Lost or stolen phone? 7 essential steps to protect Your data
Lost or stolen phone? 7 essential steps to protect Your data
Homepage   /    other   /    Lost or stolen phone? 7 essential steps to protect Your data

Lost or stolen phone? 7 essential steps to protect Your data

Amber Bouman 🕒︎ 2025-10-22

Copyright tomsguide

Lost or stolen phone? 7 essential steps to protect Your data

Skip to main content Tom's Guide Newsletters View Profile Search Tom's Guide You May Like I recently got hacked — here’s 5 hidden Apple security features I wish I’d known about 7 iPhone security settings you should enable right now to lock down your smartphone 7 steps to stay safe after receiving a data breach notification letter Phone Insights Phone Best Picks Phone Deals Phone Face-Offs Phone How-Tos Phone Reviews Network Carriers Android Phones Google Phones Motorola Phones OnePlus Phones Samsung Phones Nothing Phone TV Best Picks TV Face-Offs Audio Insights Audio Best Picks Audio Deals Audio Face-Offs Audio How-Tos Audio Reviews Over-Ear Headphones Bluetooth Speakers Smart Speakers TV & Audio Brands Entertainment Streaming Devices Prime Video Paramount Plus PlayStation Handheld Gaming Gaming Peripherals Connections Computing Insights Computing Best Picks Computing Deals Computing Face-Offs Computing How-Tos Computing News Computing Reviews VPN Best Picks VPN Face-Offs VPN How-Tos VPN Reviews Operating Systems Identity Theft Protection Parental Controls Malware & Adware Virtual Reality Augmented Reality Smart Glasses Chromebooks Gaming Laptops Apple Desktops Gaming Desktops Android Tablets Computing Brands AI Insights AI Best Picks AI Face-Offs Google Gemini Apple Intelligence Mattress Best Picks Mattress Deals Mattress Face-Offs Mattress How-Tos Mattress News Mattress Reviews Mattress Care Mattress Toppers Pillows & Bedding Smartwatches Fitness Trackers Smart Rings Apple Watch Home Insights Home Best Picks Home Face-Offs Home How-Tos Home Reviews Home Topics Home Appliances Home Office Home Security Home Brands Popular Brands View Phones Phone Insights Phone Best Picks Phone Deals Phone Face-Offs Phone How-Tos Phone Reviews Network Carriers View Network Carriers Android Phones View Android Phones Google Phones Motorola Phones OnePlus Phones Samsung Phones Nothing Phone TV Best Picks TV Face-Offs Audio Insights View Audio Insights Audio Best Picks Audio Deals Audio Face-Offs Audio How-Tos Audio Reviews Headphones View Headphones Over-Ear Headphones View Speakers Bluetooth Speakers Smart Speakers TV & Audio Brands Entertainment View Entertainment View Streaming Streaming Devices Prime Video Paramount Plus View Gaming PlayStation Handheld Gaming Gaming Peripherals Word Games Connections View Computing Computing Insights Computing Best Picks Computing Deals Computing Face-Offs Computing How-Tos Computing News Computing Reviews VPN Best Picks VPN Face-Offs VPN How-Tos VPN Reviews View Hardware View Software Operating Systems View Security Identity Theft Protection Parental Controls Malware & Adware View VR & AR Virtual Reality Augmented Reality Smart Glasses View Laptops Chromebooks Gaming Laptops View Desktops Apple Desktops Gaming Desktops View Tablets Android Tablets Computing Brands AI Insights AI Best Picks AI Face-Offs AI Engines Google Gemini Apple Intelligence View Wellness Mattresses View Mattresses Mattress Best Picks Mattress Deals Mattress Face-Offs Mattress How-Tos Mattress News Mattress Reviews Mattress Care Mattress Toppers Pillows & Bedding View Fitness Smartwatches Fitness Trackers Smart Rings Apple Watch Home Insights Home Best Picks Home Face-Offs Home How-Tos Home Reviews Home Topics Home Appliances Home Office Home Security View Outdoors Home Brands Popular Brands iPhone Air Review iPhone 17 Pro Max Review iPhone 17 Review Meta Ray-Ban Display Best laptops Best Mattress Don't miss these Online Security The Vacation Mode Checklist for Digital Security I recently got hacked — here’s 5 hidden Apple security features I wish I’d known about Online Security 7 iPhone security settings you should enable right now to lock down your smartphone Online Security 7 steps to stay safe after receiving a data breach notification letter Online Security What to do if your email has been hacked Online Security Has your computer been hacked? 11 ways to tell and what to do now I was a phone engineer, and this is what you need to do if you suffer from the 3 most common hardware faults Online Security 7 easy changes I made that drastically improved my digital security Online Security Your old accounts are an online gold mine for cybercriminals — what you need do right now to stay safe Online Security I found a phishing email in my inbox and a malicious app in my news feed — here’s how I knew they were scams Mobile Apps Google is tracking you right now — change these 3 settings to stop it Online Security Hackers love these 7 smart home devices — here’s how to keep them secure Text Messages Can Be One of the Best Ways for Scammers To Take Your Data — Here’s How To Spot a Fake and How To Protect Yourself Malware & Adware More than 250 malicious apps are spreading info-stealing malware on Android and iOS — delete these right now Online Security FBI issues warning to all smartphone users — this dangerous new scam could be at your door Online Security Lost or stolen phone? 7 essential steps to protect Your data Amber Bouman 27 September 2025 Instead of panicking, protect yourself by taking these steps first When you purchase through links on our site, we may earn an affiliate commission. Here’s how it works. (Image credit: Shutterstock) The few times I've briefly misplaced my phone have led to heart-pounding moments of panic. Rightfully so, as this tiny device is what I use to access my email, bank accounts, calendars, to-do lists, medical appointments, social media, reminders, my online shopping accounts, and of course, my phone calls. Fortunately, I've been lucky enough to recover my device within seconds but that is not a feeling I'd like to experience for more than a few moments. It certainly taught me that I'd better be well prepared for what could happen if my phone were to actually go missing. So, whether you're chronically forgetful, a frequently traveler, someone who has too much on their plate, frequents risky areas or just the kind of person who often misplaces things, here are a few steps to take if your phone has gone missing (be it lost, stolen or undetermined). 1. Try using your phone's built-in tracking (Image credit: Tom's Guide) You can obviously start by calling your phone to see if you can hear it ring nearby or to see if someone will answer it and can return it to you. If that doesn’t work, your next step is to try the built-in tracking features on your handset. You may like I recently got hacked — here’s 5 hidden Apple security features I wish I’d known about 7 iPhone security settings you should enable right now to lock down your smartphone 7 steps to stay safe after receiving a data breach notification letter Apple has its Find My feature, while Android users have Find My Device which works similarly. Each lets you see your phones location on a map, play a sound to try to track it down and even view its last known location if the battery has died. Each of these services can be accessed from a computer or separate device if you log into your account. Not only can they help track down your phone, but they will also assist with the other options on this list. 2. Remotely lock your phone (Image credit: Future) If you can’t track down your phone using the Find My feature, or know for sure it’s been stolen and is in a thief's hands, then go ahead and use this method to remotely lock it. This will prevent anyone from accessing your personal information and data. That means whoever took your device won’t be able to look through your messages, emails, apps, or payment methods. Your tracking service should offer a remote locking capaability as well, and it may offer a custom message that can be displayed on the lock screen that also shows your contact information which could help an honest individual return your device to you. iOS users can do this by going to their iCloud accounts and selecting their lost device as “mark as lost,” while android users can go to android.com/find, choose their missing device and select “secure device” to lock it and then display their custom message. 3. Contact your mobile carrier (Image credit: VioletaStoimenova via Getty Images) You’ll want to reach out to your mobile carrier in order to suspend service to the lost or stolen device, which will prevent any unauthorized calls, texts or data usage – and any unexpected charges to your bill. It will also keep your account from being hijacked, and can prevent your account from being used to access two-factor authentication codes thereby preventing any thieves from taking over other accounts. Sign up to get the BEST of Tom's Guide direct to your inbox. Get instant access to breaking news, the hottest reviews, great deals and helpful tips. Contact me with news and offers from other Future brandsReceive email from us on behalf of our trusted partners or sponsorsBy submitting your information you agree to the Terms & Conditions and Privacy Policy and are aged 16 or over. Many mobile phone carriers also have the option to blacklist a stolen device, which will make it harder for a thief to use even if they can get past your lock screen. So make sure to ask about any temporary suspension options (if you think you can get your device back) or a permanent cancellation if you’re certain the device is past recovery. Carriers also offer insurance programs to help cover the cost of a replacement phone, so while you’re on the line with them it never hurts to ask about that as well. 4. File a police report (Image credit: Photographee.eu/Shutterstock) Are police likely to go out looking for a stolen phone? Well, no. However, filing a police report does provide you with an official record that could be useful for insurance claims, disputing fraudulent charges and more. Bring all the information you have to the local police department in order to file the claim, including all the details about how and when the phone went missing or stolen. Information that could be particularly helpful is the phone’s IMEI number (International Mobile Equipment Identity) or serial number, which is in the phone settings, on the original packaging, or in the carrier’s account portal. You may like I recently got hacked — here’s 5 hidden Apple security features I wish I’d known about 7 iPhone security settings you should enable right now to lock down your smartphone 7 steps to stay safe after receiving a data breach notification letter 5. Secure your connected accounts (Image credit: Shutterstock) There are a variety of accounts you’ll want to give attention to right away – specifically anything on your phone that is open, that has a saved password, or has saved payment information. All of those accounts and apps are at risk and will need to have their passwords changed as soon as possible. If you don’t already use one of the best password managers, now is a good time to implement one. Any apps that were signed into on your phone, need to get signed out of – think email, social media accounts, health accounts like a Fitbit, cloud storage, calendars, streaming accounts, shopping sites, medical or health apps. Basically anything that you may have had open or frequently use. Many services, like Google and Apple, will have settings that will show you active sessions and allow you to log out of all devices remotely. This is also an opportunity to enable 2FA (two-factor authentication) or multi-factor authentication on any account that you don’t already use it on. You’ll also want to keep a close eye on your accounts from here on out for any suspicious activity, unauthorized transactions or unfamiliar logins. 6. Remove stored payment methods (Image credit: Tom's Guide) Similarly, any mobile payment apps – from Apple Pay, Google Pay or anything else that stores credit card information – is at risk once your phone goes missing. If it’s been stolen, a thief could use your stored payment methods for unauthorized purchases, so shutting them down should be one of the first steps you take. Apple users who have changed their device status to lost in Find My iPhone will automatically have an Apple Pay account suspended as well. If you want to do it manually, you can sign into an Apple account, select the device and remove all cards associated with that payment account. Google Pay users should also log into their accounts at payments.google.com to navigate to payment methods then remove the cards linked to their missing device. Next, make sure you contact your financial institutions for the cards associated with the bank or credit cards to alert them to the issue so they can be on alert for any possible signs of fraud. 7. Remotely erase your phone's data (Image credit: Tom's Guide) For devices that are definitely gone without any hope of recovery, the final option is a remote wipe – which will erase all stored data, settings, media and personal information from the missing device which means no one else can access your financial information, passwords, contacts, media like photos or any other personal sensitive information. In iOS there’s an “Erase iPhone” option within the Find My feature, which resets the device to factory settings removing all personal data. In Android, likewise, there’s an “Erase Device” option in the Find My Device feature that will accomplish the same reset. It’s important to know that you’ll no longer be able to track your phone after it’s been reset, so this has to be your last and final step. But if you want to ensure that the data on that device won’t be able to be used for identity theft, phishing or other malicious activities, that’s the best way to do it. Better to be prepared Hopefully you'll never need to use any of these tips, but it helps to know in advance what to do to stay safe and secure in the worst of circumstances. An ounce of preparation, and a lot of familiarity with the Find My feature, can save you a lot of hassle if your handset goes missing. There's no need to make a bad situation worse by allowing a thief to also take advantage of you by stealing your data as well and who knows, maybe Find My could even help you locate a missing device. Follow Tom's Guide on Google News and add us as a preferred source to get our up-to-date news, analysis, and reviews in your feeds. Make sure to click the Follow button! More from Tom's Guide Worried a phone is stolen? Here’s how to find out 12 signs your phone has been hacked — and what to do next Thieves hate this iPhone feature — how to enable Stolen Device Protection Today's Norton 360 with LifeLock deals 61% off - 1st year Norton 360 with LifeLock Select - Yearly Norton 360 with LifeLock Advantage - Norton 360 with LifeLock Ultimate Plus We check over 250 million products every day for the best prices See more Computing How-Tos Amber Bouman Social Links Navigation Senior Editor Security Amber Bouman is the senior security editor at Tom's Guide where she writes about antivirus software, home security, identity theft and more. She has long had an interest in personal security, both online and off, and also has an appreciation for martial arts and edged weapons. With over two decades of experience working in tech journalism, Amber has written for a number of publications including PC World, Maximum PC, Tech Hive, and Engadget covering everything from smartphones to smart breast pumps. You must confirm your public display name before commenting Please logout and then login again, you will then be prompted to enter your display name. I recently got hacked — here’s 5 hidden Apple security features I wish I’d known about 7 iPhone security settings you should enable right now to lock down your smartphone 7 steps to stay safe after receiving a data breach notification letter What to do if your email has been hacked Has your computer been hacked? 11 ways to tell and what to do now I was a phone engineer, and this is what you need to do if you suffer from the 3 most common hardware faults Latest in Online Security Ohio is the next US state to to receive age verification laws – and almost 12 million people will be affected Neon app that sold recorded phone calls for AI training is now offline after a security flaw exposed all of its users' data Macs under attack from malware impersonating popular password managers — how to stay safe FBI warns hackers are impersonating crime reporting sites to steal your personal data — here’s how to tell Google will let you use passkeys automatically in Chrome - here's how you can switch Hackers are now using deepfakes in phishing scams to fool banking apps and steal your money - how to stay safe Latest in How To 5 spider-repelling hacks that actually work — and you probably have everything you need at home These 5 smart TV settings make watching so much easier — here's how to enable them Don't plant grass seed until you've checked your soil temperature — here's how to do it How to watch 'Law & Order' season 25 online from anywhere How to watch 'Law & Order: SVU' season 27 online – stream from anywhere (without missing a case) AirPods Pro 3 troubleshooting — check your fit and ANC settings for better sound LATEST ARTICLES These 5 smart TV settings make watching so much easier — here's how to enable them Messages is the iPhone’s most complete app but iOS 26 has made it even better — here's how Netflix just dropped a dark psychological thriller series that will keep you guessing until the very end Physical therapist shares 3 moves to relieve shoulder stiffness and improve upper-body mobility Garmin Venu 4 vs Apple Watch 11: I walked 10,000 steps with these two watches to test which was more accurate Tom's Guide is part of Future US Inc, an international media group and leading digital publisher. Visit our corporate site. Terms and conditions Contact Future's experts Privacy policy Cookies policy Accessibility Statement Advertise with us Future US, Inc. Full 7th Floor, 130 West 42nd Street, Please login or signup to comment Please wait...

Guess You Like