DICKY IBROHIM
Technical Note

How to Secure Your Phone After It Is Lost or Stolen

How to Secure Your Phone After It Is Lost or Stolen

A practical recovery order for a lost phone: block the SIM, protect banking access, recover email, remove the missing device, and prepare backup paths before it happens.

When a phone is stolen or lost, do not think only about the price of the phone.

The dangerous part is the access inside it.

There is a phone number.

There is email.

There is a bank account.

There is a digital wallet.

There is WhatsApp.

There is social media.

There are shopping accounts.

There are many doors into your digital life.

So do not think:

My phone is gone.

Think this instead:

My access is exposed.

That is the starting point.

When the starting point is right, the recovery order becomes clearer.

The lifeline: phone number and email

Two things must be secured first.

  1. Your phone number.

  2. Your email.

The phone number is the OTP door.

Email is the password reset door.

If both are safe, you still have a way back into other accounts.

If both fall, other accounts can fall with them.

So do not begin with the most formal step.

Begin with the step that closes access fastest.

1. Do not wait for a loss report

A loss report still matters.

But do not make it the first step.

Why?

Because a report can make you wait.

You may have to queue.

You may have to find an office that is open.

You may have to prepare documents.

When a phone is lost, the first minutes matter.

The first step is to contact your mobile provider.

Ask them to block your SIM card.

Tell them your phone was lost or stolen.

Tell them you will request a replacement SIM with the same number.

After that, handle the other steps.

Do not reverse the order.

2. Contact your mobile provider immediately

Use someone else’s phone.

It can be a family member’s phone.

It can be a friend’s phone.

It can be any phone owned by someone you trust.

Call the official customer service number for your provider.

Say it clearly:

  • my phone was lost or stolen;
  • my number is inside that phone;
  • I want the old SIM blocked;
  • I will request a new SIM with the same number.

This is important.

While the old SIM is active, someone may still be able to receive OTP messages.

Those OTPs can be used to try to access WhatsApp.

They can be used to try to access email.

They can be used to try to access wallets.

They can be used to try to take over other accounts.

If the phone is lost at night, still call the provider.

Do not wait for the store to open tomorrow.

Ask the provider to block the number that night.

The next day, visit the provider to request the replacement SIM.

The point is simple.

Block first.

Replace the SIM as soon as possible.

3. Go to the mobile provider

After the old SIM is blocked, request a new SIM.

Ask for the same phone number.

That same number matters.

It may be used for OTP.

It may be used for WhatsApp.

It may be used for email recovery.

It may be used for digital banking.

Before visiting the provider, check the latest procedure.

Use Google from a computer or another phone.

Find the provider’s official page.

Do not visit without checking the requirements.

If one requirement is missing, you may have to go back and forth.

That wastes time.

Telkomsel

Check Telkomsel’s official page:

Replacing a lost or damaged SIM card

The page explains that you need an e-KTP and Kartu Keluarga.

You also need to remember 2 numbers contacted within the last 1 month.

If everything is ready, go to GraPARI.

If the data matches, the process may take only a few minutes.

XL

Check XL’s official page:

Replacing a lost or damaged XL/AXIS card

XL requires e-KTP and Kartu Keluarga.

For lost cards, the process cannot be delegated.

XL provides online and offline options.

Choose the fastest route.

The goal is to reduce the risk of number misuse.

IM3

Check IM3’s official page:

Card replacement requirements

IM3 requires e-KTP and Kartu Keluarga.

If represented by someone else, a power of attorney is needed.

So do not show up unprepared.

Tri

Check Tri’s official page:

Steps when a card is lost or damaged

The general steps are to block the card by phone or email.

Then visit the nearest 3Store.

Bring e-KTP and Kartu Keluarga.

AXIS

Check AXIS’s official page:

Replacing a lost or damaged AXIS card

AXIS requires e-KTP and Kartu Keluarga.

For lost cards, the process cannot be delegated.

You must come directly to an XL Center.

Again, check the latest procedure first.

Do not rely on memory.

Do not rely on old videos.

Do not rely on random comments.

Use the provider’s official information.

4. Make sure the number uses your real identity data

This is very important.

Make sure your phone number is registered with your own real NIK and KK.

Not random data.

Not someone else’s data.

Not old data you do not understand.

If the registration data does not match, replacing the SIM can be difficult.

All the steps above may become useless.

You may want to block the SIM.

But the provider needs verification.

You may want to replace the SIM.

But the data does not match.

Then you get stuck in administration.

So verify this before anything bad happens.

Do not play around with this.

5. Call your bank

After the phone number is being handled, call your bank.

Do not wait for the phone to be found.

Assume you are in the riskiest position.

Especially if the phone has no password.

Or no fingerprint lock.

Or no face unlock.

Or the banking app can still be opened easily.

Call the official call center for your bank.

Get the number from the bank’s official website.

Or from your ATM card.

Or from your passbook.

Do not take the number from a search ad.

Do not take it from social media comments.

Do not take it from a WhatsApp account claiming to be customer service.

When connected, explain the problem.

Say your phone was lost or stolen.

Say that the phone contains mobile banking or digital banking apps.

Ask the bank to temporarily block mobile banking access.

If needed, ask them to temporarily block risky debit or credit cards.

Especially cards connected to digital wallets.

The goal is not to lose your money.

The goal is to close money-out paths.

When the situation is safe, access can be opened again.

The bank will usually ask verification questions.

For example, your full name.

Account number.

Account name.

Mother’s maiden name.

Date of birth.

Last balance.

Recent transaction.

Or other verification details.

That is why you need important notes in a safe place.

Not only on the phone you carry every day.

At minimum, know your basic bank details.

Do not keep everything only on the phone.

When the phone is gone, those notes are gone too.

The most important rules:

  • never give your PIN;
  • never give your password;
  • never give an OTP;
  • never send card photos;
  • never install an app because someone claiming to be an officer tells you to.

Real customer service does not need your OTP.

If someone asks for an OTP, that is a red flag.

6. Try to access Gmail or your main email

After the SIM and bank are handled, secure your email.

Email is the recovery center for many accounts.

From email, you can reset passwords.

From email, you can review login attempts.

From email, you can remove the missing device.

But this part can be tricky.

Why?

Because when you sign in to Gmail on a new device, Google may ask for approval from the old phone.

The problem is that the old phone is missing.

This is where many people panic.

They know the email password.

But they still cannot sign in.

Because approval is sent to the missing phone.

That is why prevention must be prepared before the incident.

7. Before anything happens, keep email signed in on another safe device

This is important.

If you have a computer at home, sign in to your main email there.

If you have a personal laptop, sign in there.

If you have a spare phone at home, sign in there.

Do not carry every device when you go out.

Leave one safe device at home.

That device can become your recovery path.

But do not sign in carelessly.

If it is a computer, it must have a password.

If it is a laptop, it must have a password.

If it is a spare phone, it must have a PIN or fingerprint lock.

Do not create a recovery path that someone else can easily break into.

8. Create passkeys on several personal devices

This is one of the strongest tips.

Create a passkey for your email account.

Create passkeys on several safe personal devices.

For example, on your home laptop.

On your personal computer.

Or on your spare phone.

A passkey is a device-based login method.

Usually, you do not need to type a password again.

Usually, you use fingerprint, face unlock, Touch ID, Windows Hello, or the device screen lock.

This helps a lot when your main phone is gone.

Because you do not always depend on OTP.

You also do not always depend on approval from the missing phone.

Many people skip passkeys.

But in a lost-phone case, a passkey can be the way home.

How to create a Google Account passkey for Gmail login

Google has an official page for creating passkeys:

Create a passkey for your Google Account

The general flow is simple.

Sign in to your Google Account.

Open the passkey setup page.

Choose Create a passkey.

Follow the instructions on the device you are using.

Usually, you will use fingerprint, face unlock, PIN, pattern, or the device screen lock.

After that, the device can be used to sign in to your Google Account with a passkey.

Repeat this on several safe personal devices.

For example, your home laptop.

Your personal computer.

Or a spare phone.

Do not create passkeys on public devices.

Do not use a friend’s laptop.

Do not use a shared office computer.

The point is:

create passkeys before the bad day.

Do not wait until the phone is gone.

9. If you can access email, remove the missing phone

If you can access Gmail or your main email, check the device list immediately.

For Google accounts, you can see devices that are currently signed in.

Google provides the guide here:

Secure an account after a device is lost

Find the missing phone.

Remove that device from the account.

After that, change the email password.

Check the recovery phone.

Check the recovery email.

Check the devices still signed in.

Check for unfamiliar activity.

If the phone number has been blocked, you are relatively safer.

If it has not been blocked, remove that recovery phone immediately.

Or temporarily change it to a safe backup number.

After you recover the same phone number, change it back.

Do not forget this part.

Many people change it temporarily and then forget to restore it.

10. Secure social media and important accounts

With the phone number and email under your control, you can reset many accounts.

Use that ability quickly.

Sign in to important accounts.

WhatsApp.

Telegram.

Instagram.

Facebook.

TikTok.

X.

LinkedIn.

Marketplaces.

Digital wallets.

Work accounts.

Cloud accounts.

Any account that matters.

Change passwords.

Force logout other devices.

Remove sessions from the missing phone.

Check for unfamiliar phone numbers.

Check for unfamiliar emails.

Check for unfamiliar devices.

If you have not recovered the replacement SIM yet, still try to sign in with email.

Sometimes email is enough.

If you get in, temporarily change the phone number to a safe backup number.

Then reset the password.

Then force logout every other device.

If you are lucky, you already have safe devices at home that are still signed in to your accounts.

That makes a hard situation much easier.

You do not have to start from zero.

11. Warn people close to you

After accounts start becoming safe, warn family and close friends.

Tell them your phone is missing.

Tell them not to trust money requests from your account.

Tell them not to open strange links from your account.

Tell them not to give OTP codes to anyone.

This matters.

Scammers often use a victim’s account to attack people close to them.

They can pretend to be you.

They can ask for transfers.

They can ask for OTP codes.

They can send fake links.

So do not stay silent.

Warn early.

12. Then handle the loss report

After the emergency steps are done, handle the loss report.

The report is still useful.

For administration.

For claims.

For banks.

For providers.

For evidence if abuse happens.

But do not make the report the first step.

The first step is closing access.

Not waiting in line.

Prevention before the phone is lost

This part is more important than the emergency part.

When the phone is gone, you can only use the preparation you already made.

If nothing was prepared, recovery becomes harder.

1. Require a password to power off the phone or change important settings

Make sure your phone cannot be turned off easily by someone else.

Some phones can require a password before powering off.

Or before airplane mode is turned on.

Or before network settings are disabled.

The feature name differs by brand.

Look inside your phone security settings.

The goal is simple.

If the phone is stolen, the thief cannot immediately turn it off.

If the phone stays on, you still have a chance to track GPS location.

This does not guarantee the phone will return.

But it gives you a better chance than a phone that goes dead immediately.

2. Enable high-accuracy GPS

Make sure location or GPS is active.

Use high-accuracy location mode if available.

This matters for tracking.

If location is off, tracking becomes weak.

If the internet is off, tracking can also fail.

That is why an active data plan also matters.

Not only for browsing.

Also for security.

A missing phone is easier to track when it is still connected to the internet.

3. Always use a screen lock

Turn on a PIN.

Or a password.

Or fingerprint.

Or face unlock.

Do not use a phone without a screen lock.

Do not disable the PIN because it feels annoying.

Three seconds to unlock can save your accounts.

It can save your bank.

It can save your email.

It can save your identity.

Do not use an easy PIN.

Do not use 123456.

Do not use 000000.

Do not use your birthday.

Do not use an obvious pattern.

4. Do not store passwords in a normal notes app

Do not store passwords in a normal notes app.

Do not store bank PINs in notes.

Do not store OTPs.

Do not store ID photos carelessly.

Do not store ATM card photos.

A normal notes app is not designed for secrets.

Use a password manager.

For example, Bitwarden.

Or paid services like NordPass, SecureSafe, or another credible option.

A password manager stores passwords for many accounts.

You do not need to remember every password.

You only need to remember one strong master password.

That master password must be long.

It must be unique.

Do not reuse it anywhere else.

And do not store it carelessly on the same phone.

5. Keep important accounts signed in on another safe device

Do not rely on one phone only.

Keep important accounts signed in on another safe device.

At least one device at home.

For example, a personal laptop.

A personal computer.

A tablet.

Or a spare phone.

The phone you carry every day has higher risk.

The device at home can be the recovery path.

From that device, you can open email.

From that device, you can log out the missing phone.

From that device, you can reset passwords.

From that device, you can secure other accounts.

But the home device must also be safe.

Do not leave it without a password.

Do not let everyone use it.

Do not leave it open all the time.

6. Set passkeys on all safe personal devices

I repeat this because it matters.

Set passkeys on every safe personal device.

Not on public devices.

Not on internet cafe computers.

Not on a friend’s laptop.

Not on shared office devices.

Use devices you control.

Passkeys can help a lot when the main phone is lost.

When signing in, you do not always depend on the missing phone.

This is one of the strongest tips for this case.

And I do not think it is discussed seriously enough.

7. Secure the laptop or computer at home

If your backup device is Windows, Linux, Mac, a laptop, tablet, or workstation, make sure it has a password.

Make sure it locks automatically when not used.

Do not leave the home computer on and open.

Do not leave the browser open without protection.

Do not leave email signed in on a device everyone can use.

If possible, turn on disk encryption.

On Windows, use BitLocker.

On macOS, use FileVault.

On Linux, use disk encryption such as LUKS.

I stress this because a login password alone is sometimes not enough.

Technical people may be able to enter a device using certain methods.

Those methods were originally made for recovery.

But they can still be misused.

So protecting the home device matters too.

8. Use CCTV to protect the place where backup devices are stored

If backup devices are at home, the home also needs protection.

Use CCTV to monitor entry points.

Front door.

Side door.

Back door.

Windows.

Garage.

Any area someone may pass through.

Make sure there is no large blind spot.

Use CCTV with good resolution.

Faces should be clear during the day.

Faces should also be clear enough at night.

If possible, choose CCTV with a loud alarm.

Even better if it can distinguish people, vehicles, and animals.

To reduce the number of cameras, use wide-angle CCTV.

For example, a 180-degree camera.

I personally like Reolink for this.

Especially for image quality and object detection.

9. If you have extra budget, install indoor CCTV

Outdoor CCTV matters.

Indoor CCTV can also help.

Especially for areas where important devices are stored.

For example, a work room.

A computer room.

A laptop storage area.

A document storage area.

You do not need cameras in every room.

Focus on important points.

The goal is not to make the house feel like an office.

The goal is to keep your digital recovery path safe.

10. Store CCTV footage in the cloud if possible

Do not rely only on the memory card inside the camera.

The memory card can be removed.

The camera can be damaged.

The NVR can be stolen.

The hard disk can be taken.

If you have extra budget, connect CCTV to cloud storage.

That way, footage still exists even if physical devices are damaged.

At minimum, use two storage paths.

Local and cloud.

Do not rely on only one.

One path can fail.

The point: build more than one recovery path

Do not have only one door.

Do not rely only on your main phone.

Do not rely only on your phone number.

Do not rely only on an email account that can only be opened from that phone.

Build backup paths.

The phone number must be recoverable.

Email must be accessible from another safe device.

Passkeys must exist on several personal devices.

Passwords must be stored in a password manager.

The bank must be blockable through the call center.

The home device must be safe.

The home should also be safe.

When a phone is lost, you are not looking for comfort.

You are looking for a way home.

And that way home must be built before the incident.

Quick checklist when a phone is lost

Call the mobile provider.

Ask them to block the old SIM.

Request a new SIM with the same number.

Call the bank.

Ask for temporary blocking of risky mobile banking or cards.

Try to lock the phone remotely.

Sign in to your main email from a safe device.

Log out email from the missing phone.

Change the email password.

Check recovery phone and recovery email.

Sign in to important social accounts.

Change important passwords.

Force logout every other device.

Secure WhatsApp.

Warn family and close friends.

After important access is safe, handle the loss report.

Closing note

A phone can be bought again.

But a phone number and email are far more dangerous in the wrong hands.

The phone number is the OTP door.

Email is the password reset door.

If both are safe, you still have control.

If both are lost, your digital life can become messy very quickly.

So do not wait for the bad day.

Prepare now.

Turn on screen lock.

Turn on GPS.

Turn on phone tracking.

Protect the SIM.

Use a password manager.

Create passkeys.

Keep email signed in on a safe backup device.

Secure the home device.

Build more than one recovery path.

When a phone is lost, panic does not save you.

Preparation does.

References

  1. Telkomsel: Replacing a lost or damaged SIM card
  2. XL: Replacing a lost or damaged XL/AXIS card
  3. IM3: Card replacement requirements
  4. Tri: Steps when a card is lost or damaged
  5. AXIS: Replacing a lost or damaged AXIS card
  6. Google: Find, secure, or erase a lost Android device
  7. Google: Secure an account after a device is lost
  8. Google: Create a passkey for a Google Account
  9. Apple: Use Lost Mode in Find Devices on iCloud.com

Versi Bahasa Indonesia: /id/note/cara-mengamankan-ponsel-ketika-dicuri-atau-hilang/.