SlideShare a Scribd company logo
1 of 18
Download to read offline
PHONE THEFT IN AMERICA
By Lookout, Inc.
Read
the
report
CHANCES ARE, YOU OR
SOMEONE YOU KNOW HAS
HAD A SMARTPHONE STOLEN.
Read
the
report
In 2013, 3.1 million American consumers were victims of
smartphone theft, according to Consumer Reports —
that’s nearly double the number reported in 2012.
IT’S A GROWING TREND
Source: Lookout and IDG Research survey of 500 American victims of smartphone theft. March 2014.
Read
the
report
Source: Lookout and IDG Research survey of 500 American victims of smartphone theft. March 2014.
Read
the
report
Source: Lookout and IDG Research survey of 500 American victims of smartphone theft. March 2014.
Read
the
report
REGARDLESS OF WHEN YOUR
PHONE WAS STOLEN, TIME IS OF
THE ESSENCE TO RECOVER IT
Read
the
report
Only 25 percent of phone theft victims noticed their
phone was stolen immediately, and roughly 1 in 2
victims noticed in the first hour.
While 90 percent of phone theft victims take steps to
recover their phone, only 32 percent of all theft victims
are successful in recovering it.
Read
the
report
THE SOONER YOU DISCOVER YOUR
PHONE IS MISSING, THE HIGHER
LIKELIHOOD YOU’LL GET IT BACK
IT’S WHAT INSIDE THAT COUNTS
Read
the
report
Most likely, your attachment isn’t to just the physical phone, but
also to the contacts, photos, videos, apps, and data it stores. And
when that information goes missing, you can experience anything
from personal or confidential company data loss to fraudulent
charges and even identity theft.
Source: Lookout and IDG Research survey of 500 American victims of smartphone theft. March 2014.
Read
the
report
Source: Lookout and IDG Research survey of 500 American victims of smartphone theft. March 2014.
Read
the
report
While there isn’t one single solution that is going to alleviate phone
theft, the problem can be stifled with industry collaboration,
technology, and widespread awareness for how to stay safe.
Read
the
report
THIS IS A COMPLICATED PROBLEM
THAT NEEDS TO BE SOLVED BY
TACKLING IT FROM MULTIPLE ANGLES
TIPS
Read
the
report
So what can you do? Smartphone owners can take a number of
steps to prevent phone theft and keep their personal data safe if
their devices do fall into the wrong hands 
Place a pin or passcode on your device and download a find my
phone app like Lookout, which allows you to remotely locate your
device, lock it down, and wipe it before a criminal can access
sensitive or personal data.
1
Read
the
report
Be alert and be cognizant of the whereabouts of your personal
belongings. A distracted person texting, listening to music, or talking
on their phone is a prime target for thieves. Also, be cautious about
leaving your phone out when you’re in a public place — even if you’re
just running to the cafe counter to grab your coffee!
2
Read
the
report
If your phone is stolen, use an app like Lookout to:
• Find a lost or stolen phone on a map or make it “scream” a loud sound
• Remotely lock and wipe your data (before a thief has a chance to access sensitive info)
• See who has your phone. If someone incorrectly enters your password three times,
Lookout’s Lock Cam feature uses your phone’s front-facing camera to snap a picture of
the culprit and sends that photo and a map of the thieves exact location to your email.
3
Read
the
report
Immediately report the incident to the police and provide them with as
much information as possible. Next, contact your mobile carrier to file a
report or insurance claim. Do not under any circumstances pursue a
phone thief on your own. Vigilantism is never the answer.
4
Read
the
report
For more mobile security tips, follow
  
Lookout

More Related Content

More from Lookout

The New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars
The New Assembly Line: 3 Best Practices for Building (Secure) Connected CarsThe New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars
The New Assembly Line: 3 Best Practices for Building (Secure) Connected CarsLookout
 
5 Ways to Protect your Mobile Security
5 Ways to Protect your Mobile Security5 Ways to Protect your Mobile Security
5 Ways to Protect your Mobile SecurityLookout
 
Feds: You have a BYOD program whether you like it or not
Feds: You have a BYOD program whether you like it or notFeds: You have a BYOD program whether you like it or not
Feds: You have a BYOD program whether you like it or notLookout
 
What Is Spyware?
What Is Spyware?What Is Spyware?
What Is Spyware?Lookout
 
Mobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are AskingMobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are AskingLookout
 
2015 Cybersecurity Predictions
2015 Cybersecurity Predictions2015 Cybersecurity Predictions
2015 Cybersecurity PredictionsLookout
 
The New NotCompatible
The New NotCompatibleThe New NotCompatible
The New NotCompatibleLookout
 
Relentless Mobile Threats to Avoid
Relentless Mobile Threats to AvoidRelentless Mobile Threats to Avoid
Relentless Mobile Threats to AvoidLookout
 
When Android Apps Go Evil
When Android Apps Go EvilWhen Android Apps Go Evil
When Android Apps Go EvilLookout
 
Scaling Mobile Development
Scaling Mobile DevelopmentScaling Mobile Development
Scaling Mobile DevelopmentLookout
 
Visualizing Privacy
Visualizing PrivacyVisualizing Privacy
Visualizing PrivacyLookout
 
Hiring Hackers
Hiring HackersHiring Hackers
Hiring HackersLookout
 
How to (Safely) Cut the Cord With Your Old iPhone
How to (Safely) Cut the Cord With Your Old iPhoneHow to (Safely) Cut the Cord With Your Old iPhone
How to (Safely) Cut the Cord With Your Old iPhoneLookout
 
3 Ways to Protect the Data in Your Google Account
3 Ways to Protect the Data in Your Google Account3 Ways to Protect the Data in Your Google Account
3 Ways to Protect the Data in Your Google AccountLookout
 
3 Ways to Protect the Data in Your Apple Account
3 Ways to Protect the Data in Your Apple Account3 Ways to Protect the Data in Your Apple Account
3 Ways to Protect the Data in Your Apple AccountLookout
 
The Back to School Smartphone Guide
The Back to School Smartphone GuideThe Back to School Smartphone Guide
The Back to School Smartphone GuideLookout
 
Mobile Security at the World Cup
Mobile Security at the World CupMobile Security at the World Cup
Mobile Security at the World CupLookout
 
Mobile Threats, Made to Measure
Mobile Threats, Made to MeasureMobile Threats, Made to Measure
Mobile Threats, Made to MeasureLookout
 
Security & Privacy at the Olympics
Security & Privacy at the OlympicsSecurity & Privacy at the Olympics
Security & Privacy at the OlympicsLookout
 
5 Types of Shady Apps
5 Types of Shady Apps5 Types of Shady Apps
5 Types of Shady AppsLookout
 

More from Lookout (20)

The New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars
The New Assembly Line: 3 Best Practices for Building (Secure) Connected CarsThe New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars
The New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars
 
5 Ways to Protect your Mobile Security
5 Ways to Protect your Mobile Security5 Ways to Protect your Mobile Security
5 Ways to Protect your Mobile Security
 
Feds: You have a BYOD program whether you like it or not
Feds: You have a BYOD program whether you like it or notFeds: You have a BYOD program whether you like it or not
Feds: You have a BYOD program whether you like it or not
 
What Is Spyware?
What Is Spyware?What Is Spyware?
What Is Spyware?
 
Mobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are AskingMobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are Asking
 
2015 Cybersecurity Predictions
2015 Cybersecurity Predictions2015 Cybersecurity Predictions
2015 Cybersecurity Predictions
 
The New NotCompatible
The New NotCompatibleThe New NotCompatible
The New NotCompatible
 
Relentless Mobile Threats to Avoid
Relentless Mobile Threats to AvoidRelentless Mobile Threats to Avoid
Relentless Mobile Threats to Avoid
 
When Android Apps Go Evil
When Android Apps Go EvilWhen Android Apps Go Evil
When Android Apps Go Evil
 
Scaling Mobile Development
Scaling Mobile DevelopmentScaling Mobile Development
Scaling Mobile Development
 
Visualizing Privacy
Visualizing PrivacyVisualizing Privacy
Visualizing Privacy
 
Hiring Hackers
Hiring HackersHiring Hackers
Hiring Hackers
 
How to (Safely) Cut the Cord With Your Old iPhone
How to (Safely) Cut the Cord With Your Old iPhoneHow to (Safely) Cut the Cord With Your Old iPhone
How to (Safely) Cut the Cord With Your Old iPhone
 
3 Ways to Protect the Data in Your Google Account
3 Ways to Protect the Data in Your Google Account3 Ways to Protect the Data in Your Google Account
3 Ways to Protect the Data in Your Google Account
 
3 Ways to Protect the Data in Your Apple Account
3 Ways to Protect the Data in Your Apple Account3 Ways to Protect the Data in Your Apple Account
3 Ways to Protect the Data in Your Apple Account
 
The Back to School Smartphone Guide
The Back to School Smartphone GuideThe Back to School Smartphone Guide
The Back to School Smartphone Guide
 
Mobile Security at the World Cup
Mobile Security at the World CupMobile Security at the World Cup
Mobile Security at the World Cup
 
Mobile Threats, Made to Measure
Mobile Threats, Made to MeasureMobile Threats, Made to Measure
Mobile Threats, Made to Measure
 
Security & Privacy at the Olympics
Security & Privacy at the OlympicsSecurity & Privacy at the Olympics
Security & Privacy at the Olympics
 
5 Types of Shady Apps
5 Types of Shady Apps5 Types of Shady Apps
5 Types of Shady Apps
 

Phone Theft In America

  • 1. PHONE THEFT IN AMERICA By Lookout, Inc.
  • 2. Read the report CHANCES ARE, YOU OR SOMEONE YOU KNOW HAS HAD A SMARTPHONE STOLEN.
  • 3. Read the report In 2013, 3.1 million American consumers were victims of smartphone theft, according to Consumer Reports — that’s nearly double the number reported in 2012. IT’S A GROWING TREND
  • 4. Source: Lookout and IDG Research survey of 500 American victims of smartphone theft. March 2014. Read the report
  • 5. Source: Lookout and IDG Research survey of 500 American victims of smartphone theft. March 2014. Read the report
  • 6. Source: Lookout and IDG Research survey of 500 American victims of smartphone theft. March 2014. Read the report
  • 7. REGARDLESS OF WHEN YOUR PHONE WAS STOLEN, TIME IS OF THE ESSENCE TO RECOVER IT Read the report Only 25 percent of phone theft victims noticed their phone was stolen immediately, and roughly 1 in 2 victims noticed in the first hour.
  • 8. While 90 percent of phone theft victims take steps to recover their phone, only 32 percent of all theft victims are successful in recovering it. Read the report THE SOONER YOU DISCOVER YOUR PHONE IS MISSING, THE HIGHER LIKELIHOOD YOU’LL GET IT BACK
  • 9. IT’S WHAT INSIDE THAT COUNTS Read the report Most likely, your attachment isn’t to just the physical phone, but also to the contacts, photos, videos, apps, and data it stores. And when that information goes missing, you can experience anything from personal or confidential company data loss to fraudulent charges and even identity theft.
  • 10. Source: Lookout and IDG Research survey of 500 American victims of smartphone theft. March 2014. Read the report
  • 11. Source: Lookout and IDG Research survey of 500 American victims of smartphone theft. March 2014. Read the report
  • 12. While there isn’t one single solution that is going to alleviate phone theft, the problem can be stifled with industry collaboration, technology, and widespread awareness for how to stay safe. Read the report THIS IS A COMPLICATED PROBLEM THAT NEEDS TO BE SOLVED BY TACKLING IT FROM MULTIPLE ANGLES
  • 13. TIPS Read the report So what can you do? Smartphone owners can take a number of steps to prevent phone theft and keep their personal data safe if their devices do fall into the wrong hands 
  • 14. Place a pin or passcode on your device and download a find my phone app like Lookout, which allows you to remotely locate your device, lock it down, and wipe it before a criminal can access sensitive or personal data. 1 Read the report
  • 15. Be alert and be cognizant of the whereabouts of your personal belongings. A distracted person texting, listening to music, or talking on their phone is a prime target for thieves. Also, be cautious about leaving your phone out when you’re in a public place — even if you’re just running to the cafe counter to grab your coffee! 2 Read the report
  • 16. If your phone is stolen, use an app like Lookout to: • Find a lost or stolen phone on a map or make it “scream” a loud sound • Remotely lock and wipe your data (before a thief has a chance to access sensitive info) • See who has your phone. If someone incorrectly enters your password three times, Lookout’s Lock Cam feature uses your phone’s front-facing camera to snap a picture of the culprit and sends that photo and a map of the thieves exact location to your email. 3 Read the report
  • 17. Immediately report the incident to the police and provide them with as much information as possible. Next, contact your mobile carrier to file a report or insurance claim. Do not under any circumstances pursue a phone thief on your own. Vigilantism is never the answer. 4 Read the report
  • 18. For more mobile security tips, follow    Lookout