What to Do If Your Smartphone Is Stolen
Password protect everything and take advantage of encryption to ensure the safety of your devices.

The Problem
Your personal computer, smartphone or other device is lost or stolen, putting a treasure trove of information about you at risk.
Scare Factor
A thief who steals your device may be able to access your e-mail, view sensitive documents or use your banking or mobile wallet app to get account numbers and rack up charges. Malware that you accidentally download could spy on your transactions, record keystrokes and grab data. When you use public Wi-Fi, other users on the network could snoop on your online activities.
How to Combat: Stolen Social Security Number | Medical ID Theft | Tax Identity Fraud | Hacked Credit/Debit Account
How to Avoid It
Always lock your devices with a fingerprint sensor, a password or a PIN—one with six or more characters, if possible. Password-protect banking, wallet and other sensitive apps, too. When you get notifications to download updates for your operating system, antivirus software and other programs, do it right away because they may patch security flaws. But never click on a link or attachment in a text message or e-mail from an unfamiliar source (or from what appears to be a familiar source, if anything about the message looks fishy) because it could infect your device with malware.

Sign up for Kiplinger’s Free E-Newsletters
Profit and prosper with the best of expert advice on investing, taxes, retirement, personal finance and more - straight to your e-mail.
Profit and prosper with the best of expert advice - straight to your e-mail.
Use trusted Wi-Fi networks, preferably ones that are password-protected. Although encrypted Web sites (those that begin with “https”) add protection by making your activities unreadable by hackers, it’s better to be safe than sorry; avoid online banking and other sensitive transactions when using public Wi-Fi, especially through mobile apps that don’t clearly disclose whether they’re encrypted. If you travel a lot, consider using a personal Virtual Private Network (VPN), which funnels Web activity through a secure network, says Gary Miliefsky, CEO of cybersecurity firm SnoopWall. Private Internet Access, for example, charges $6.95 a month.
Before you download a mobile app, read reviews, check its privacy policy and permissions, and visit its Web site to see whether it looks legitimate. If an app requires, say, access to your phone’s camera or GPS for no apparent reason, take a pass on it. Be especially cautious with apps from the Google Play store because anyone can place an app on that market. Apple screens apps more rigorously.
What to Do If You’re a Victim:
With remote tracking and wiping capability, you can find a stolen or lost device’s location and erase its contents. Users of Apple’s computers, tablets and phones can set up the option through iCloud and with the Find My iPhone app. Android owners can use Google’s Android Device Manager app.
If your smartphone’s performance is unusually slow or if the device gobbles data service or battery power rapidly without clear cause, it may be infected with malware. Your wireless carrier’s phone store may help you clean up the problem and reset the phone free of charge. Services such as Best Buy’s Geek Squad can help with virus removal, too.
How to Combat: Stolen Social Security Number | Medical ID Theft | Tax Identity Fraud | Hacked Credit/Debit Account
Profit and prosper with the best of Kiplinger's advice on investing, taxes, retirement, personal finance and much more. Delivered daily. Enter your email in the box and click Sign Me Up.

Lisa has been the editor of Kiplinger Personal Finance since June 2023. Previously, she spent more than a decade reporting and writing for the magazine on a variety of topics, including credit, banking and retirement. She has shared her expertise as a guest on the Today Show, CNN, Fox, NPR, Cheddar and many other media outlets around the nation. Lisa graduated from Ball State University and received the school’s “Graduate of the Last Decade” award in 2014. A military spouse, she has moved around the U.S. and currently lives in the Philadelphia area with her husband and two sons.
-
The Y Rule of Retirement: Why Men Need to Plan Differently
If you have a Y chromosome (because you're a guy), following the 'Y rule of retirement' can help you transition to this new life stage with grace.
-
Retire on This Island for Mediterranean Living on the Cheap
This independent nation has a lower cost of living and more visa options than many of its Mediterranean cousins.
-
The 8 Financial Documents You Should Always Shred
Identity Theft The financial documents piling up at home put you at risk of fraud. Learn the eight types of financial documents you should always shred to protect yourself.
-
How to Guard Against the New Generation of Fraud and Identity Theft
Identity Theft Fraud and identity theft are getting more sophisticated and harder to spot. Stay ahead of the scammers with our advice.
-
12 Ways to Protect Yourself From Fraud and Scams
Identity Theft Think you can spot the telltale signs of frauds and scams? Follow these 12 tips to stay safe from evolving threats and prevent others from falling victim.
-
Watch Out for These Travel Scams This Summer
Identity Theft These travel scams are easy to fall for and could wreck your summer. Take a moment to read up on the warning signs and simple ways to protect yourself.
-
Amazon Resale: Where Amazon Prime Returns Become Your Online Bargains
Feature Amazon Resale products may have some imperfections, but that often leads to wildly discounted prices.
-
How to Guard Against Identity Theft in 2025
Scammers are getting better at impersonating legitimate businesses.
-
Roth IRA Contribution Limits for 2025
Roth IRAs Roth IRA contribution limits have gone up. Here's what you need to know.
-
Four Tips for Renting Out Your Home on Airbnb
real estate Here's what you should know before listing your home on Airbnb.