ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: What to Do if Your Smartphone Goes Missing

Tip of the Week: What to Do if Your Smartphone Goes Missing

Uh oh—your mobile device is missing.

If you ever find yourself in this situation, time is of the essence… particularly if you have reason to believe that your device was stolen. To help prevent things from getting messy, we’ve put together a checklist for you to run down in case you suddenly can’t find your smartphone or tablet.

Bear in mind that a few of these steps will require some proactive setup on your part, which we’ll make note of.

Step 1: Assume Once a Device is Gone, It’s Gone for Good

While this outlook sounds bleak and very well may not be accurate, it is important that you make the presumption that a lost device will need to be replaced. This way, you’ll be more motivated to—first—protect the data that is stored on it, and—secondly—give yourself a means of recovering this data after the fact.

Consider the ramifications of losing your smartphone. It almost certainly has access to many of your personal accounts, and quite possibly many of your professional ones as well. That means that someone who managed to get into your phone could easily get into just about any account they wished by resetting the password to it and confirming the change through your email (which your phone probably gives them access to, as well). Your bank accounts, social media profiles, anything connected to your phone and email could be made theirs.

Step 2: Remote Lock and Wipe

Both Google and Apple offer utilities within their mobile platforms to assist users in locating a lost mobile device if need be, the former through its Find My Device application and the latter in its settings as Find My iPhone. Be aware: for either to work, the device needs to be turned on with GPS or wireless data active. Utilizing these features is as simple as logging into Google’s Find My Device webpage or into your Apple iCloud account.

Doing this will give you more or less the exact location of your device. If it’s someplace you recognize, like where you picked up lunch or back at the office, remotely lock it and call the location directly so that someone can pick it up before an opportunist spots it. If it’s someplace new, or on the move, it’s time to lock your device and remotely wipe it.

If you didn’t go through these steps, your phone’s carrier or manufacturer may be able to assist you:

Step 3: Report It

Finally, it is time to swallow your pride.

If you’re working from your own device and not one owned by the company, contact your carrier and report the loss. If your phone has been stolen, they can cut it off from the network, making it that much less convenient for someone trying to steal your data.

Here’s the contact info you may need to do so:

If you use a device provided by the workplace for anything—checking emails, receiving and sending messages, etc.—you’ll need to report the loss to them as well. A lost device constitutes a serious business liability, as it will likely have access to not only your data, but the company’s data.

Any business that makes use of mobile devices should have the capability to remotely control access permissions to company data and to remove the work profile or fully wipe the device’s storage.

Step 4: Change Your Passwords

If you have these accounts, you need to change your password to them immediately:

Any and all passwords you have protecting your accounts need to be strong, secure, and unique. You should never—ever—use the same password on more than one account. We really can’t emphasize this enough. Don’t do it.

Next, go through your accounts in this order and change the access credentials for each of them:

  • Any email accounts you have besides maintained as a part of your Apple, Google, and/or Microsoft accounts.
  • Any financial or banking accounts you have, including bank accounts, credit cards, PayPal, and any merchant accounts you maintain.
  • Any cloud storage accounts, like Dropbox, iCloud, Google Drive, Microsoft OneDrive, or Amazon Drive.
  • Any web hosting or domain-related accounts, like GoDaddy, Network Solutions, Cloudflare, or others.
  • Any social media platforms, like Facebook, Twitter, LinkedIn, et al.
  • Any eCommerce platforms, like Amazon, eBay, Walmart, or other such entities.
  • Any services and utilities you subscribe to, including your utility providers (like your electric company), your insurance providers, and any streaming services you subscribe to, like Netflix, Hulu, or HBO Max.

This is going to take you some time, and despite this, you shouldn’t rush through it. Be meticulously thorough to replace each password with a unique alternative, keeping track of all your accounts as you go.

What Should I Do If I Think My Phone Was Stolen?

First, you need to keep your expectations at a realistic level. If your phone truly was stolen, your chances of getting it back are slim to none. First, it isn’t as though people aren’t aware that mobile devices can be tracked. It isn’t worth trying to hunt it down, especially in terms of your health and safety.

Instead, contact law enforcement and report the theft. While there’s still no guarantee that they’ll be able to retrieve the phone—or even attempt to, even with the location available—it’s still your best option.

There is also the chance that a do-gooder picked it up to try and return it to its owner. You can’t assume this is the case, of course, but you may carefully consider calling it to see who picks up.

Regardless, locking down the phone and remotely wiping its data is likely best, as is assuming that the device is gone for good.

What If I Find a Lost Phone?

If you happen to come across a misplaced mobile device, the best course of action is to give it to a staff member or other authority figure wherever you are.

Let’s say you were grocery shopping, and found an Apple phone lying next to the other, more edible apples. In that case, you should bring it to customer service. Most people typically backtrack when looking for a lost device, so taking it elsewhere isn’t going to help them find it.

Hopefully, you never have to deal with a lost phone. However, if you do, try to keep this guide in mind.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 05 May 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Network Security Privacy Data Cloud Business User Tips IT Support Internet Hardware Innovation Email Hosted Solutions Malware Efficiency Workplace Tips Computer Google Microsoft Collaboration Android Phishing Business Management Cybersecurity IT Services Backup Data Backup Ransomware Smartphone communications Microsoft Office Upgrade Smartphones Small Business Network Mobile Devices Managed IT Services Communication Data Recovery Productivity Quick Tips Users Social Media VoIP Mobile Device Automation Tech Term Facebook Business Continuity Windows 10 Disaster Recovery Passwords Holiday Covid-19 Managed Service Windows 10 Apps IT Support Browser Miscellaneous Cloud Computing Outsourced IT Data Management Internet of Things Managed Service Provider Remote Work Government Saving Money Operating System Gadgets Workplace Strategy Artificial Intelligence Managed IT services Networking Windows Remote Virtualization Server Spam Information Bandwidth WiFi Encryption Business Technology Mobile Device Management Blockchain App Office Apple Employee/Employer Relationship Two-factor Authentication Information Technology Office 365 History Budget Gmail Conferencing Access Control Data Security Health Analytics BDR Cybercrime Wi-Fi Big Data Hacking Cost Management Employer-Employee Relationship Patch Management Document Management Vendor Hacker Voice over Internet Protocol Save Money Remote Monitoring Remote Computing Compliance IT Management Training Help Desk Search... Best Practice Legal Retail Alert Data storage Applications Money Mobile Office Hiring/Firing Project Management Customer Service Unified Threat Management Vulnerabilities Firewall Outlook Managed Services Password Augmented Reality Word BYOD IBM Website Computing Vendor Management Data loss Hard Drive YouTube Twitter Running Cable Update Law Enforcement Storage Laptop End of Support Printer Windows 11 Data Breach Paperless Office Antivirus Maintenance Remote Workers Social User Sports Travel DDoS Virtual Reality SaaS Windows 7 Free Resource Social Engineering Monitoring Cryptocurrency Healthcare Black Market Websites iPhone Cleaning How To Mobility Cortana Chrome Meetings Education Robot Content Filtering Google Maps Scam Router Mobile Computing Marketing The Internet of Things VPN Holidays Automobile Tech Terms Customer Relationship Management Co-Managed IT Managed IT Digital Entertainment Virtual Assistant How To Cooperation Wireless Technology Microchip Video Conferencing eWaste Flexibility Taxes Virtual Machines Computer Repair Downtime Processor Safety Identity Theft Hack Professional Services Notifications Unified Communications Physical Security Virtual Desktop Experience Google Docs HIPAA Managed Services Provider Bluetooth Distributed Denial of Service Office Tips Multi-factor Authentication Virtual Private Network Start Menu Private Cloud Memory Downloads Computer Care Current Events Disaster Vulnerability Saving Time Solutions Politics Software as a Service Data Protection Computers Lithium-ion battery Bitcoin Machine Learning Settings Integration Images 101 Display Telephone PowerPoint Administration Solid State Drive Processors Presentation Specifications Employees Excel Avoiding Downtime Chromebook Drones IT Consultant Tablet Windows 8 G Suite Tip of the week SSID Fileless Malware Employer/Employee Relationships Mouse VoIP Gamification Media Tracking Company Culture Development Virtual Machine Relocation Telephone System Public Speaking Displays Regulations Advertising Work/Life Balance Backup and Disaster Recovery Tech Support Reviews Web Server Computer Accessories Optimization Streaming Media Smart Technology Directions Teamwork SharePoint Content Keyboard 2FA Digital Payment Desktop Data Storage Hypervisor Electronic Medical Records Hard Drives Worker Accountants Access Database intranet Shopping In Internet of Things Medical IT SQL Server Wireless Hacks Time Management Shortcut Network Congestion Paperless Public Cloud Environment PCI DSS Licensing Reliable Computing Health IT Heating/Cooling Writing Equifax Audit Spyware Tactics Social Networking Gig Economy Hard Drive Disposal Humor Windows XP Supply Chain Azure Username Business Communications File Sharing Internet Service Provider Startup Troubleshooting Regulations Compliance Freedom of Information Managed IT Service Scalability Redundancy Navigation Text Messaging Cache Addiction Proactive IT email scam Memes Administrator Workplace Bring Your Own Device Unified Threat Management Human Resources Workers Mobile Security Net Neutrality Legislation Financial Data News User Tip Printing Evernote Network Management Music Risk Management CCTV IT Scams Staffing Touchscreen Google Apps Emails Business Owner Telework Computer Malfunction Fake News Emergency Proxy Server IP Address Vendor Mangement Service Level Agreement Smartwatch Computing Infrastructure Communitications Botnet Microsoft 365 Cables Rental Service Management Micrsooft Samsung Device security Procurement Uninterrupted Power Supply Wireless Headphones FinTech Webcam Microsoft Excel Flash Tech Telephone Systems Business Mangement Going Green Business Growth CES Business Cards IT Assessment Point of Sale Supply Chain Management Value Recovery Error Competition Tablets Inbound Marketing Organization Cyber security Shortcuts Bookmark Google Calendar Term Banking Download Entrepreneur Google Wallet Supercomputer Piracy Smart Devices LiFi Remote Working Documents Messenger Virus Application Deep Learning HTML Nanotechnology Business Intelligence AI Motion Sickness Trend Micro Be Proactive Browsers Transportation Comparison Google Play Business Metrics Google Drive Upload Hosted Solution Electronic Payment Digital Security Cameras Software License Electronic Health Records Wasting Time Securty Books Social Network Corporate Profile Screen Reader Society eCommerce Modem Workplace Strategies Knowledge Data Analysis Domains Language Television Security Cameras Telephony Trends Videos Employer Employee Relationship Mobile Technology Phone System Surveillance Managing Costs Reading Customer Resource management Monitors Cabling Devices Visible Light Communication

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?