Tuesday, May 24, 2022
CybersecFill
Advertisement
  • Home
  • Events
  • News
  • security tips
  • Article
  • Contact Us
No Result
View All Result
  • Home
  • Events
  • News
  • security tips
  • Article
  • Contact Us
No Result
View All Result
CybersecFill
No Result
View All Result
Home Article

What do You do if Your Phone is Stolen…?

Henrietta Ijenebe by Henrietta Ijenebe
December 21, 2021
in Article, security tips
0
What do You do if Your Phone is Stolen…?

Image Source:https://www.istockphoto.com/

Share on FacebookShare on Twitter

There is no end in sight to cyber-crimes and fraud. Rather, there is usually a day-to-day upgrade in malicious activities of fraudsters and threat actors. I met a young man two days ago in a public cafe, who had a great rapport with the cafe manager. He narrated to the cafe manager how his new phone worth almost two hundred thousand naira had been stolen. What’s more…He said he had four hundred and twenty thousand naira in his account and the thief transferred every penny from his account to another account. I asked him why he did not block his account immediately he realized and he said he was really confused and disorganized when it happened… I could just imagine in his shoes.

So what do you do when your phone or SIM card is stolen, especially when you have your bank account linked to your phone number? The pre-first step that sets in naturally is confusion. Once you jolt back to reality, the first step is to block your bank account to prevent unauthorized persons from withdrawing your money or having further access to your bank account and your private data. You must know how to block your bank account instantly if your ATM card or phone is stolen, or fraudsters tampered with your bank account.

HOW TO BLOCK YOUR BANK ACCOUNT

  1. If the bank is not available at the time, call your bank customer care line and give your bank account details.
  2. Log into your online banking and block your ATM.
  3. If the banks are in operation, visit your nearest bank branch and report to block your ATM card.
  4. Dial the bank code with any available phone. Instantly, you will be required to type in your account number and name. Your account will be automatically blocked from any debit transaction.

Some banks will require you to call customer care to block the account while others may require you to use a USSD code. Every bank has a unique USSD code or phone number different from others. Below are some bank codes or USSD codes to use to block your bank account.

First Bank: Dial *894*911#

Zenith Bank: Dial *966*911#

Guarantee Trust Bank: Dial *737*51*74#

UBA: Dial *919*10#

Fidelity Bank: Dial *770*911#

Ecobank: Dial *326*911#

FCMB: Dial *329#

Access Bank: Dial *901*911#

Wema Bank: Dial *945*911#

Polaris Bank: Dial *833*4#

IBTC: Dial *909#

Sterling Bank: Dial *822*911#

How to Block Your SIM Card

Image Source:https://mysupport.razer.com/app/answers
  1. Go to the nearest police station, with your phone IMEI so it would be officially documented as a stolen phone. IMEI stands for International Mobile Equipment Identity. As the name suggests, an IMEI is a 15 digit number unique to each device. Service providers and phone manufacturers can use IMEI to track the particular device if the said device is lost or stolen. Every phone in the world has a unique IMEI number that can be used to identify or locate the device in case it gets lost or stolen. If you do not have your phone IMEI anymore, still go ahead and get a police report for security reasons.
  2.     Head to your service provider with your SIM pack, if it is still available.
  3.    You would be asked to provide an identity card and your national identification number(NIN) to proceed. 
  4.   You would be required to answer some questions to confirm whether you are the true owner of the phone. Your service provider would go ahead to block your SIM card afterward.

Conclusion

It is that time of the year again when fraudsters and threat actors become very desperate. Endeavor to do your best to stay safe online and offline. Be cautious as well of who has access to your mobile device, to avoid sensitive data loss.

Tags: DebitIMEITransactionUnauthorized
Henrietta Ijenebe

Henrietta Ijenebe

Another Breed striving to make our cyber.space a better state of existence. CyberContent Writer at Cybersecfill. Cybersecurity Threat Intelligence Analysis... Penetration Testing... I code in Javascript...Python...PHP I convey with HTML I beautify with CSS

Next Post
10 Bad Cybersecurity Habits to Break in 2022…

10 Bad Cybersecurity Habits to Break in 2022...

0 0 votes
Article Rating
Login
guest
guest
0 Comments
Inline Feedbacks
View all comments
  • Trending
  • Comments
  • Latest
CEH_PRACTICAL

CEH PRACTICAL EXAM – TICKET TO CEH MASTER

February 6, 2021
Wireless Access Point

How To Secure Your Wireless Access Point (WAP)

August 3, 2019
Wifi 6 Security

Did Wi-Fi 6 come with an Improvement In Security?

May 13, 2019
credit card cloning

How Credit/Debit Cards are Cloned / Preventing Card Cloning

December 26, 2019
Facebook

Facebook’s New Settings Allows Hackers To Easily Pentest Facebook,Instagram Mobile Applications

8
Nationa Cybersecurity Strategy

A Review of the Nigeria National Cybersecurity Strategy

7
Cybersecurity Jobs

Cybersecurity Jobs – You can create your own Cybersecurity Role

4
open Source intelligence tools

Open Source Intelligence tools – OSINT

4
Sports Betting…Increase in Cybersecurity and Data Privacy Risks for Companies and Consumers.

Sports Betting…Increase in Cybersecurity and Data Privacy Risks for Companies and Consumers.

May 19, 2022
Can IT Security Solutions Protect Private Cell Networks?

Can IT Security Solutions Protect Private Cell Networks?

May 13, 2022
Behind That Crypto Wallet…Is a Tenacious Hacker!!!

Behind That Crypto Wallet…Is a Tenacious Hacker!!!

April 28, 2022
Evolution of The Digital Generation…

Evolution of The Digital Generation…

April 22, 2022

Recommended

Sports Betting…Increase in Cybersecurity and Data Privacy Risks for Companies and Consumers.

Sports Betting…Increase in Cybersecurity and Data Privacy Risks for Companies and Consumers.

May 19, 2022
Can IT Security Solutions Protect Private Cell Networks?

Can IT Security Solutions Protect Private Cell Networks?

May 13, 2022
Behind That Crypto Wallet…Is a Tenacious Hacker!!!

Behind That Crypto Wallet…Is a Tenacious Hacker!!!

April 28, 2022
Evolution of The Digital Generation…

Evolution of The Digital Generation…

April 22, 2022

© 2020 CybersecFill. All Rights Reserved.

No Result
View All Result
  • Home
  • Events
  • News
  • security tips
  • Article
  • Contact Us

© 2020 CybersecFill. All Rights Reserved.

wpDiscuz
0
0
Would love your thoughts, please comment.x
()
x
| Reply

Privacy Policy - Terms and Conditions