
Locking down your devices
If you suspect someone has access to your devices, act quickly but calmly. Securing your phone, tablet, and computer is the first step to regaining control and staying safe.
ONE
Change Your Passwords Immediately
Your abuser may have access to your accounts. Start by changing the most critical ones:
Email (Gmail, Outlook, etc.) – This is often the key to everything else.
iCloud / Google Account – Controls backups, Find My iPhone, and stored passwords.
Banking and financial accounts – Protects your money and personal info.
Social media (Facebook, Instagram, etc.) – Prevents tracking or impersonation.
MyGov / Government services – Stops them from accessing sensitive records.
⚠️ Using a password manager is not negotiable. Your safety depends on strong, secure, and unique passwords for every account. Proton Pass is FREE and protected under Swiss privacy laws, it’s one of the best tools available for storing and generating passwords safely.
Set up 2 factor authentication
2FA adds an extra layer of security by requiring a code to log in. Even if they know your password, they won’t be able to access your accounts without this code.
Turn on 2FA for email, banking, social media, and cloud storage.
Use an authentication app like Google Authenticator instead of SMS (if safe).
Check your 2FA backup codes and store them securely in your ProtonPass app.
TWO
THREE
Log out of all devices
Your abuser may be logged in on another device.
On your Google, Apple, and social media accounts, go to Settings → Security → Sign Out of All Devices.
Change your recovery email and phone number if they had access.
Check for Unauthorised Access
Look for signs that your accounts or devices have been tampered with:
Check login history (Google, Facebook, Apple show recent logins).
See if recovery info has been changed (email, phone number, backup codes).
Check connected devices (remove anything suspicious).
FOUR
FIVE
Secure Your Phone & Computer
If they had physical access to your device, take these steps:
Update your phone and apps – Security patches fix vulnerabilities.
Factory reset your phone (if necessary) – Only do this if you suspect deep tracking.
Check for spyware – Use apps like Certo or Malwarebytes to scan.
Turn off Bluetooth & location sharing (temporarily while securing everything).
SIX
Set Up a Safe, Private Email
If your email was compromised, set up a new, secure email (ProtonMail or Tutanota) and use it for critical accounts only (banking, government services, legal contacts).
SEVEN
Back Up Important Data
Before making major changes, back up your data safely:
Use a secure cloud service (Google Drive, OneDrive, or Proton Drive).
Store files on an encrypted USB or external drive.
Make a Digital Safety Plan
Once your devices are locked down, think about ongoing security:
Regularly review your security settings.
Use a secondary phone if you think they could track your number.
Consider a new device if yours was heavily compromised.
⚠️ If you feel unsafe, reach out for support. You are not alone.