7 steps to take when your phone is stolen

Thousands of tourists lose their phones every year. Here's what you need to do immediately after your phone is stolen.

1. Mark iPhone as Lost on iCloud

It's possible that the thief took your phone in an unlocked state, giving them full access to all of your data. Even if the phone isn't unlocked, the thief who stole it may still have the technical know-how to unlock it without a PIN.

The first thing to do after your phone is stolen is to sign in to iCloud and mark your phone as lost. Doing so will lock your phone and suspend Apple Pay.

7 steps to take when your phone is stolen

2. Try to find your phone again

Check to see if your phone was lost and not stolen. Sign in to iCloud Find Devices and see if you can find your phone in the hotel you're staying at or the restaurant you just visited.

When you don't know if your phone is stolen or simply lost, you should be extremely cautious if you choose to track it directly.

3. Remotely erase device

If you've determined that you'll never get your phone back, it's time to erase its data. To do so, sign in to iCloud Find Devices and click Erase This Device .

No need to worry about deleting priceless photos or videos of your trip if everything you need is in the cloud. Erasing all sensitive data on your phone gives you peace of mind, knowing that a thief won't be able to access your personal and financial information.

4. Contact the police

Contact the police to report the theft! Petty thefts are rarely reported, but the information may prompt the police to increase their presence in the area where your phone was stolen so that future travelers are better protected.

5. Contact your phone carrier

After you lose your phone, contact your carrier to report it. There are two reasons to do this.

First, you can find out if your stolen phone is covered by your insurance plan. If your phone is covered, your carrier will provide you with a new phone. If it is not covered, buy a new phone immediately.

The second reason is to disable the account so that the phone cannot make calls, send texts, or use any data. Disabling the account will also prevent cybercriminals from using SMS for two-factor authentication and accessing financial accounts.

7 steps to take when your phone is stolen

6. Change your Apple ID and other passwords

Now that your most important accounts are protected, take another step toward securing your data by changing your Apple ID password and the passwords used for your financial accounts. If you use a password manager, it’s relatively easy to log in to your accounts and make changes from your computer.

7. Connect with loved ones and friends

Now it’s time to protect your loved ones and friends. Text your loved ones and post on IG that you lost your phone. If anyone you’ve contacted in the past few hours with a strange request or message containing a link, ignore it.

Having your phone stolen is like having your arm cut off. You feel numb and lost without your device. However, it’s important to have a plan in place if your device is stolen. Hopefully your device never gets stolen, but if it does, follow the steps outlined above to minimize the consequences.

Sign up and earn $1000 a day ⋙

Leave a Comment

How to fix error PXE-E61: Media Test Failure, Check Cable

How to fix error PXE-E61: Media Test Failure, Check Cable

PXE-E61 errors are related to the Preboot eXecution Environment (PXE) - supported by some motherboards. PXE is a special boot mode that allows the computer to search for and load a bootable operating system over the network instead of from a local hard drive.

How to Use Microsoft Authenticator as a Password Manager

How to Use Microsoft Authenticator as a Password Manager

Let's explore how you can use this popular two-factor authentication app to keep your passwords safe on any device.

OpenAI Challenges Google Chrome With Its New Browser

OpenAI Challenges Google Chrome With Its New Browser

OpenAI is reportedly working on a web browser project that has the potential to compete directly with Google Chrome.

Some apps will still know your real location even if you use a VPN

Some apps will still know your real location even if you use a VPN

One benefit of using a virtual private network (VPN) is that it masks your real location. But if that's your main goal, you might be surprised to learn that some apps can still see your real location.

One Piece: Why are the Straw Hat Pirates more successful than other pirate crews?

One Piece: Why are the Straw Hat Pirates more successful than other pirate crews?

The Straw Hats are the central pirate crew of the One Piece series. Why are the Straw Hats more successful than the other Yonko crews? Let's find out together!

The most sincere apology status for your lover, helps him or her quickly stop being angry

The most sincere apology status for your lover, helps him or her quickly stop being angry

Status how to apologize to your lover to get forgiveness. The article will summarize for you the captions of apology to your lover that can make her touched.

I wish these skills were taught in school.

I wish these skills were taught in school.

From understanding credit scores to learning some basic DIY skills, I wish these skills were taught in school to make growing up easier.

Simple and permanent treatments for plantar warts

Simple and permanent treatments for plantar warts

Plantar warts are a common skin condition. Here's what you need to know about plantar warts.

Interesting knowledge that you never expected

Interesting knowledge that you never expected

Interesting knowledge every day will tell you more special things about life. Below are interesting knowledge that many people still do not know.

Instructions for fixing Task Manager has been Disabled by your Administrator

Instructions for fixing Task Manager has been Disabled by your Administrator

You may wonder why Task Manager is disabled? But don't worry! The following article will guide you through the best solutions to fix Task Manager when it is not working.

7 steps to take when your phone is stolen

7 steps to take when your phone is stolen

Thousands of tourists lose their phones every year. Here's what you need to do immediately after your phone is stolen.

Summary of Apple A18 Pro CPU information: Extremely powerful performance, AI support

Summary of Apple A18 Pro CPU information: Extremely powerful performance, AI support

The A18 Pro will serve as the successor to the A17 Pro, and is expected to power the iPhone 16 Pro and iPhone 16 Pro Max lineup.

How to save data YouTube uses

How to save data YouTube uses

The YouTube app provides several options for users to enable mobile data saver mode and you can use those options to reduce data consumption while watching videos.

Alarming Fact: Lithium Batteries Could Be an Environmental Disaster

Alarming Fact: Lithium Batteries Could Be an Environmental Disaster

Lithium batteries used in everyday devices and renewable energy storage can release more chemicals into the environment, exacerbating soil and water pollution problems.

Komodo dragon swallows turtle

Komodo dragon swallows turtle

The video shows a Komodo dragon with a terrifying bite force breaking a turtle's shell and swallowing the animal in seconds.