094 90 48200    Get SUPPORT

Aniar IT Services Blog

What to Do Immediately If You’ve Lost Your Phone

What to Do Immediately If You’ve Lost Your Phone

In our last blog we gave you some advice on what to do if your phone has gone missing, but if it has been stolen or lost for good, there are more pressing issues than the anger and loss you feel; you need to ensure that you and the people you do business with are protected. Let’s take a look at what you need to do to make that happen.

Step 1: Assume Your Phone is Gone for Good

The first thing you need to be aware of is that you probably won’t be getting your device back. In fact, you should operate like you’ll never see it again. This is unfortunate as you’ll need to fork over hundreds of dollars to replace it, but in order to protect yourself and others and avoid even more cost, you have to take action. 

The truth is that your phone has access to a lot of different accounts. Think about how many apps you consistently use, and how many of them have access to your financial and personal information. Now think about how much data is on there from other people. Instant messages, contact info, social media, and your work profile all are exposed if someone is able to access the contents of your phone. 

Once it’s gone, it’s gone. Forget about that phone and forge ahead. 

Step 2: Remotely Lock and Wipe Your Device

Go ahead and wipe the device. You can do this with Apple’s Find My iPhone setting on iPhone or Google’s Find My Device application on Android. From these hubs you can track the device (if you want) but at this point you should just focus on getting the information off of the device as quickly as possible. 

To do this, Apple users will need to log into their iCloud account, while Android users will need to navigate to Google’s Find My Device page. Either one of these methods will give you the device’s exact location, which can be used in context. If it’s at the restaurant you last ate at, you could just go get it, but if it's some other place you haven’t been, you will want to wipe it and lock the contents of it down. 

If you haven't set the tools up, your wireless carrier or phone’s manufacturer may be able to help. Here are some links to information that you will need to get in touch with them:

Step 3: Report It

Now that you’ve come to the conclusion that you’ll never see your device again, you need to report it. If you own the device—not had it provided to you through work—you should contact your mobile carrier. They can block your phone from the network and make it much more difficult for people to siphon information off of it. 

For your convenience, here is some carriers’ contact information:

If your phone was given to you by your workplace, you definitely need to report it to them as well so they can take the steps to protect their company data. This goes for any device used for your work in any way. A lost device is a clear liability, with both your data and company data at real risk. Businesses need to have the capability to revoke access to company data and email remotely, or at least remove the device’s work profile.

Step 4: Change Your Passwords

It won’t be easy, it won’t be fun, but it’s time to fill a pot of coffee and change all of your passwords. You will have to change your passwords for your mobile account, and to be on the safe side, all of the accounts found on your phone. First start with these three, if you have them. 

Obviously, every password needs to be unique and complex. Don’t use the same password twice.

Then you will want to prioritize your next moves. Changing passwords is an extremely lengthy experience. We’ve given you an avenue of attack here, starting with: 

  • Email accounts (if you have others besides your main Apple/Google/Microsoft accounts)
  • Banking/financial accounts (bank accounts, credit cards, PayPal, merchant accounts, etc.)
  • Cloud storage accounts (e.g. Dropbox, Amazon, Box, iCloud, Google Drive, Onedrive, etc.)
  • Hosting/Domain-related accounts (e.g. GoDaddy, Network Solutions, Cloudflare, etc.)
  • Social media (e.g. LinkedIn, Facebook, Twitter, etc.)
  • eCommerce stores (e.g. Amazon, Best Buy, Walmart, ebay, etc.)
  • Services/utilities (e.g. Netflix, Hulu, your electric company, insurance companies, etc.)
  • Games and other apps

Again, this is going to take a long time. Take your time. You’ll feel better when all of your accounts are newly secured.

If You Suspect Your Phone Has Been Stolen, Report It to Authorities

After you are done with this, if it’s obviously been stolen, report it to the police. Why not? It probably won’t have any effect, but it is good to have a police record of the theft. These days, people don’t often steal phones, but it does happen occasionally. Most people today know that you can track a stolen phone, but those brazen enough to lift a smartphone are probably not the type of people you want to go confront over it. 

If You Find a Lost Phone

Now if you come across a phone in your daily jaunt out into the world, you will want to find someone to give it to. Typically if you find a phone it will be on a restaurant or bar room table. Just find the manager and give it over. It won’t take long and it could really help someone else out. 

We hope you never have to experience the loss of a phone, but if it does happen, we sincerely hope this guide helps.

How Blockchain is Changing Health Technology
How to Find Your Lost iPhone or Android Smartphone


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, February 26 2021

Captcha Image

By accepting you will be accessing a service provided by a third-party external to https://www.aniar.ie/

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Productivity Cloud Google Privacy Email Efficiency Workplace Tips Network Security User Tips Data IT Support Internet Hosted Solutions Mobile Device Innovation Software Microsoft Communication Hackers Hardware Small Business Collaboration Users Business VoIP Android Smartphones Data Backup Smartphone Phishing IT Services Data Recovery Managed IT Services Cybersecurity Computer Communications Tech Term Network Cloud Computing Windows 10 Mobile Devices Malware Gadgets Backup Managed Service Outsourced IT Business Continuity Windows Browser Miscellaneous Quick Tips Passwords Disaster Recovery Internet of Things Business Management Saving Money Upgrade Artificial Intelligence Information Facebook Spam BDR Server Holiday Microsoft Office Office 365 Social Media Covid-19 Save Money Chrome How To BYOD Router Wi-Fi Paperless Office Blockchain Automation Data Storage Windows 7 Apps Government Patch Management Operating System Word Applications Networking Encryption Mobile Office Cybercrime Computers Data Security Data Protection Telephone System HIPAA Vendor Remote Work Machine Learning Display Vulnerability Big Data Connectivity Ransomware Human Resources Infrastructure Money History Mobile Device Management Remote Monitoring Remote Staff Settings Bandwidth Virtualization Health Managed IT Two-factor Authentication Data Breach Vendor Management Net Neutrality Augmented Reality Servers Botnet Hard Drive Help Desk Identity Theft Office Spam Blocking Managed IT services Conferencing Compliance Digital Signage Redundancy Education Voice over Internet Protocol Managed Services Provider Cryptocurrency Telephone Systems Bring Your Own Device Software as a Service Procurement IT Management Training Social Engineering Avoiding Downtime Sports Website Access Control App Meetings WiFi CES Employee/Employer Relationship Fraud Managed Services Google Drive Comparison Virtual Assistant Google Docs Keyboard Wireless Audit Content Management VPN Private Cloud IT Plan Business Technology Law Enforcement Telephony Password OneNote Scam Processor Update Unsupported Software Business Intelligence Printing HBO Going Green SharePoint MSP Virtual Reality Professional Services Password Manager Nanotechnology Bing USB Apple Data loss Employee Managed IT Service Wireless Charging Inventory 5G Computer Fan Entertainment Warranty Telecommuting Development NIST Computer Care Project Management Quick Tip Software Tips Unified Threat Management ROI Personal Criminal Twitter Outlook Saving Time Digital Signature Hacker End of Support File Sharing ISP Skype Cabling Fiber Optics Business Mangement The Internet of Things Smart Tech HVAC Messaging Electronic Medical Records Wire Cortana Alert Google Apps FENG Printer Travel Bitcoin Online Shopping Regulations Mobile Computing Tools GDPR Work/Life Balance Digitize Addiction Frequently Asked Questions Recovery Credit Cards Supply Chain Management PDF Customer relationships Cryptomining Start Menu Cables Trend Micro Gmail SMS Data Management RMM Google Search Sync OLED Multi-Factor Security Using Data Workers YouTube Mouse Policy Safe Mode Security Cameras Batteries Evernote PCI DSS Cleaning Solid State Drive Smart Office Remote Computing Millennials IT Assessment Customer Service Shortcuts Excel Windows 10s Remote Worker Database Default App Shopping Recycling Devices Downtime Virtual Machine AI Employees Screen Mirroring Save Time Biometric Security Information Technology Authentication Microchip Employer-Employee Relationship Procedure Smartwatch Flash Virtual Private Network Practices Physical Security Document Management Camera Value Windows Server 2008 R2 Workforce OneDrive Cache Enterprise Content Management Mobility Tip of the week Amazon Wiring IT Infrastructure Specifications Social Network eWaste Thought Leadership Root Cause Analysis Hypervisor Sales Cast Proactive IT Manufacturing Trending Computing Search Engine FinTech HaaS Remote Workers Charger Hosted Computing Printers Copiers Wireless Internet Password Management Social Windows Server 2008 Amazon Web Services Peripheral Accountants Public Cloud Firewall Investment Legal Search Tech Support Wireless Technology Safety Emergency IBM Marketing Productivity CrashOverride Budget Personal Information Competition Customer Relationship Management IP Address Managed Service Provider Financial Regulation Hiring/Firing Domains Fun Company Culture Windows 10 Public Speaking Managing Stress Presentation Lithium-ion battery Hard Drives