Immediate Actions When Mobile Devices Go Missing

“Oh NO! Where’s my phone?” Nobody ever looks forward to saying those words, but especially if they use that phone for business. Any missing mobile device is likely to cause panic, whether it’s a phone, laptop, or notebook. When any mobile device goes missing, the clock is ticking, and action must be taken immediately. These devices hold a good part of our lives and often, our business. Within those devices are files, personal financials, apps, passwords, pictures, videos, and so much more.

It’s your digital footprints that make the information mobile devices hold more personal - and dangerous - than even what you carry in your wallet. This is the primary thing that makes a lost or stolen device a cause for alarm.

Although it’s a pain to replace a device and set up a new one, people are less concerned with the device itself than the data inside it. Sure, iPhones aren’t cheap, but they are replaceable. It’s about the data and the access to cloud accounts and websites – not to mention accounts with Multi-Factor Authentication (MFA) that send codes to those phones.

What is scarier than losing control of that data is the thought that a criminal now controls it. A criminal doesn’t just grab the phone and put it aside and ‘get to it later’ – they also know that there is a time limit before that device is remote-wiped and locked. For the owner, being locked out of accounts is severely inconvenient, but a crook having your banking passwords is horrific.

What data is typically stored on a phone?

When a criminal gets their hands on a smart phone, tablet, or laptop, they have access to a good part of your personal and business life. The types of data include:

  • Documents
  • Photos & videos
  • Access to any logged-in app accounts
  • Passwords stored in the browser
  • Cloud storage access through a syncing account
  • Email
  • Text messages
  • Multi-factor authentication prompts sent via SMS

What to do if your smartphone is stolen?

The actions you take in the minutes after a device goes missing are critical, whether it’s a personal or business device. The faster you act, the less chance there is for the exposure or exploitation of sensitive data.

Steps to Take Immediately After Missing Your Device

Several of the steps below involve setting up your phone before it can go missing. If it is used for business, your in-house IT support team or outsourced Managed IT Services company can make sure that general Cybersecurity measures and these options are set up in the event of loss.

1) Activate a “Lock My Device” Feature

Most mobile devices and laptops will include a “lock my device” feature. It allows for remote activation if you have enabled it. Enable ‘location services’ and ‘find my device’ as well. A good thief may be able to crack a passcode but turning on these three Cybersecurity measures immediately can slow them down.

Only use the ‘find my device’ feature if you believe your device is merely misplaced - not stolen. You do NOT want to end up face to face with criminals if it has been stolen.

2) Activate a “Wipe My Device” Feature

This is why it is important to back up the data on your device before it can be lost. This ensures you have a copy of all your files in case of a lost device. Then you can use a remote “wipe my device” feature IF it has previously been set up. This will wipe the hard drive of data.

3) Report the Device Missing to Your Company If It’s Used for Work

If you use the device for business, notify your company management immediately, even if all you do is get work email on a personal smartphone. If the business has competent IT support, they have probably initiated strong security measures and an endpoint device manager. In this case, they can revoke access to the company network immediately and subvert a possible data breach.

4) Log Out & Revoke Access to SaaS Tools

Most mobile devices have persistent logins to SaaS (Software as a Service) tools like Microsoft 365, Trello, Salesforce, etc.

Use a different device to log into your account through a web application. Go to the authorized device area of your account settings. Locate the device that’s missing and log it out of the service. Then, revoke access, if this is an option.

This prevents the thief from gaining access to your accounts by disconnecting the device from them.

5) Log Out & Revoke Access to Cloud Storage

You MUST include cloud storage applications when you revoke access. If your missing device syncs with a cloud storage platform, the criminal can exploit that connection.

They could upload malware that infects the entire storage system. They could also reset your device to resell it, and in the process delete files from cloud storage.

De4pending on your circumstances, more steps may need to be taken Cashify lays out a whole range of these steps HERE.

Frequently Asked Questions

Can someone unlock my stolen phone?

A: Not without having or cracking your passcode. Even if you usually sign in with Face or Touch ID, your phone is still protected with your passcode. If you don’t use a passcode – or use a code that’s ridiculously easy to break, like the most common password in the world – 123456, then you need to get  busy with the steps we’ve outlined above.

How many smartphones are lost each year?

A: According to Kensington, approximately 70 million smart phones are lost or stolen every year, and only 7% are recovered. That seems like a massive number, but not so much when you realize there are an estimated 6.6 billion smart phones in the world.

The truth is: ONE lost phone is one too many if it’s yours – more so if you use it to connect with your business network. This can mean the company is subject to a data privacy violation. It could also suffer a ransomware attack originating from that stolen device.

In 2020, Lifespan Health System paid a $1,040,000 HIPAA fine  due to an unencrypted stolen laptop breach.

Can you track a phone if the location is off?

A: Yes. Even with the location service turned off, smart phones can be tracked through cell towers, public Wi-Fi, cell site simulators, and spyware or malware.

Which phones are most stolen?

A: The type is almost evenly split between iPhones (39% of thefts) and Android phones (37%). The top three are Apple, the next two are Samsung.

How secure is your network?

As a longstanding, reputable member of the Charlotte IT Support community, ITFirm.com offers a FREE, no-risk network and Cybersecurity assessment. We perform a non-intrusive scan that allows us to deliver a comprehensive report of the state of your system and its vulnerabilities that is yours to keep. There are no strings attached, and you are under no obligation ever to use our IT services.

The two best defenses are next-generation Cybersecurity to protect your data from theft, and a top-notch Managed Services Provider to ensure continued reliability and defenses against newly emerging threats.

We put our 100% Money Back Guarantee in writing, so there is no risk in trying us out. Because we do not require a ‘hard’ contract, our clients can fire us at any time with 30 days’ notice. We have to be good.

Among the Managed IT services we provide:

IT HelpDesk Service
Onsite IT Support
Cybersecurity
Cloud migration and management
Email migration services
Backup and disaster recovery
VoIP phone systems
IT disposition and recycling
Office moves
White label services (IT to IT)

Planning an Office Move?

We have the experience to ensure a seamless transition. Your employees will arrive at the new location to find their IT infrastructure ready and open for business! For more information, or to receive your FREE no-risk network and Cybersecurity assessment, just fill out the form on this page or call us at:
704-565-9705