How to protect your data in case of theft or theft of a cell phone: check the daily reports of people who have files Stolen or stolen cell phones are a concern of citizens scattered across the country. With the device in hand, criminals can access bank accounts and social networks, conduct financial transactions and steal personal data, causing serious harm to the victim.
So, what can you do to protect your cell phone contents in case of theft or theft?
According to the experts who heard the report, some measures are necessary to try to avoid more damage than the first, which is losing the phone.
“If your cell phone is stolen, stolen or lost, the first thing you should do is contact the operator, tell them what happened and ask to block your SIM. You must also enter the IMEI of your cell phone and ask to block the device,” says Rafael Tedesco, Director of Security Alliance. Cyber at NSFOCUS in Latin America.
IMEI (International Mobile Equipment Identity, in Portuguese) is your phone’s identification number. It is unique and can be found in the original cell phone box. You can also find out your device’s IMEI by accessing the device settings or by entering the code *#06# on the phone keypad as if you were making a call. The number will appear on the screen.
For Thiago Bordini, head of electronic intelligence at Axur, a digital security company, the next step should be to change the password to access your Google or Apple ID.
“It is essential to change passwords, especially for emails and Apple accounts, for iPhones, or Google, for Android, to prevent criminals from changing passwords or settings on the cell phone and apps installed on the device,” Bordini says.
It is also possible to lock or erase mobile data remotely via android.com/find or icloud.com.
Another important step to take is to contact the bank you are a customer of, inform them that your device has been stolen or stolen, and immediately request that your app and cards be blocked to prevent criminals from making transactions or purchases on your behalf. .
Bordini also points out that SIM, cell phone, and account blocking procedures should be implemented as quickly as possible.
These positions should be taken as quickly as the person can. Maybe in ten or fifteen minutes. It cannot take long because it may be too late. In addition, it is important to file a police report because he will be the one who will protect you from future troubles, suddenly from an unnecessary charge, from a good employee who has been appointed on your behalf. With BO, you can prove that it was stolen, and that you didn’t,” says Axur’s head of electronic intelligence.
Experts also point out that there are simple measures that help prevent criminals from using cell phones as tools to obtain money or data from victims.
Both Tedesco and Bordini do not advise users to leave their numbers registered to receive SMS as a secondary factor for account authentication.
“You can keep an extra phone with the same OS that you use every day. It could be the older device that you no longer use. Instead of selling it, just keep it stored on a chip to do SMS authentication for email accounts, crypto tokens. So, if he tries The criminal resets any password, the message will arrive on another cell phone and he will not be able to reach his target,” says Tedesco.
Bordini says it’s possible to use apps that generate a phone number by default to do this two-factor authentication.
“You can only use the default number generated by the apps to authenticate your email, social network and WhatsApp accounts. So, if your cell phone is stolen, you can access this app and block the SMS from reaching the person who has your cell phone,” says the expert.
There is also an option to enable a PIN for the SIM card. A PIN is a code that can lock or unlock your carrier’s SIM card. If the function is activated on your cell phone, it will be necessary to enter this password each time the user turns on or restarts the phone, or inserts a SIM card into another device.
Every carrier has a virtual PIN. For Claro, the code is 3636, while for Tim it is 1010. On the other hand, Vivo uses the number 8486 and the OI uses the number 8888. However, when the function is activated, the user can change this number sequence and register their own.
Update your mobile software and apps frequently
Use complex passwords that combine uppercase and lowercase letters, numbers, and symbols
Do not leave passwords written in device applications
Avoid downloading applications that will be used little, but give access to important information such as investment accounts
Do not store bank card images
Avoid using features that complement passwords