Locking down your devices

If you suspect someone has access to your devices, act quickly but calmly. Securing your phone, tablet, and computer is the first step to regaining control and staying safe.

ONE

Change Your Passwords Immediately

Your abuser may have access to your accounts. Start by changing the most critical ones:

  • Email (Gmail, Outlook, etc.) – This is often the key to everything else.

  • iCloud / Google Account – Controls backups, Find My iPhone, and stored passwords.

  • Banking and financial accounts – Protects your money and personal info.

  • Social media (Facebook, Instagram, etc.) – Prevents tracking or impersonation.

  • MyGov / Government services – Stops them from accessing sensitive records.

⚠️ Using a password manager is not negotiable. Your safety depends on strong, secure, and unique passwords for every account. Proton Pass is FREE and protected under Swiss privacy laws, it’s one of the best tools available for storing and generating passwords safely.

Set up 2 factor authentication

2FA adds an extra layer of security by requiring a code to log in. Even if they know your password, they won’t be able to access your accounts without this code.

  • Turn on 2FA for email, banking, social media, and cloud storage.

  • Use an authentication app like Google Authenticator instead of SMS (if safe).

  • Check your 2FA backup codes and store them securely in your ProtonPass app.

TWO

THREE

Log out of all devices

Your abuser may be logged in on another device.

  • On your Google, Apple, and social media accounts, go to Settings → Security → Sign Out of All Devices.

  • Change your recovery email and phone number if they had access.

Check for Unauthorised Access

Look for signs that your accounts or devices have been tampered with:

  • Check login history (Google, Facebook, Apple show recent logins).

  • See if recovery info has been changed (email, phone number, backup codes).

  • Check connected devices (remove anything suspicious).

FOUR

FIVE

Secure Your Phone & Computer

If they had physical access to your device, take these steps:

  • Update your phone and apps – Security patches fix vulnerabilities.

  • Factory reset your phone (if necessary) – Only do this if you suspect deep tracking.

  • Check for spyware – Use apps like Certo or Malwarebytes to scan.

  • Turn off Bluetooth & location sharing (temporarily while securing everything).

SIX

Set Up a Safe, Private Email

If your email was compromised, set up a new, secure email (ProtonMail or Tutanota) and use it for critical accounts only (banking, government services, legal contacts).

SEVEN

Back Up Important Data

Before making major changes, back up your data safely:

  • Use a secure cloud service (Google Drive, OneDrive, or Proton Drive).

  • Store files on an encrypted USB or external drive.

Make a Digital Safety Plan

Once your devices are locked down, think about ongoing security:

  • Regularly review your security settings.

  • Use a secondary phone if you think they could track your number.

  • Consider a new device if yours was heavily compromised.

⚠️  If you feel unsafe, reach out for support. You are not alone.