How to protect your data in case of theft or theft of a mobile phone: find out

How to protect your data in the event of theft or theft of a mobile phone: see The daily reports of people who have had their mobile phones stolen or stolen is a matter of concern for citizens scattered across the country. With the device in hand, criminals can access bank accounts, social networks, perform financial transactions and steal personal data, causing serious harm to the victim.

So what can you do to protect the contents of your cell phone in the event of theft or theft?

According to the experts heard by the report, certain actions are essential to try to avoid greater damage than the first, namely the loss of the phone.

“If your mobile phone has been stolen, stolen or you have lost it, the first thing to do is to call your operator, inform them of what happened and request that your SIM card be blocked You must also enter the IMEI of your mobile phone and request the blocking of the device,” says Raphael Tedesco, Head of NSFOCUS Cybersecurity Alliance in Latin America.

The IMEI (International Mobile Equipment Identification, in Portuguese) is the identification number of your phone. It is unique and is in the original mobile phone box. You can also find out your device’s IMEI by going to the device settings or by typing the code *#06# on the phone keypad as if you were making a call. The number will appear on the screen.

For Thiago Bordini, head of cyber intelligence at Axur, a digital security company, the next step should be to change your Google or Apple ID access password.

“We have to change the Passwords, mainly emails and accounts from Apple, for iPhones, or Google, for Android, to prevent criminals from changing passwords or settings for cellphones and applications installed on the device,” explains Bordini.

It is also possible to remotely lock or wipe mobile data via or

Another important step to take is to contact the bank of which you are a customer, inform them that your device has been stolen or stolen and immediately request that your app and cards be blocked to prevent criminals from carrying out transactions. or purchases on your behalf. .

Bordini also indicates that actions to block the chip, mobile phone and accounts must be carried out as soon as possible.

“These attitudes must be adopted as quickly as possible by the person. Maybe in ten or fifteen minutes. It is not possible to take too long because it may be too late. In addition, it is important to file a police report because it will be the one that will protect you from future problems, suddenly an undue charge, from a property engaged in your name. With the BO, you can prove it was stolen, that you didn’t do it,” says Axur’s head of cyber intelligence.


Experts also point out that there are simple measures that help prevent criminals from using cellphones as tools to obtain money or data from victims.

Tedesco and Bordini do not advise users to leave their own number registered to receive SMS as a secondary factor for account authentication.

“You can keep an extra phone with the same operating system that you use every day. You may no longer use that old device. Instead of selling it, keep it stored with a chip just to do those SMS authentications of email accounts, cryptocurrency tokens. Thus, if the criminal tries to reset a password, the message will arrive on another mobile phone and he will not be able to achieve his goal,” explains Tedesco.

Bordini says it’s possible to use apps that create a virtual phone number to perform this two-factor authentication.

“You may use the virtual number generated by applications only for the authentication of email accounts, social networks, WhatsApp. So, if your mobile phone is stolen, you can access this application and prevent the SMS from reaching the person who has your mobile phone,” explains the expert.

There is also the possibility of activating the PIN code of the SIM card. The PIN is a code that can lock or unlock the operator’s SIM card. If the function is activated on your mobile phone, it will be necessary to enter this password each time the user turns on or restarts the phone, or inserts the SIM card into another device.

Each carrier has a default PIN. For Claro the code is 3636 while for Tim it is 1010. Vivo, on the other hand, uses the number 8486 and OI uses the number 8888. However, upon activating the feature, the user can edit this number sequence and save one. of their own.


Frequently update software and mobile applications

Use complex passwords that mix upper and lower case letters, numbers and symbols

Do not leave passwords written in device applications

Avoid downloading apps that will be used infrequently but provide access to important information such as investment accounts

Do not store credit card images

Avoid using features that complement passwords

Leave a Comment