with both your data and company data at real risk. Businesses need to have the capability to revoke access to company data and email remotely, or at least remove the device’s work profile.

Step 4: Change Your Passwords

It won’t be easy, it won’t be fun, but it’s time to fill a pot of coffee and change all of your passwords. You will have to change your passwords for your mobile account, and to be on the safe side, all of the accounts found on your phone. First start with these three, if you have them. 

Obviously, every password needs to be unique and complex. Don’t use the same password twice.

Then you will want to prioritize your next moves. Changing passwords is an extremely lengthy experience. We’ve given you an avenue of attack here, starting with: 

  • Email accounts (if you have others besides your main Apple/Google/Microsoft accounts)
  • Banking/financial accounts (bank accounts, credit cards, PayPal, merchant accounts, etc.)
  • Cloud storage accounts (e.g. Dropbox, Amazon, Box, iCloud, Google Drive, Onedrive, etc.)
  • Hosting/Domain-related accounts (e.g. GoDaddy, Network Solutions, Cloudflare, etc.)
  • Social media (e.g. LinkedIn, Facebook, Twitter, etc.)
  • eCommerce stores (e.g. Amazon, Best Buy, Walmart, ebay, etc.)
  • Services/utilities (e.g. Netflix, Hulu, your electric company, insurance companies, etc.)
  • Games and other apps

Again, this is going to take a long time. Take your time. You’ll feel better when all of your accounts are newly secured.

If You Suspect Your Phone Has Been Stolen, Report It to Authorities

After you are done with this, if it’s obviously been stolen, report it to the police. Why not? It probably won’t have any effect, but it is good to have a police record of the theft. These days, people don’t often steal phones, but it does happen occasionally. Most people today know that you can track a stolen phone, but those brazen enough to lift a smartphone are probably not the type of people you want to go confront over it. 

If You Find a Lost Phone

Now if you come across a phone in your daily jaunt out into the world, you will want to find someone to give it to. Typically if you find a phone it will be on a restaurant or bar room table. Just find the manager and give it over. It won’t take long and it could really help someone else out. 

We hope you never have to experience the loss of a phone, but if it does happen, we sincerely hope this guide helps.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 28 February 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Software Efficiency Network Security Business Google Internet Microsoft Email Malware Backup Workplace Tips Innovation User Tips Data Computer Mobile Devices IT Services Hardware Android VoIP Disaster Recovery communications IT Support Smartphones Communication Business Continuity Miscellaneous Smartphone Mobile Device Browser Small Business Network Productivity Collaboration Quick Tips Cybersecurity Users Business Management Windows Managed IT Services Upgrade Phishing Data Backup Outsourced IT Ransomware Windows 10 Data Recovery Office Server Save Money Cloud Computing Passwords Windows 10 Chrome Virtualization Tech Term Saving Money Holiday Social Media Gadgets Microsoft Office Managed Service Automation Managed IT Services Operating System Artificial Intelligence Computers Facebook Cybercrime Hacking Wi-Fi BYOD Mobile Device Management Networking Internet of Things IT Support Health Spam Information Office 365 Remote Telephone Systems Information Technology Covid-19 Managed Service Provider Alert Social Engineering Mobility Router Bandwidth BDR Recovery Employer-Employee Relationship Big Data Password Remote Monitoring Money Data Breach Encryption Mobile Computing Applications App History Application Law Enforcement Human Resources Managed IT Remote Computing Data Storage Patch Management Blockchain Mobile Office Apps Paperless Office Office Tips Training Government VPN How To Private Cloud Bring Your Own Device Mouse Data Management HaaS Vulnerability Work/Life Balance Windows 7 Word Flexibility Marketing Servers WiFi IT solutions Entertainment Infrastructure Google Drive Website Voice over Internet Protocol Wireless Budget Data Security Gmail Avoiding Downtime Settings Two-factor Authentication Apple Conferencing Social Cleaning User Error Scam Telephone System Staff Software as a Service Meetings Machine Learning End of Support Connectivity Remote Work Education Physical Security Vendor Management Risk Management Safety Hacker Sports HIPAA Redundancy USB Keyboard The Internet of Things Lithium-ion battery Vendor Managed Services Display Data Protection Firewall Employee/Employer Relationship Save Time Virtual Reality RMM Computing Data storage Business Technology Content Management Automobile Network Congestion Access Control eWaste Computing Infrastructure Virtual Assistant Business Intelligence Virus Going Green Authentication Digital Signage Worker Unified Threat Management Audit IT Management Computer Accessories Wearable Technology Battery Retail Hard Drives Shadow IT Botnet Update IT Plan Legal Instant Messaging Procurement Excel Net Neutrality Workplace Strategy Robot Internet Exlporer Google Docs Unsupported Software Biometrics Printer Help Desk Identity Theft Bluetooth Virtual Desktop Printing Charger PDF DDoS Compliance OneNote Computer Care Augmented Reality Managed Services Provider Proactive IT Fraud SharePoint Current Events Database Best Practice Telephony IT Consultant Samsung Remote Worker YouTube Remote Workers Black Market Humor Cryptocurrency Customer Service Value Environment Processor Electronic Medical Records Spam Blocking Document Management Fax Server Solid State Drive Hard Drive Wireless Technology Comparison How to Downtime Hiring/Firing CES SaaS Smartwatch Evernote Tip of the week webinar Ergonomics WIndows 7 Emergency Wire Maintenance Employer Employee Relationship Development Colocation OLED Uninterrupted Power Supply Professional Services Travel IaaS Public Cloud Assessment PCI DSS Printers Bloatware Virtual Machine Millennials Employee Wireless Charging Windows Server 2008 2FA Fiber Optics Monitor Smart Office Messaging Tablets Cabling Tools Television Policy Virtual Private Network Entrepreneur Hypervisor Workforce Windows Media Player Streaming Media Cables Dark mode User Trend Micro PowerPoint Reputation Shortcut SMS Default App Tech Support Content Public Computer Procedure Techology Project Management Cost Management Saving Time Laptop Nanotechnology Telecommuting Google Search Cortana Regulations dark theme Managing Stress Social Networking Transportation Shopping Customers Rootkit AI IT Infrastructure Digital Signature Computer Fan Audiobook FinTech Warranty Cameras Touchpad Bing Google Apps Running Cable Workers Benefits Social Network HVAC Advertising Memory Investment Analysis FENG Politics IBM Employees Administrator Employee/Employer Relationships Devices Enterprise Content Management ISP Notifications Flash Windows 365 Smart Technology Video Conferencing MSP ROI Accountants Credit Cards Software Tips Supercomputer Sales Microchip Bitcoin Printer Server Thought Leadership Shortcuts Password Management Science Cryptomining Password Manager Sync Emails Point of Sale Personal Relocation Supply Chain Management Multi-Factor Security Monitoring Video Games Search Engine Batteries Twitter Two Factor Authentication Digitize NIST Business Mangement Distributed Denial of Service Netflix Windows 8.1 Worker Commute Customer Relationship Management Root Cause Analysis Experience Analyitcs Windows Server 2008 R2 Smart Tech Trending Amazon HBO Knowledge Customer relationships Scalability Programming Music Addiction IT Assessment Manufacturing Recycling Skype Email Best Practices Business Owner Data loss Wiring NarrowBand Practices Security Cameras Amazon Web Services Outlook Antivirus Leadership Computer Tips Search Troubleshooting Managed IT Service Cache OneDrive iPhone Safe Mode Windows 8 Biometric Security Criminal Start Menu Virtual CIO Screen Mirroring IT service Loyalty Peripheral Consultant GDPR Hosted Computing Online Shopping Frequently Asked Questions Digital Security Cameras Books Using Data Analytics Wireless Internet Copiers Files File Sharing Tablet 5G Mobile Windows 10s Cast Domains Quick Tip Best Available Camera Chromecast Inventory Specifications

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code