How to protect your cell phone in case of theft and avoid further damage | Technique

If the theft of your mobile phone was already a financial loss a few years ago, it could be even greater today. As technology improves – as well as the skills of criminals – losing a device could become a small loss compared to what a gang would do if it had access to documents and social media accounts, especially the victim’s bank accounts.

  • Share this news on WhatsApp
  • Share this news on Telegram

Several burglaries occurred while the victim was using the device – thus it was unlocked. “It is that theft in which a person passes by jogging or on a bicycle and takes the device from his hand. It can also happen in traffic. The goal is to have an unlocked cell phone and access to information easily”, notes Hiago Kane, president of the Brazilian Association of the Institute of Cyber ​​Security.

In this case, the victim has a few minutes to lock the device before the criminal starts accessing their data. “It keeps the screen active, puts the chip in another device and starts trying to change passwords from SMS (many apps give this option),” Kin notes.

  • How dating apps bring out the worst in some people
  • Fake accounts and spam: Understand the problem that made Elon Musk suspend his Twitter purchase

Another method is theft or theft with a cell phone lock. In this case, the gang seeks to clear the device’s memory with programs used by hackers. The expert says: “The goal is not to change account passwords, but to obtain offline information on the device. Documents and personal data are used to open accounts in banks other than those of the victim, and to implement frauds.”

Video: Learn what to do if your cell phone is stolen

Video: Learn what to do if your cell phone is stolen

Here are expert tips on how to increase security:

To protect yourself before possible theft

1. Do not touch your cell phone while walking

Before any configuration, Kin recommends paying attention to behavior. “Avoid touching your cell phone on the go. Victims have this specific pattern. Since the focus is on the device, they don’t notice who’s approaching. Before touching the cell phone, stop somewhere, without movement, like a trade.”

2. Use a code and auto lock screen option

Choose the shortest possible time for the automatic screen lock, thus reduce the chances of theft with unlocking the screen. Some cell phones offer the option to block after 30 seconds of inactivity.

3. Enable biometrics or facial recognition in apps

Look in your apps settings for the option to sign in with biometrics and face scanning. Telegram and Whatsapp are two examples that actually allow this activation. Even if the cell phone is stolen and the screen is unlocked, this procedure makes it difficult to access the information.

4. Enable two-factor authentication

Go to the settings of each of your main apps and search for the “Privacy” option to find the two-factor authentication option. “Always respect apps that generate codes and not SMS authentication, as a thief might be with your SIM,” close.

5. Do not save important information (such as passwords) on the device

Avoid keeping any kind of password in print, photos, laptops, as well as photos of your documents.

“A good tip is to type in the word ‘password’, ‘access’, look up messages and see if you’ve already sent them to someone. Sometimes it’s your password to enter an online store, but it’s the same password used to calculate the importance of Criminals have this view,” warns the president of the Brazilian Association of Cyber ​​Security.

If you want to keep a mobile phone number in the security settings of your accounts, it is best if it is not the same number that you use daily.

“This way, criminals will not be able to change the password by requesting a new code via SMS, because that other chip will be at home, not in the stolen device,” Kin explains.

7. Review and adjust your Pix limit

The Brazilian Confederation of Banks warns that since April last year, the user can control his limit in the instant payment system, which allows him to reduce or increase the amount available to carry out transactions and payments.

“This procedure is important to assist customers in their management and control of transactions on Pix. The functionality is available in online banking and banking applications in the ‘My Pix Limits’ area. With it, the customer will be able to review and configure the most appropriate amount for their daily financial transactions.”

To protect yourself after your device is stolen

Before calling the bank, filing a report or any other action, contact the operator and block the line. This is what will prevent the criminal from making any kind of calls or receiving SMS. Make a note of the protocol number confirming the lock request.

2. Banning banking operations

Then contact the bank with a request to block all operations via a mobile phone or computer.

“Only these two steps really represent a huge difficulty for criminals, who often move to the next machine,” says the expert.

3. Clear Cellular Data

Even if the device is not stolen with the screen unlocked, the first step is to wipe its data. If your device is running Android, there are four options to do so:

  • Use the Google Find My Device page;
  • Access the “Find My Device” app from another device;
  • Find the “My Account” section of Google;
  • Search Google for “find my device”.

If the cell phone is an iPhone, which uses iOS, use the iCloud website (accessible from any internet browser) or the search app, if you have any other Apple device, to clear the data.

Then the expert recommends changing your app passwords and checking the devices connected to that account – email, for example. Then disconnect these accounts from the stolen device.

Since changing the password requires SMS messages, it is important to have a new SIM card.

5. Submit an accident report

It is important to carry out all of the processes described above before going to the police station, due to the time it may take the victim to file a competition report – hours that can benefit the gang going forward with data theft.

If the criminal tries to carry out fraud through his social networks, it is important to share this information with the police.

“Of course, consideration must be given to the possibility that the offender is using a CPF that does not belong to him and a fraudulent checking account, but nevertheless, for a conviction, any and all data may be relevant and worth reporting, as this information associated with other relevant complaints and the subject of complaints from the Other victims in identifying crime,” directs attorney Alessandra Borelli, CEO of Opice Blum Academy, a firm specializing in knowledge of digital law and data protection.

Should I ask the bank for a refund if criminals get into my account?

Idec (Brazilian Institute for Consumer Protection) understands that failing to serve banks and financial institutions are security breaches that allow fraudsters and fraudsters to commit various acts harmful to consumers.

The institute notes that it is possible to file a complaint with the ombudsman of the bank. If you can’t solve the problem, the next option is to search for a Procon for your city so that the body can mediate in restoring the lost values. In addition to the possibility of registering a complaint with the Central Bank.

If a financial institution creates obstacles to canceling transactions or starts charging fraudulent credit card or loan payments after you contact the company, Idec suggests that the best option may be to go to court.

Leave a Comment