094 90 48200    Get SUPPORT

Aniar IT Services Blog

How to Find Your Lost iPhone or Android Smartphone

How to Find Your Lost iPhone or Android Smartphone

Imagine for a second you are out to a socially distant dinner date with the friends that you barely get to see. You wrap up dinner and say your goodbyes and when you get to your car you realize that you don’t have your phone. COMPLETE PANIC! Your whole life is on your phone. Now imagine that when you went back to the restaurant to get your phone, it wasn't anywhere to be found. We’ll talk you through how to proceed. 

Use Google’s Find My Device App to Find an Android Device

Android users have access to a feature called Google Find My Device, that you should definitely set up if you haven’t already. You first need to install it from the Google Play Store.

Once the app is installed, it will ask you to log into your Google account. You will want to set up a strong and unique password just as you would with any other account. When asked, you will want to Allow Find My Device to access this device’s location. Now you will be able to see where your phone is. 

Using Apple’s Find My iPhone to Locate Your Device

Apple provides a similar service to iPhone users. You will need to enable Find My iPhone. Find My iPhone is a built-in service that comes as a part of iCloud. As expected, it allows users to track the whereabouts of a lost or stolen device. If you suspect that your iPhone has been stolen, you probably shouldn’t try and go to the location it is at, for safety’s sake. 

The Find My iPhone feature also allows users to remotely wipe the device. This feature can help you avoid identity theft, a data breach, or any other unfortunate experience that could happen with someone in possession of your phone. You will need to opt-in to these services, but you will be glad you did if the worst becomes reality. Here’s how:

On your iPhone or iPad:

  • Open Settings.
  • Access iCloud.
  • Locate the Find My iPhone/Find My iPad slider and make sure it is switched On.

If you haven’t already set up an iCloud account, you’ll be taken through the steps by a tutorial. You will want to set up your iCloud account with a unique and strong password. We keep harping on this point, but it is an important one. 

Apple will let you track your device through its iCloud service as long as it is still on or not in airplane mode. 

Most iPhone users already have, but if you haven’t you should set up Touch ID or Face ID on your device. That way, it will be extremely difficult to access the contents of your phone. To do this, access Settings under Touch ID & Passcode.

If you are careful, you will probably never need these features, but if you do have to use them you will be thankful they are there. With the increasing price of new mobile devices (and the importance of the data stored on them) they offer a kind of insurance against loss or theft. 

At Aniar IT Services, we know the importance of technology for businesses and individuals alike and hope that you never have to worry about these features. Contact us today if you have any questions about how to protect your business’ data against theft at 094 90 48200.

What to Do Immediately If You’ve Lost Your Phone
Benefits IaaS Can Bring to a Business


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, February 26 2021

Captcha Image

By accepting you will be accessing a service provided by a third-party external to https://www.aniar.ie/

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Productivity Google Cloud Privacy Email Workplace Tips Efficiency User Tips Network Security Internet Data IT Support Innovation Hosted Solutions Mobile Device Microsoft Software Hardware Communication Hackers Users Business VoIP Collaboration Small Business Data Backup Smartphones Android Data Recovery Managed IT Services Smartphone Phishing IT Services Cybersecurity Computer Cloud Computing Windows 10 Communications Mobile Devices Tech Term Network Backup Malware Managed Service Gadgets Browser Miscellaneous Quick Tips Outsourced IT Business Continuity Windows Artificial Intelligence Upgrade Saving Money Disaster Recovery Internet of Things Passwords Business Management Facebook BDR Information Spam Office 365 Chrome Social Media Server Holiday Save Money Covid-19 Microsoft Office Router Blockchain Automation How To Wi-Fi Paperless Office BYOD Computers Data Security Networking Mobile Office Data Storage Windows 7 Government Patch Management Operating System Apps Applications Word Encryption Cybercrime Display Human Resources Infrastructure Big Data Money Remote Monitoring Staff Bandwidth Settings Managed IT Virtualization Data Protection Mobile Device Management HIPAA Health Two-factor Authentication History Remote Remote Work Vulnerability Telephone System Data Breach Connectivity Vendor Machine Learning Ransomware Cryptocurrency Office Education Managed Services Provider Content Management Google Docs Audit Training Keyboard Software as a Service Private Cloud IT Plan Website VPN Law Enforcement Telephony OneNote Procurement Password Scam Update Unsupported Software Business Intelligence Virtual Assistant Wireless Employee/Employer Relationship Managed Services Business Technology Botnet Spam Blocking Identity Theft Managed IT services Redundancy Voice over Internet Protocol Telephone Systems Bring Your Own Device Net Neutrality Augmented Reality Processor Servers IT Management Printing Social Engineering Sports App Vendor Management Access Control Avoiding Downtime CES WiFi Hard Drive Meetings Help Desk Google Drive Compliance Digital Signage Fraud Comparison Conferencing Cabling Fiber Optics Mobile Computing Saving Time Authentication Screen Mirroring Customer relationships Flash Cache Physical Security Cryptomining Messaging Practices Value Workforce Employer-Employee Relationship Tip of the week Thought Leadership Google Search GDPR Digitize Amazon Specifications Root Cause Analysis YouTube Mouse RMM Bitcoin Regulations eWaste Cast Safe Mode Security Cameras Cables Trend Micro Trending Smart Office Customer Service Policy Supply Chain Management OLED Using Data HaaS Wireless Internet Remote Worker Database SMS Charger Hosted Computing Shortcuts Legal Windows Server 2008 Public Cloud Save Time Remote Computing IT Assessment Amazon Web Services Accountants Microchip Employees Batteries PCI DSS Smartwatch Default App Shopping Document Management Camera Procedure Password Manager HBO Nanotechnology Biometric Security Information Technology USB Computer Fan Wiring Virtual Machine AI Wireless Charging Inventory Telecommuting Data loss Enterprise Content Management Mobility Criminal Twitter Computer Care Software Tips Proactive IT Windows Server 2008 R2 OneDrive Search Engine Sales Virtual Private Network IT Infrastructure Social Network Digital Signature Skype Printers FinTech Business Mangement Outlook Smart Tech Manufacturing Computing Electronic Medical Records Wire FENG Firewall Hypervisor Google Apps Travel Cortana Alert Password Management Social Remote Workers Addiction MSP Copiers Online Shopping Tools Work/Life Balance Bing SharePoint Employee 5G Investment Credit Cards PDF Start Menu Entertainment Warranty Apple Peripheral Gmail Frequently Asked Questions Recovery Virtual Reality Professional Services Data Management Sync Multi-Factor Security Unified Threat Management Going Green Workers NIST Managed IT Service Solid State Drive File Sharing ISP The Internet of Things Development Evernote Cleaning Millennials HVAC Hacker End of Support Windows 10s ROI Personal Downtime Printer Project Management Quick Tip Recycling Excel Devices Competition Fun Customer Relationship Management Personal Information IP Address Regulation Financial Domains Hard Drives Company Culture Search Windows 10 Public Speaking Emergency Managing Stress Presentation CrashOverride Lithium-ion battery Wireless Technology Managed Service Provider Tech Support Safety IBM Productivity Hiring/Firing Marketing Budget