{"id":12575,"date":"2013-03-28T09:06:33","date_gmt":"2013-03-28T16:06:33","guid":{"rendered":"http:\/\/www.intego.com\/mac-security-blog\/?p=12575"},"modified":"2024-08-02T15:57:21","modified_gmt":"2024-08-02T22:57:21","slug":"what-to-do-if-your-iphone-gets-stolen","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/what-to-do-if-your-iphone-gets-stolen\/","title":{"rendered":"What to do if your iPhone gets stolen\u2014and how to prevent iPhone theft"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-12631\" title=\"pickpocket-sign-blog-header\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/pickpocket-sign-blog-header.jpg\" alt=\"\" width=\"600\" height=\"350\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/pickpocket-sign-blog-header.jpg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/pickpocket-sign-blog-header-150x87.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/pickpocket-sign-blog-header-300x175.jpg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p><em>See also our newer article on <a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-enable-stolen-device-protection-for-iphone\/\">how to enable Stolen Device Protection for iPhone<\/a>.<\/em><\/p>\n<p>Theft is a lame and unfortunate risk of living in close proximity to other humans. In the case of iPhones, it&#8217;s a <a href=\"https:\/\/archive.nytimes.com\/cityroom.blogs.nytimes.com\/2012\/12\/28\/crime-is-up-and-bloomberg-blames-iphone-thieves\/\" target=\"_blank\" rel=\"noopener\">growing problem<\/a>. But there are things you can do to make the theft of your device a less terrible experience and to minimize the possibility of strangers accessing your accounts or your personal data. Some of these are actions you can (and should) take while your phone is still in your safe care, while the rest are things you should do to keep from singing the blues after your device has been taken from you.<\/p>\n<h3>&#8220;<a href=\"https:\/\/www.youtube.com\/watch?v=QahLDjXLRME\" target=\"_blank\" rel=\"noopener\">I Will Not Let You Go<\/a>&#8220;<\/h3>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-12615\" title=\"holding-phone\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/holding-phone.jpg\" alt=\"\" width=\"500\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/holding-phone.jpg 500w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/holding-phone-150x90.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/holding-phone-300x180.jpg 300w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/p>\n<p>While your iPhone is still safe and warm in your own two hands, you can do a few things to help keep your device with you always and forever (well, at least until it comes time to upgrade with the newest version!).<\/p>\n<p><strong>Be Aware of Your Surroundings<\/strong><br \/>\nWe have probably all had that awkward moment when we were texting while walking and then ran into a wall or tripped on a curb. This isn\u2019t just risky to our foreheads and our pride. Thieves can and do use this inattention as an opportunity to sneak up on you, especially in uncrowded areas.<\/p>\n<p><strong>Keep Your Phone Somewhere Secure<br \/>\n<\/strong>Pick-pockets like an easy target. Keeping your phone in a pocket of your jeans or on the outside of your purse is not a great idea, especially if you\u2019re in a heavily crowded area. If you can keep your phone hidden and close to your body, it is much less likely to be nabbed.<\/p>\n<p><strong>Enable the Passcode Lock<\/strong><br \/>\nIt seems like there\u2019s always <a href=\"https:\/\/www.intego.com\/mac-security-blog\/return-of-the-passcode-flaw-in-ios-6-1-3\/\">some new flaw<\/a> that will allow someone to get past the passcode lock if they steal your phone. But the odds are good the thief may not know the magic sequence that works on your particular phone (and they may lack the dexterity of a concert pianist that\u2019s required for some of the crazy iterations!).<\/p>\n<p><strong>Install a <\/strong><strong>Device-Finder App<\/strong><a href=\"https:\/\/www.intego.com\/mac-security-blog\/12-apple-device-finder-apps-similar-to-find-my-iphone\/\"><br \/>\n<\/a>It\u2019s a good idea to turn on \u201cFind My iPhone\u201d or a similar <a href=\"https:\/\/www.intego.com\/mac-security-blog\/12-apple-device-finder-apps-similar-to-find-my-iphone\/\">device-finding app<\/a> in case of theft. There are also a variety of apps out there that complement or go beyond the functionality of Apple\u2019s offering that can help you recover your phone.<\/p>\n<p><strong>Create a Dummy Account<\/strong><br \/>\nIf you do have a device-finder app installed, in order to lure the thief in so the Device-Finder can do its more advanced actions, you will want to create a dummy account with no admin privileges and no password.<\/p>\n<p><strong>Encrypt Your Data<\/strong><br \/>\nThere are apps out there that will let you encrypt text messages, photos, and notes. If you really want to keep your data from prying eyes, you may want to invest in one.<\/p>\n<p><strong>Disallow Unauthorized Changes<\/strong><br \/>\nTo help keep a thief from undoing all your hard work here, you\u2019ll want to make a couple more changes. Go to the Settings of your device and look in General-&gt;Restrictions. If you\u2019ve not implemented any restrictions before, it will ask you to create a password. Once you\u2019ve done that, look under the \u201cAllow\u201d section for \u201dDeleting Apps\u201d and switch it to Off. When you\u2019re finished that, find the \u201cAllow Changes\u201d section (also under Restrictions) and select \u201cAccounts\u201d to choose \u201cDon\u2019t Allow Changes.\u201d<\/p>\n<p><strong>Perform Regular Backups<br \/>\n<\/strong>You\u2019ll be a lot less reluctant to throw the kill switch and remotely wipe your data if you know you can restore it at a moment\u2019s notice. This can give you a lot of peace of mind knowing a thief isn\u2019t taking the only copy of important data or precious mementos.<\/p>\n<h3>&#8220;<a href=\"https:\/\/www.youtube.com\/watch?v=qU7HTgAAgQc\" target=\"_blank\" rel=\"noopener\">I&#8217;ve Got Tears in My Ears<\/a>&#8220;<\/h3>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-12619\" title=\"crying\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/crying.jpg\" alt=\"\" width=\"500\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/crying.jpg 500w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/crying-150x90.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/crying-300x180.jpg 300w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/p>\n<p>Oh, the woe of losing your device! Once you dry those tears, what now? What can you do to try to get your device back or keep a thief from getting their grubby mitts all over your digital life?<\/p>\n<p><strong>If It\u2019s a Work Phone, Notify Your IT Person<\/strong><br \/>\nThere may be rules in your company about what to do in case of theft, which will almost certainly involve notifying someone if your phone has been lost or stolen. If there is sensitive company data on your phone, they may be able to block access.<\/p>\n<p><strong>Call Your Cell Phone Company<\/strong><br \/>\nYou don\u2019t want to be on the hook for any fraudulent calls or purchases made on your phone. The phone company may require a police report, but it\u2019s best to get the ball rolling as quickly as possible so you can avoid extra charges.<\/p>\n<p><strong>File a Police Report<\/strong><br \/>\nAnything you want to do from this point forward will be best accomplished with a police report in place. So go to the nearest law enforcement office and document the theft. Your cell phone company may require it and your insurance will definitely require it. And if you get information from a Device-Finder app, the police will be better able to help you recover it.<\/p>\n<p><strong>Track Your Device<\/strong><br \/>\nHere\u2019s where the Device-Finder apps really earn their keep. Fire \u2018em up and gather some data. If you didn\u2019t already install one, all hope is not lost. There is a <a href=\"https:\/\/lifehacker.com\/use-dropbox-to-locate-your-lost-or-stolen-computer-5785518\" target=\"_blank\" rel=\"noopener\">little trick using Dropbox<\/a> that still might help you determine the device\u2019s IP so you can try to locate it. Once you get that data, bring it to the local police. They\u2019re trained to deal with folks breaking the law who could potentially get violent &#8212; you don&#8217;t want to try and confront the perpetrator yourself and risk getting injured over a phone.<\/p>\n<p><strong>Change Your Passwords<\/strong><br \/>\nWhether or not you get your phone back after all that, you\u2019re gonna want to play it safe and change your passwords. It\u2019s hard to say if the thief will have successfully gotten into your phone and any accounts that your phone has access to, so change your passwords (including email accounts, social networking profiles, and any other online services) as an extra security measure.<\/p>\n<p><strong>Wipe Your Data<\/strong><br \/>\nHow sensitive the data on your phone is (and how recently you\u2019ve performed a backup!) will decide where in the process this step comes. You may want to do this immediately, but you&#8217;ll at least want to do it as a last resort if you don\u2019t manage to get your phone back.<\/p>\n<p><strong>Call Your Insurance Company<\/strong><br \/>\nAssuming you have insurance on your phone, you\u2019re going to want to replace your device as quickly as possible so you don\u2019t have to live without it. If you eventually manage to recover your phone, that&#8217;s great, but don&#8217;t wait around in hopes of recovering your old device before finally caving and contacting your insurance company. File a claim as soon as you notice your phone is gone so you&#8217;ll have a replacement device as quickly as possible. Your phone may never be recovered, so the sooner you get the ball rolling with the insurance company, the better.<\/p>\n<p><strong>Notify Your Contacts<\/strong><br \/>\nYou don\u2019t want people to worry that you\u2019ve fallen off the face of the earth, or to be tricked into sending money to get you out of trouble in some remote locale! Drop your contacts a note to let them know to be on the lookout for strange communications that may not be from you.<\/p>\n<p>There\u2019s no guaranteeing you will never lose your device, or (more importantly!) the data on it, but with a little preparation and a cool head you can minimize the pain and get back on track.<a name=\"learnmore\"><\/a><\/p>\n<h3>How can I learn more?<\/h3>\n<p><a href=\"https:\/\/podcast.intego.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img class=\"alignleft\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/04\/intego-podcast-artwork-400.jpg\" alt=\"\" width=\"80\" \/><\/a><\/p>\n<p>Each week on the <a href=\"https:\/\/podcast.intego.com\/\" target=\"_blank\" rel=\"noopener\"><strong>Intego Mac Podcast<\/strong><\/a>, Intego&#8217;s Mac security experts discuss the latest Apple news, security, and privacy stories, and offer practical advice on getting the most out of your Apple devices. Be sure to <a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" rel=\"noopener\"><strong>follow the podcast<\/strong><\/a> to make sure you don\u2019t miss any episodes.<\/p>\n<p>You can also subscribe to our <a href=\"https:\/\/www.intego.com\/mac-security-blog\/mac-security-newsletter\/\"><strong>e-mail newsletter<\/strong><\/a> and keep an eye here on <a href=\"https:\/\/www.intego.com\/mac-security-blog\"><strong>The Mac Security Blog<\/strong><\/a> for the latest Apple security and privacy news. And don&#8217;t forget to follow Intego on your favorite social media channels: <a href=\"https:\/\/x.com\/IntegoSecurity\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-radius: 8px;\" title=\"Follow Intego on \ud835\udd4f\/Twitter\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/X-Twitter-logo-icon-225.gif\" alt=\"Follow Intego on X\/Twitter\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.facebook.com\/Intego\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-radius: 8px;\" title=\"Follow Intego on Facebook\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/Facebook-logo-icon-225.gif\" alt=\"Follow Intego on Facebook\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.youtube.com\/user\/IntegoVideo?sub_confirmation=1\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-radius: 8px;\" title=\"Follow Intego on YouTube\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/YouTube-logo-icon-225.png\" alt=\"Follow Intego on YouTube\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.pinterest.com\/intego\/\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-radius: 8px;\" title=\"Follow Intego on Pinterest\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/Pinterest-logo-icon-225.png\" alt=\"Follow Intego on Pinterest\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.linkedin.com\/company\/intego\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-radius: 8px;\" title=\"Follow Intego on LinkedIn\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/LinkedIn-logo-icon-225.gif\" alt=\"Follow Intego on LinkedIn\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.instagram.com\/intego_security\/\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-radius: 8px;\" title=\"Follow Intego on Instagram\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/Instagram-logo-icon-225.gif\" alt=\"Follow Intego on Instagram\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-radius: 8px;\" title=\"Follow the Intego Mac Podcast on Apple Podcasts\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile.png\" alt=\"Follow the Intego Mac Podcast on Apple Podcasts\" width=\"16\" \/><\/a><\/p>\n<p><span style=\"font-size: x-small;\">Photo credits: <a href=\"https:\/\/www.flickr.com\/photos\/dullhunk\/4575707721\/\">pickpocket by Dunk<\/a> (<a href=\"https:\/\/creativecommons.org\/licenses\/by\/2.0\/\">CC BY 2.0<\/a>); <a href=\"https:\/\/www.flickr.com\/photos\/ari\/4733062911\/\">holding iPhone by Steve Rhodes<\/a> (<a href=\"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/2.0\/\">CC BY-NC-ND 2.0<\/a>); <a href=\"https:\/\/www.flickr.com\/photos\/87128018@N00\/139136870\/\">crying by Anil Kumar<\/a> (<a href=\"https:\/\/creativecommons.org\/licenses\/by-nd\/2.0\/\">CC BY-ND 2.0<\/a>).<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>What should you do if your iPhone gets stolen? And how can you prevent iPhone theft in the first place? We have the answers to help you keep your iPhone and your data safe from would-be thieves.<\/p>\n","protected":false},"author":6,"featured_media":12611,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[10],"tags":[9],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"What should you do if your iPhone gets stolen? And how can you prevent iPhone theft in the first place? We have the answers to help you keep your iPhone and your data safe from would-be thieves.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/what-to-do-if-your-iphone-gets-stolen\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What to do if your iPhone gets stolen\u2014and how to prevent iPhone theft - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"What should you do if your iPhone gets stolen? And how can you prevent iPhone theft in the first place? We have the answers to help you keep your iPhone and your data safe from would-be thieves.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/what-to-do-if-your-iphone-gets-stolen\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2013-03-28T16:06:33+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-08-02T22:57:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/pickpocket-thumb.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lysa Myers\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/what-to-do-if-your-iphone-gets-stolen\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/pickpocket-thumb.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/pickpocket-thumb.jpg\",\"width\":\"400\",\"height\":\"260\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/what-to-do-if-your-iphone-gets-stolen\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/what-to-do-if-your-iphone-gets-stolen\/\",\"name\":\"What to do if your iPhone gets stolen\\u2014and how to prevent iPhone theft - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/what-to-do-if-your-iphone-gets-stolen\/#primaryimage\"},\"datePublished\":\"2013-03-28T16:06:33+00:00\",\"dateModified\":\"2024-08-02T22:57:21+00:00\",\"description\":\"What should you do if your iPhone gets stolen? And how can you prevent iPhone theft in the first place? We have the answers to help you keep your iPhone and your data safe from would-be thieves.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/what-to-do-if-your-iphone-gets-stolen\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/what-to-do-if-your-iphone-gets-stolen\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/what-to-do-if-your-iphone-gets-stolen\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What to do if your iPhone gets stolen\\u2014and how to prevent iPhone theft\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/what-to-do-if-your-iphone-gets-stolen\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/what-to-do-if-your-iphone-gets-stolen\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a\"},\"headline\":\"What to do if your iPhone gets stolen\\u2014and how to prevent iPhone theft\",\"datePublished\":\"2013-03-28T16:06:33+00:00\",\"dateModified\":\"2024-08-02T22:57:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/what-to-do-if-your-iphone-gets-stolen\/#webpage\"},\"wordCount\":1398,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/what-to-do-if-your-iphone-gets-stolen\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/pickpocket-thumb.jpg\",\"keywords\":[\"iPhone\"],\"articleSection\":[\"How To\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/what-to-do-if-your-iphone-gets-stolen\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a\",\"name\":\"Lysa Myers\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g\",\"caption\":\"Lysa Myers\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/lysam\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"What should you do if your iPhone gets stolen? And how can you prevent iPhone theft in the first place? We have the answers to help you keep your iPhone and your data safe from would-be thieves.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/what-to-do-if-your-iphone-gets-stolen\/","og_locale":"en_US","og_type":"article","og_title":"What to do if your iPhone gets stolen\u2014and how to prevent iPhone theft - The Mac Security Blog","og_description":"What should you do if your iPhone gets stolen? And how can you prevent iPhone theft in the first place? We have the answers to help you keep your iPhone and your data safe from would-be thieves.","og_url":"https:\/\/www.intego.com\/mac-security-blog\/what-to-do-if-your-iphone-gets-stolen\/","og_site_name":"The Mac Security Blog","article_published_time":"2013-03-28T16:06:33+00:00","article_modified_time":"2024-08-02T22:57:21+00:00","og_image":[{"width":"400","height":"260","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/pickpocket-thumb.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Lysa Myers","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/what-to-do-if-your-iphone-gets-stolen\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/pickpocket-thumb.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/pickpocket-thumb.jpg","width":"400","height":"260"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/what-to-do-if-your-iphone-gets-stolen\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/what-to-do-if-your-iphone-gets-stolen\/","name":"What to do if your iPhone gets stolen\u2014and how to prevent iPhone theft - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/what-to-do-if-your-iphone-gets-stolen\/#primaryimage"},"datePublished":"2013-03-28T16:06:33+00:00","dateModified":"2024-08-02T22:57:21+00:00","description":"What should you do if your iPhone gets stolen? And how can you prevent iPhone theft in the first place? We have the answers to help you keep your iPhone and your data safe from would-be thieves.","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/what-to-do-if-your-iphone-gets-stolen\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/what-to-do-if-your-iphone-gets-stolen\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/what-to-do-if-your-iphone-gets-stolen\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"What to do if your iPhone gets stolen\u2014and how to prevent iPhone theft"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/what-to-do-if-your-iphone-gets-stolen\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/what-to-do-if-your-iphone-gets-stolen\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a"},"headline":"What to do if your iPhone gets stolen\u2014and how to prevent iPhone theft","datePublished":"2013-03-28T16:06:33+00:00","dateModified":"2024-08-02T22:57:21+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/what-to-do-if-your-iphone-gets-stolen\/#webpage"},"wordCount":1398,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/what-to-do-if-your-iphone-gets-stolen\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/pickpocket-thumb.jpg","keywords":["iPhone"],"articleSection":["How To"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/what-to-do-if-your-iphone-gets-stolen\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a","name":"Lysa Myers","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g","caption":"Lysa Myers"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/lysam\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/pickpocket-thumb.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-3gP","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/12575"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=12575"}],"version-history":[{"count":26,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/12575\/revisions"}],"predecessor-version":[{"id":101307,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/12575\/revisions\/101307"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/12611"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=12575"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=12575"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=12575"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}