
Family Protection Newsletter
Stolen Smartphone Disaster!
(A Cautionary Tale)
Once upon a time in the San Fernando Valley, there lived a man named Alex.
Alex was a friendly and cheerful person, but he had one small flaw:
He never worried about the security of his smartphone. He set up his pin code to be 1234 – “I might forget anything else,” he thought.
One sunny afternoon, Alex decided to treat himself to lunch at his favorite restaurant, The Hungry Hippo. He ordered a delicious burger with fries and a milkshake. After enjoying his meal, Alex felt happy and satisfied. He left a generous tip for the waitress and walked out of the restaurant, humming a cheerful tune.
But Alex forgot one crucial thing—his smartphone was still lying on the table.
A stranger named Mark was sitting at the next table.
He noticed the unattended smartphone and glanced around to see if anyone was coming back for it.
When he saw no one, he quickly picked it up and walked out of the restaurant, blending into the crowd.
Mark was not a nice person.
He was always looking for easy ways to make money, and he saw Alex’s smartphone as a golden opportunity. He guessed that Alex was lazy and entered “1234” for a pin code – and, oh yeah, the phone was his (and open).
He found that Alex's phone had all his personal information, including his bank account details, email, and social media accounts.
With a few taps, Mark transferred money from Alex’s bank account to his own (using Venmo, Zelle).
He also used Alex's email to reset passwords and gain access to his other accounts.
Alex didn’t realize his phone was missing until he got home.
Panic set in as he retraced his steps and remembered where he had last seen it.
He rushed back to The Hungry Hippo, but it was too late. The phone was gone, and so was his money.
Feeling defeated, Alex reported the theft to the police and his bank. It took a lot of time and effort to recover his accounts and secure his personal information again. He learned a hard lesson that day – but, he never got his money back.
From then on, Alex always made sure to set up his smartphone with a strong passcode and enabled fingerprint recognition.
He realized that those few seconds of security setup were worth the peace of mind they brought.
Don’t Let What Happened to Alex Happen to YOU! Lock Inactive Devices!
Why Do It:
Smartphones can be lost and stolen and your personal information may be accessed by criminals.
Inactive or stolen, hackers can invade your smart device.
If there is unauthorized access of your personal computer at home or away, the thieves can search your data for personal information.
Five Ways to Keep Your Smartphone More Secure
1. LISTEN to our guidance on creating strong passwords (and sometimes pin numbers) on your personal computer’s and smartphone’s login screens.
2. Most devices offer fingerprint and/or facial recognition features to prevent unauthorized access to your devices, again in Settings. Use it!!!
3. Set your personal computer and smartphone to automatically lock after a short time of inactivity – you will find these options in Settings.
4. Close the lid of your laptop whenever leaving it.
5. You can also create a smartphone lock screen with alternate phone number and email to enable a good Samaritan to return your smartphone, if lost. Simply use a graphic editor on your lock screen photo to add the needed information.
6. If your phone is stolen, do not hesitate. Wipe it immediately.
For an iPhone, go to Settings → [Your username] → Find My and turn on Find My iPhone.
For an Android, open Settings → Security & location and enable Find My Device.
Then go to the company’s website, login, and track or wipe contents.
CyberSAGE says
"If your device goes astray, oh dear,
Lock it up tight, keep it near.
For if it is lost,
Your data’s the cost,
Stay secure, have nothing to fear!"
Ignoring Your Wi-Fi Network and Router Could Be Big Trouble!
It all begins with an idea.
This Month’s Cautionary Tale –
Once upon a time in Hollywood, there lived a happy couple named Mary and Jim. Every month, they paid for their internet service and didn’t think much about it.
Their home Wi-Fi network was set up by the internet company years ago.
One day, Mary turned on her laptop and was shocked to see a scary, grinning face on her screen. Panicked, she ran to the next room where Jim had just turned on his laptop and saw the same creepy image.
Below the face was a frightening message: “Pay me $2000 in bitcoin or I will delete all your family photos!”
Mary and Jim were stunned. They couldn’t believe this was happening to them. They didn’t know what to do. The images of their children and grandchildren would be lost if they didn’t pay.
In desperation, they paid the total of $4,000 in bitcoin to the criminal who had invaded their computers and their home. They even had to take a loan from the bank to cover the cost. It was a day filled with tears and sadness.
But what had gone wrong? How did this happen?
They asked their nerdy friend Charlie, who lived next door, to help them figure it out. After a few minutes, Charlie had the answer.
Their Wi-Fi network was like an open book – ANYONE nearby could easily invade it.
Their Wi-Fi network name was their last name – strike one!
Their Wi-Fi password was 123456 – strike two!
And the router that ran their Wi-Fi network had outdated firmware – strike three! It was wide open for anyone living in or just visiting their neighborhood.
From that day on, Mary and Jim learned the importance of securing their Wi-Fi network to keep their home and their memories safe.
Set up your Wi-Fi network and home router securely!
Why do it:
You don’t want your home network to be unsafe.
What to do:
1. Pick a Good Wi-Fi Name and Password:
Choose a Wi-Fi name (SSID) that doesn’t give away personal information.
Create a strong, memorable password.
Use Strong Encryption:
Choose WPA2 for Wi-Fi security (or WPA3 if available). This helps keep your data safe.
2. Enable the Firewall:
Make sure the router’s firewall is turned on to block unwanted traffic.
3. Turn Off Remote Management:
Disable remote management to prevent hackers from accessing your network.
4. Set Up the Router:
Use a unique, strong ID and password for the router’s admin settings.
Follow the router’s instructions to set up your network.
5. Update Firmware:
Check for updates on the router’s website at least once a year to keep it secure. If you’re not sure how to do this, ask a professional for help.