Your Work Phone Just Went Missing. Here Is What to Do in the Next 30 Minutes.
It is 9:15am and you cannot find your work phone. You have checked your desk, your bag, the car. Nothing. The last place you remember having it was at a client meeting yesterday afternoon. That creeping feeling is not just about the cost of the device - it is about everything on it.
A missing work phone or laptop is a data problem, not just a hardware problem. Your device likely has persistent logins to email, cloud storage, client files, and practice management software. If someone picks it up and your screen is not locked, they can access your systems within minutes. Even a locked device is not fully safe if it has not been set up with remote management. For businesses handling sensitive client information - medical records, legal files, financial data - a stolen device can trigger obligations under the NZ Privacy Act 2020, including notifying the Privacy Commissioner if there is a real risk of harm to the people whose information was on the device.
The good news is that what you do in the first 30 minutes matters enormously. A device that has been properly set up for remote management can be locked or wiped before anyone gets into it. Remote lock puts a hard barrier up immediately. If the device is confirmed stolen or lost for good, a remote wipe clears everything on it - so even if someone bypasses the lock eventually, there is nothing left to find. These features only work if they have been enabled in advance, which is one of the most important things a managed IT support arrangement should have already handled for every device in your business.
The other immediate step is revoking access. On another device, log into your Microsoft 365 account or whatever platforms were active on the missing phone, find the list of connected devices, and sign out the missing one. Do the same for any cloud storage like OneDrive or SharePoint. This cuts the device off from your business systems even if someone has the phone in their hands. If you use work email on a personal phone, your IT support provider can revoke that access remotely through your device management platform without waiting for you to do it manually. It is also worth knowing that the consequences of a lost device can stretch well beyond the day it goes missing, particularly if client data was accessible.
None of this should be something you are figuring out in a panic on the day. The right setup means your IT support provider can act the moment you call them - locking, revoking, and wiping on your behalf while you focus on retracing your steps. Every device used for work should have remote lock and wipe enabled, be enrolled in a device management system, and require a PIN or biometric to unlock. If you are not sure whether yours do, that is worth finding out before something goes missing — and a readiness check across your systems is a good place to start.
ITstuffed works with professional services businesses across Canterbury to make sure devices are properly protected before something goes wrong. If you want to know where your business stands, book a free 15-minute IT Fit Check and we can take a look.