Smartphones currently hold a lot of important personal information. With it, we can access e-mail, social networks, bank accounts and even identification documents, without sufficient protection for this data. This makes the device increasingly targeted by gangs specializing in virtual scams.
To avoid being a victim of scams in case of theft or theft of your cell phone, it is important to protect your device. The first step is to lock your cell phone screen with a password. Avoid using obvious numbers, such as a family member’s year of birth or birthdays, as these are easier numbers to guess. The most secure passwords combine letters, numbers and symbols, but security must be balanced with practicality. A very long password can do more harm than good.
The lock screen password is important but not enough. This is because it is possible to lose possession of the cell phone with the screen unlocked, a common situation in street robberies. In addition, there are security holes in operating systems and applications that allow others to access your device. According to the Brazilian Institute for Consumer Protection (Idec), this flaw opens “security gaps that allow scams and fraud”.
For those who have an Android operating system, a form of protection is the creation of multiple profiles. This enhances security as information from one profile cannot be accessed by another. In this way, it is possible to have a profile with sensitive data and a simpler one, to use outside the home. To do this, you must access the “Users and Accounts” option in your device’s settings. There you can add users and manage these profiles.
Another preventive action is to put a limit on your transactions per PIX. This is possible in internet banking applications. Some banks allow transactions without a password. If the use of a password is not standard in your bank’s application, contact the institution to see if it is possible to activate this option.
They took my cell phone, what should I do?
If you are a victim of theft or robbery, there are several steps you need to take to try to contain the damage. It is essential to register an Occurrence Bulletin to support your contact with financial institutions.
The Android and iOS systems allow the user to lock the device remotely, as long as it is done by a device that has already been used before. So, log in with the same account as your device on another cell phone (from a trusted person, for example) or computer. In this way, you can quickly prevent access to applications.
For Android devices, do this via Find My Device from Google, and on iOS devices, this can be done by iCloud. Activate your device’s location search in advance to remotely activate the cell phone lock.
It is important to contact your banking institutions and card operators to block financial transactions, especially online purchases, which can be made without a password. Also disable the mobile contactless payment function.
If purchases still occur on your behalf, contact the institutions directly and you can recover the amounts spent. Always keep the protocols of the calls.
It is the responsibility of financial institutions to ensure quality customer service. If the demand is not met, it is possible to file a complaint with the bank’s ombudsman or even call the Procon of your region so that this body mediates the recovery of lost values. There is also the option to complain in the Banco Central or on the website Consumidor.gov.br.
Another way to block it is by contacting your operator and informing the device identification number, known as IMEI. To know your cell phone’s IMEI, dial *#06# and the number will appear on your cell phone screen. This number can also be found on the box of the device. Store this information securely, yet easily accessible.
Blocking the device can also be done by filing a complaint and requesting it at a Civil Police station. All Brazilian states, with the exception of Amapá and Acre, have this blocking system.
It is also recommended to change passwords for emails, social networks and other accounts you have on the device. In addition, Idec recommends not keeping your passwords in a virtual notebook, especially if this platform does not have a password. Two-step verification on all apps should also be done whenever possible.
Editing: Thalita Pires