facebook linkedin twitter

Computerware Blog

Tip of the Week: What to Do if Your Smartphone Goes Missing

Tip of the Week: What to Do if Your Smartphone Goes Missing

Uh oh—your mobile device is missing.

If you ever find yourself in this situation, time is of the essence… particularly if you have reason to believe that your device was stolen. To help prevent things from getting messy, we’ve put together a checklist for you to run down in case you suddenly can’t find your smartphone or tablet.

Bear in mind that a few of these steps will require some proactive setup on your part, which we’ll make note of.

Step 1: Assume Once a Device is Gone, It’s Gone for Good

While this outlook sounds bleak and very well may not be accurate, it is important that you make the presumption that a lost device will need to be replaced. This way, you’ll be more motivated to—first—protect the data that is stored on it, and—secondly—give yourself a means of recovering this data after the fact.

Consider the ramifications of losing your smartphone. It almost certainly has access to many of your personal accounts, and quite possibly many of your professional ones as well. That means that someone who managed to get into your phone could easily get into just about any account they wished by resetting the password to it and confirming the change through your email (which your phone probably gives them access to, as well). Your bank accounts, social media profiles, anything connected to your phone and email could be made theirs.

Step 2: Remote Lock and Wipe

Both Google and Apple offer utilities within their mobile platforms to assist users in locating a lost mobile device if need be, the former through its Find My Device application and the latter in its settings as Find My iPhone. Be aware: for either to work, the device needs to be turned on with GPS or wireless data active. Utilizing these features is as simple as logging into Google’s Find My Device webpage or into your Apple iCloud account.

Doing this will give you more or less the exact location of your device. If it’s someplace you recognize, like where you picked up lunch or back at the office, remotely lock it and call the location directly so that someone can pick it up before an opportunist spots it. If it’s someplace new, or on the move, it’s time to lock your device and remotely wipe it.

If you didn’t go through these steps, your phone’s carrier or manufacturer may be able to assist you:

Step 3: Report It

Finally, it is time to swallow your pride.

If you’re working from your own device and not one owned by the company, contact your carrier and report the loss. If your phone has been stolen, they can cut it off from the network, making it that much less convenient for someone trying to steal your data.

Here’s the contact info you may need to do so:

If you use a device provided by the workplace for anything—checking emails, receiving and sending messages, etc.—you’ll need to report the loss to them as well. A lost device constitutes a serious business liability, as it will likely have access to not only your data, but the company’s data.

Any business that makes use of mobile devices should have the capability to remotely control access permissions to company data and to remove the work profile or fully wipe the device’s storage.

Step 4: Change Your Passwords

If you have these accounts, you need to change your password to them immediately:

Any and all passwords you have protecting your accounts need to be strong, secure, and unique. You should never—ever—use the same password on more than one account. We really can’t emphasize this enough. Don’t do it.

Next, go through your accounts in this order and change the access credentials for each of them:

  • Any email accounts you have besides maintained as a part of your Apple, Google, and/or Microsoft accounts.
  • Any financial or banking accounts you have, including bank accounts, credit cards, PayPal, and any merchant accounts you maintain.
  • Any cloud storage accounts, like Dropbox, iCloud, Google Drive, Microsoft OneDrive, or Amazon Drive.
  • Any web hosting or domain-related accounts, like GoDaddy, Network Solutions, Cloudflare, or others.
  • Any social media platforms, like Facebook, Twitter, LinkedIn, et al.
  • Any eCommerce platforms, like Amazon, eBay, Walmart, or other such entities.
  • Any services and utilities you subscribe to, including your utility providers (like your electric company), your insurance providers, and any streaming services you subscribe to, like Netflix, Hulu, or HBO Max.

This is going to take you some time, and despite this, you shouldn’t rush through it. Be meticulously thorough to replace each password with a unique alternative, keeping track of all your accounts as you go.

What Should I Do If I Think My Phone Was Stolen?

First, you need to keep your expectations at a realistic level. If your phone truly was stolen, your chances of getting it back are slim to none. First, it isn’t as though people aren’t aware that mobile devices can be tracked. It isn’t worth trying to hunt it down, especially in terms of your health and safety.

Instead, contact law enforcement and report the theft. While there’s still no guarantee that they’ll be able to retrieve the phone—or even attempt to, even with the location available—it’s still your best option.

There is also the chance that a do-gooder picked it up to try and return it to its owner. You can’t assume this is the case, of course, but you may carefully consider calling it to see who picks up.

Regardless, locking down the phone and remotely wiping its data is likely best, as is assuming that the device is gone for good.

What If I Find a Lost Phone?

If you happen to come across a misplaced mobile device, the best course of action is to give it to a staff member or other authority figure wherever you are.

Let’s say you were grocery shopping, and found an Apple phone lying next to the other, more edible apples. In that case, you should bring it to customer service. Most people typically backtrack when looking for a lost device, so taking it elsewhere isn’t going to help them find it.

Hopefully, you never have to deal with a lost phone. However, if you do, try to keep this guide in mind.

GoDaddy Demonstrated How Not to Educate Users Abou...
Tip of the Week: What to Do Before You Lose Your P...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, January 23, 2021

Captcha Image

By accepting you will be accessing a service provided by a third-party external to https://www.cwit.com/

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Business Computing Privacy Software Internet Cloud Data Hackers Business Management Workplace Tips Hardware Network Security Microsoft Productivity Backup Business Hosted Solutions Email Managed Service Provider Productivity IT Services Saving Money Malware Efficiency Innovation Google Small Business Collaboration User Tips Computer IT Support VoIP Data Backup Quick Tips Smartphones Network IT Support Data Recovery Mobile Devices communications Microsoft Office Android Business Continuity Gadgets Disaster Recovery Communication Smartphone Cybersecurity Phishing Social Media Upgrade Mobile Office Server Mobile Device Virtualization Miscellaneous Users Managed IT Services Mobile Device Management Ransomware Windows Passwords Holiday Operating System Vendor Management BDR Outsourced IT Internet of Things Windows 10 Apps Tech Term Automation Unified Threat Management Remote Monitoring Facebook BYOD Remote Computing Apple WiFi Mobile Computing Covid-19 Analytics Managed IT services Data Management Windows 10 Cloud Computing Browser Save Money Artificial Intelligence Training Help Desk Marketing Spam Managed Service The Internet of Things History Business Technology Firewall App Health Alert Bandwidth Big data Encryption Two-factor Authentication Office Information Technology IT Consultant Office 365 Budget Hard Drives Printer Gmail Access Control Government VPN Information Content Filtering Wi-Fi Cybercrime Windows 7 Going Green Blockchain Managed IT Bring Your Own Device Antivirus Maintenance Networking Virus Tech Support Computers Saving Time Recovery Lithium-ion Battery Best Practice Employer-Employee Relationship Retail Healthcare Remote Work Cost Management Outlook Windows 8 Wireless Technology Document Management Hiring/Firing Search Customer Service Avoiding Downtime Computing iPhone Storage Travel Data Security Education It Management Phone System Update IBM Patch Management Data Loss Risk Management Augmented Reality Hacking Vendor Project Management Money Conferencing Humor Proactive IT Computer Repair Running Cable Regulations Wireless Meetings Website SaaS Intranet Twitter End of Support Voice over Internet Protocol Law Enforcement Current Events Password Solid State Drive Customer Relationship Management Value Compliance Data storage Hacker Flexibility PowerPoint Data Breach Save Time File Sharing Applications Router Downtime Laptop Hard Drive Administration Mobility Legal Remote Company Culture Social Engineering Virtual Desktop Social Paperless Office Monitoring Social Networking Software as a Service Employees Sports DDoS Disaster Private Cloud Hosted Solution Management Telephony Robot Excel Word Securty Machine Learning Vulnerabilities Telephone Systems Cortana Net Neutrality Scam Chrome Black Market Employee/Employer Relationship Business Intelligence Cryptocurrency Digital Payment Fax Server Cooperation Digital Business Growth Google Maps User Comparison Websites Tablet Start Menu Tech Terms Emails Cost Trending Automobile Office Tips Specifications Safety Mouse Mobile Technology Smart Devices Chromebook Documents Solutions Computing Infrastructure YouTube Hack Inbound Marketing Uninterrupted Power Supply Programming Unified Communications Settings Teamwork Heating/Cooling Professional Services eCommerce Statistics How To Video Conferencing Entertainment Vulnerability Network Congestion Download Multi-factor Authentication Pain Points Integration Bitcoin Data Protection Telephone Holidays Microchip Taxes IT service Streaming Media User Error eWaste Managed Services Provider Downloads Co-managed IT Distributed Denial of Service Display Time Management Bluetooth How To Public Cloud Licensing Managed Services Gaming Console Redundancy Processors Managed IT Service Identity Theft Lifestyle Notifications Memory Webcam Distribution USB Evernote Google Docs Text Messaging Computer Accessories Experience Presentation Virtual Assistant Processor Politics Cleaning Virtual Reality Monitors Advertising Flash Thin CLient FinTech Multi-Factor Security Medical IT Trend Micro LinkedIn Data Warehousing CIO 3D Ebay Development Software License Microserver Trends Browsers Smart Phones Data Storage Devices Security Cameras Threats Access Staffing Scalability Google Wallet Fraud Tactics User Tip Proactive Maintenance Emergency Hard Drive Disposal Windows XP Motion Sickness Content Navigation Virtual Machine Archive Computer Care Messenger Society Tracking Reviews Digital Signature Skype Microsoft Excel Displays Procurement Get More Done UTM Rental Service Leadership Organization Printer Server Legislation Error Google Drive Windows Server 2008 Micrsooft Adminstration Pirating Information IT Plan Turn Key Enterprise Resource Planning Data Analysis PCI DSS Trojan Accountants A.I. GDPR Managing Risk Spyware Mobile Payment Drones Cabling Communitications email scam Addiction Printers SQL Server Point of Contact Web Server PDF Tech Hypervisor Electricity Printing Books Workers Shopping Organize Administrator Supply Chain Management Fileless Malware Hybrid Cloud Permissions Supercomputer Language AI Wireless Headphones Best Available Keyboard Internet Service Provider Migration Connected Devices Regulations Compliance Equifax Fleet Tracking Modem Strategy Recycling cache Television Worker IT Assessment Network Management Domains Proxy Server Azure Analytic Device security MSP Term WannaCry Reading Music Samsung Upselling Gig Economy Public Speaking Electronic Medical Records Transportation Product Reviews switches Writing Remote Working Directions Corporate Profile Read Employer Employee Relationship Supply Chains Webinar Nanotechnology Social Network Shortcut Recording Optimization Freedom of Information G Suite Upgrades Video Surveillance Desktop Finance Hacks LiFi Physical Security Saving ZTime Financial Data Startup Asset Tracking Entrepreneur SSID Assessment SharePoint Electronic Health Records Business Cards Service Level Agreement Troubleshooting Dark Web Free Resource Username Environment Processing Device Management Google Calendar Relocation Tablets Memes Smartwatch Unified Threat Management Backup and Disaster Recovery HIPAA Health IT Tip of the week Banking Botnet Electronic Payment Wasting Time VoIP Content Management Work/Life Balance Harddrive 2FA Screen Reader Customer Resource management Competition Logistics Virtual Machines Touchscreen Business Managemenet News Sync Deep Learning Debate Managing IT Services Gamification Knowledge Visible Light Communication CCTV Telework Smart Tech Cyber security Consultation GPS Surveillance Piracy Upload Business Owner Bookmark Remote Workers Best Practives HTML Google Play Telephone Service online Currency Technology Tips Reliable Computing IT Fiber-Optic Database IP Address Employer/Employee Relationships Business Metrics IT consulting Computer Malfunction External Harddrive Human Resources Managing Costs Audit Telephone System Application Microsoft 365 Fake News In Internet of Things Virtual Private Network Mobile Security Financial Regulation Productuvuty CrashOverride Personal Information CES 3D Printing Capital Managing Stress

toner1