The disclosed computer-implemented method for securing computing devices that are not in users physical possessions may include (i) taking, at a computing device of a user while the user is in physical possession of the computing device, a first measurement of a biological attribute of the users body, (ii) taking, at the computing device, a second measurement of the same biological attribute, (iii) analyzing, at the computing device, the second measurement relative to the first measurement to determine that the user is no longer in physical possession of the computing device, and (iv) performing, at the computing device in response to determining that the user is no longer in physical possession of the computing device, a security action. Various other methods, systems, and computer-readable media are also disclosed.