Lost or stolen phone/computer

The vast majority of our devices are now portable. In the past, we used computers and telephones that we had at home or in the office and that never left these spaces. Today everything is different. We carry laptops from place to place, go with them on business trips and on holiday. Obviously, it’s absolutely true about phones.

This increases the risk of losing or stealing these devices. And because the person who has just found out that he has lost his device often panicking (it’s a very stressful situation) and in the first moments is unable to calmly realize what needs to be done, it is good to have these steps ready.

Here is the checklist of steps that should follow after losing or stealing your phone or laptop. You can download it here (pdf), print it and check steps out.

  1. Find location
  2. Try to send sms to your phone
    • If messages appear on the display, you can give a message to a potential finder
    • iPhone: Lost Mode
  3. Contact IT
    • It is necessary to block access to internal systems of the company or organization for accounts
  4. Remote backup
    • If your phone has a remote backup application, back up now.
  5. Lock and wipe
  6. Sign out of accounts
    • From another device, log in to your accounts where you are signed in lost device and log off those accounts on the lost device
      • Facebook, Twitter, Gmail, Alza etc.
      • Ask others to temporarily remove you from conversation groups (e.g., Signal, Telegram, Threema, Whatsapp, Slack, etc.) where sensitive information may occur (yours or others).
  7. Change passwords on accounts that were logged on a lost device
  8. Send your cryptocurrencies to the new address
    • If you have a wallet backup, restore it, create a new one, and forward there your cryptocurrencies
  9. Contact your phone operator to lock SIM card
  10. Block payment cards stored in device applications
    • Your credit cards may be stored in some apps or websites
  11. Notify friends and/or customers
    • Your accounts may be misused for phishing attacks, tell your friends about this possibility

Milan

Jmenuji se Milan Půlkrábek, pamatuji si počítače bez internetu, Internet bez Google a mobilní komunikaci bez šifrování. Mám za sebou více než dvacet let profesionální praxe v IT, přednáším a píšu články o IT bezpečnosti, kryptoměnách a nových technologiích. Od roku 2014 jsem součástí nezikové organizace Paralelní Polis v Praze.