• HOME
  • WHAT WE DO
    • Flat Rate Managed IT Services and Support
    • Cloud Solutions
    • Technology Consulting
    • Hardware and Software
    • Phone Systems
  • ABOUT
    • Why Singlesource IT?
    • News
    • Technology Partners
  • CONTACT US
  • Search

Mobile Menu

Call us today!

(614) 784-9738

  • Menu
  • Skip to right header navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

Before Header

Call us today:  (614)784-9738

Client Login

Free Risk Report

Protected Documents

Download Your Cyber Security Guide

Singlesource IT

Your Central Ohio IT Provider. Specializing in small and mid-sized business.

  • HOME
  • WHAT WE DO
    • Flat Rate Managed IT Services and Support
    • Cloud Solutions
    • Technology Consulting
    • Hardware and Software
    • Phone Systems
  • ABOUT
    • Why Singlesource IT?
    • News
    • Technology Partners
  • CONTACT US
  • Search

Stolen iPhone? Don’t Get Locked Out Of Your Apple Account!

Thieves are using a built-in setting on every iPhone called the “recovery key” against the owners of stolen iPhones. In theory, the recovery key is there for your protection. It’s a form of two-factor-authentication, known as “2FA” in the industry.

photo credit: The Wall Street Journal

The recovery key is an additional 28-digit code that can be used to access and reset your Apple Account — where all of your contacts, photos, and other personal data is secured. If your phone is lost, stolen, or otherwise compromised, this makes getting everything back much easier.

However, if a thief has your iPhone and passcode, they can enable or reset the recovery key, meaning that they have access to your Apple Account…and you don’t.

As reported in the Wall Street Journal:

“In February, we reported that thieves, often in and around bars at night, watch iPhone owners tap in their passcodes, then steal the targets’ phones. With this short four- or six-digit string, criminals can change the Apple account password and rack up thousands of dollars in charges using Apple Pay and financial apps.

Dozens of victims contacted The Wall Street Journal after the report was published, confirming similar crimes in at least nine U.S. cities, including New York, New Orleans, Chicago and Boston. Those locked out of their Apple accounts by thieves using the recovery key face a bigger challenge: finding a way through Apple’s complex policies and bureaucracy to retrieve their lost photos, contacts, notes, messages and other files.”

Read the full story here.

What can you do?

First of all, be careful when accessing your phone in public.  Make sure no one is looking when taping in your digits. Then put it back in your pocket. Don’t leave it on the table while you’re likely to get distracted.

Second, use a complicated passcode, or better yet, use Face ID while in public. That way no one can look over your shoulder while you’re entering your passcode.

The third option is to use the built-in Parental Controls against yourself. This requires an additional Screen Time passcode, but you can set up your Screen Time session to disallow Account Changes. This way, even if a thief can access your phone, they can’t reset your recovery key to block you out of your Apple Account.

Stay safe out there. If you have security concerns regarding any of your devices, Apple or otherwise, give us a call. Our team is here to help.

We’re here to help!

Get in touch today to find out why Singlesource IT should be your partner in IT.

You May Also Be Interested In:

Windows Releases Major Windows 10 Security Update. Did You Get It?

a close up of a cell phone with an ai button

The AI Policy Playbook: 5 Critical Rules to Govern ChatGPT and Generative AI

Take Action Now: IT Price Adjustments Forecasted for 2026

Free password login sign vector

How to Use a Password Manager and Virtual Cards for Zero-Risk Holiday Shopping

Free A hand using a wireless mouse at a modern desk setup with a computer and keyboard. Stock Photo

Beyond Licensing: How to Stop Wasting Money onYour Microsoft 365 Security and Copilot Add-Ons

Your Guide to Password Management with Keeper Security

Your Business’s Digital Compass: Creating an IT Roadmap for Small Business Growth

Free cloud storage icon vector

Navigating Cloud Compliance: Essential Regulations in the Digital Age

white-laptop-computer-on-white-table

Leveraging Microsoft Forms for Data Collection & Surveys

Previous Post: «World Backup Day March 31st is World Backup Day. Take Action Now!
Next Post: Singlesource IT Is On The Move! Singlesource IT Office»

Primary Sidebar

Need IT?

We’ve partnered with the best. Find out why Singlesource IT should be your one source, one call technology solution.

GET IN TOUCH TODAY.

LATEST NEWS

Windows Releases Major Windows 10 Security Update. Did You Get It?

Microsoft has released the KB5071546 extended security update for Windows 10 to resolve 57 security …

a close up of a cell phone with an ai button

The AI Policy Playbook: 5 Critical Rules to Govern ChatGPT and Generative AI

ChatGPT and other generative AI tools, such as DALL-E, offer significant benefits for businesses. …

Take Action Now: IT Price Adjustments Forecasted for 2026

To our valued clients, As 2025 nears its close, demand across the IT sector remains strong, …

Free password login sign vector

How to Use a Password Manager and Virtual Cards for Zero-Risk Holiday Shopping

Have you ever been concerned about your credit card or personal data getting stolen while shopping …

Free A hand using a wireless mouse at a modern desk setup with a computer and keyboard. Stock Photo

Beyond Licensing: How to Stop Wasting Money onYour Microsoft 365 Security and Copilot Add-Ons

Microsoft 365 is a powerful platform that helps a business in many ways. It boosts collaboration and …

Footer

Contact Us

Singlesource IT
(614) 784-9738

148 N. High St.
Gahanna, OH 43230

Newsletter

Sign up to get free resources, tips, and news from Singlesource IT.

Thanks for signing up!

Copyright © 2025 · Singlesource IT