With so much data stored on your phone, it is almost a doorway to your entire life. You could call it your digital life (also known as a digital twin); whatever you call it, those passwords, accounts, photos, emails, messages, and more reveal much about you.

The following steps will help you take control of your phone and protect your digital life.

Stop Thieves Taking Your Phone

Visibility is an invitation to steal. The way to tackle this is to keep your phone hidden whenever possible. Use an inside pocket, zipped external pocket, or hide it in a bag, preferably one that is securely attached to you.

Unless you’re a character in a Hollywood action movie, it is unlikely that any thief will want to make too much effort to steal your phone.

You may be wondering: “how will I use my phone if it is out of sight?” Well, there are two things to consider here.

  1. If your phone is unseen, you will be more aware of your surroundings. As well as being an advantage against potential thieves, this is also healthier than staring at your phone.
  2. For calls, you can rely on earbuds. While a sign that you have a phone, earbuds can be easily covered up with long hair, a hairband, or a hat.

The most recent earbuds feature useful controls and even voice commands, making it easy to interact with your phone. It is particularly useful for enjoying music and podcasts.

Of course, “talking to yourself” is another sign of having a phone, so avoid lengthy calls while wearing earbuds.

Avoid a Smash and Grab Phone Theft From Your Car

Just as you shouldn’t wave your phone around in public, so you shouldn’t leave it on view in your car.

The same goes for other tech devices, like laptops, tablets, and earbuds.

Keeping your phone hidden can deter potential thieves; if there is nothing to see, there’s nothing to steal.

Store your phone out of sight, using the glove compartment or any storage between the driver and passenger seats. If the rear seats have footlockers, employ these to store your device.

Man breaking into car

Failing these options, look for a suitable spot under your seat where your phone can be placed. Just remember to pick it up before you start driving!

What if there is more tech in the car than storage? For example, you might be driving your family around. Everyone on board has a phone or tablet, which it might be preferable to leave behind rather than lug around.

Cars have limited storage, but you still have options.

To start off with, there is the trunk. In many cases, this is ideal for storing equipment. Using a secure, locked box for tech is a good idea.

Most vehicles don’t have blacked out windows, which makes it easy for any passing pilferer to peek inside. If stashing tech gear out of sight isn’t possible, consider curtains for the car’s rear windows instead. These often double as sunshades in bright weather.

Protect Your Smartphone From Unauthorized Access

These anti-theft precautions can only work so far, and won’t deter a determined thief. Consequently, you need to ensure that further steps are taken to block unauthorized access and protect your data.

Encrypt Your Phone

iPhones and Android (including Samsung) phones let you enable full disk encryption. This will prevent anyone without your password or PIN from accessing the data. Even if the phone is connected to a computer over USB, the data cannot be read without the decryption key—your password.

The more complicated your PIN, the tougher it will be to guess. Also, avoid gesture unlock patterns, as the grease from your fingers can be seen, and the pattern guessed.

If you forget the password or PIN, you will also be unable to access any encrypted data.

Activate Secure Biometric Authentication

Thumbprint, facial recognition, and iris-scanning technology can help ensure that the only person unlocking your phone is you.

When used in conjunction with full disk encryption (passwords and encryption are not the same thing), this is a powerful defense against smartphone theft.

Install App-Locking Tools

If unauthorized access is achieved, certain apps will provide access quicker than others. Social networks, email, and cloud drives can surrender secrets very quickly, as you’re already signed in to them via your device.

An app-locking tool (such as Applock Pro or App Locker - Lock App) can set a secure, individual passwords on specific apps. While this might mean it takes longer to access them, it is more secure in the long-run.

Use Anti-Theft Software

Anti-theft apps can sound an alarm if certain actions are attempted. These include things like taking the phone off charge, swapping the SIM card, or even moving the device.

Of course, there is the option to disarm the alarm. You may alternatively choose to send the alert silently to inform one or several contacts that your phone is no longer in your possession.

Remotely Wipe Your Stolen Phone

What should you do if your phone is stolen?

Remote security tools can be used for both anti-theft purposes (as above) and to wipe a stolen phone.

Find My Phone for iPhone and Find My Device on Android are good for this, as are third party mobile security apps like Cerberus and Prey. They can also photograph the thief with the phone’s camera.

Access is given via a web app, enabling you to sound alerts, view the location of the missing device, and ultimately—if it seems there is no way back for your phone—remotely wipe all data from it.

Secure Your Phone, Defend Against Identity Theft

By now it should be completely clear: protecting your phone is a key step in the fight against identity theft. With so much of your personal information carried around in your pocket, it makes sense to understand the risks and take precautions to secure your phone.

The basic rule is to keep your phone out of sight. Making a habit of keeping it hidden, employing secure authentication and full disk encryption, while installing anti-theft tools, will prevent your data from falling into the wrong hands.

Following these steps will ensure your phone never leaves your sight, remains completely secure from unauthorized access, and doesn't leak your personal data to identity thieves.