094 90 48200     Get SUPPORT

Aniar IT Services Blog

Tip of the Week: Locating a Misplaced Smartphone

Tip of the Week: Locating a Misplaced Smartphone

The great thing about smartphones, in a business sense, is how portable they are - you can literally be productive almost anywhere. Unfortunately, this also means that they can be lost almost anywhere. Luckily, there just so happens to be a feature built into Android that can help you find yours.

The Stakes Are High
A lost smartphone is something that needs to be taken seriously nowadays. Not only is it an expensive device to replace, its contents could be considered priceless. Anything you’ve accessed via that phone (potentially including your finances and social media) is then at risk. If this device was used for business purposes, your data could be at stake if your device was stolen - and, if you used it as a part of a two-factor authentication measure, there goes your access to your network.

Clearly, this wouldn’t be a good thing.

This is precisely why Android includes a feature to help you find a device, should it ever be lost.

On your Android device, you need to work proactively and enable a few settings.

In your Settings, you should be able to find a Find My Device option. Make sure this is turned on. Your Location should be set to High accuracy. Finally, you will want to enable Google to Use Location History. While this will diminish your privacy from the eyes of Google, it will make your phone that much easier to find.

To locate your device, you’ll then need to access the same Google account that is used on the device in question from a web browser. Google is able to give you a general idea of where the device was last located on a map, and even what Wi-Fi networks it is connected to. The Find My Device application can do the same thing if you have access to a second device.

Find My Device also allows you to remotely lock your device and display a message to help anyone who might find it get it back to you. Once you’re in the vicinity of your device, you can also command your device to ring. This command will override the volume settings, increasing the chances of it being heard.

If you truly believe that your device has been stolen, there is also the nuclear option: remotely wiping the device via Find My Device.

Keep in mind, in order for these features to work, you absolutely have to enable them on your phone first. Otherwise, you’ll be out of luck if the device ever goes missing.

Act Fast
It is also important to remember that these features will only work as long as the phone is on. Sure, you could still check for its last known location in Find My Device, but there’s no guarantee that it will still be there.

Finally, if you truly believe that your device was stolen, contact the proper authorities and give them everything you know.

With any luck, you’ll be able to find your lost phone lickety-split. While you’re here, take a look at some of our other blogs, where you can find other handy tricks and useful information, courtesy of Aniar IT Services.

Infected Applications Removed from Google Play Sto...
Your IT Wish List: How to Improve Your Business


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, June 16 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing User Tips Privacy Email Productivity Google Cloud Internet Tech Term Microsoft Data Hosted Solutions Network Security Innovation Data Backup Hackers Hardware Mobile Devices Data Recovery Cloud Computing Efficiency Workplace Tips VoIP Communication Malware Smartphone Communications Android IT Support Business Windows 10 Small Business Network IT Services Smartphones Managed IT Services Software Artificial Intelligence Gadgets Browser Mobile Device Internet of Things Business Management Backup Information Chrome Router How To Server Windows Cybersecurity Collaboration Spam Word Phishing Computers Cybercrime Computer BDR Outsourced IT Users Business Continuity Office 365 Miscellaneous Saving Money Applications Remote Monitoring Settings Two-factor Authentication Data Security Ransomware Staff Passwords Managed Service Money Data Protection Paperless Office Holiday Vulnerability Operating System Connectivity BYOD Social Media Encryption Mobile Device Management Facebook Keyboard Private Cloud IT Plan Avoiding Downtime Content Management OneNote Wi-Fi VPN Password Virtualization Comparison Education Unsupported Software Virtual Assistant Blockchain Augmented Reality Data Storage Automation Google Docs Apps Law Enforcement Save Money Telephony Spam Blocking Managed IT Scam Microsoft Office Business Intelligence Update Identity Theft Bring Your Own Device Telephone System IT Management Botnet Website Disaster Recovery App Windows 7 Access Control Government Sports Meetings Machine Learning Upgrade Managed IT services Google Drive Cryptocurrency Display CES Redundancy Voice over Internet Protocol Software as a Service Training Telephone Systems Fraud Infrastructure Human Resources Social Engineering Practices Safe Mode Security Cameras Cache Root Cause Analysis Smart Office Quick Tips Sync Multi-Factor Security Cast Networking Shortcuts Millennials eWaste Thought Leadership Remote Worker Database WiFi Amazon Cabling Bandwidth Excel Save Time Microchip Charger Hosted Computing Public Cloud Smartwatch Wireless Internet Document Management Camera Enterprise Content Management Mobility Value Workforce Legal Wiring Flash Business Technology 5G Amazon Web Services Accountants Specifications Cables Password Manager Nanotechnology Computer Fan Tip of the week Proactive IT Data loss Search Engine OLED Wireless Charging Inventory Software Tips Health Hacker HIPAA USB The Internet of Things Trending Password Management Social Criminal Firewall HaaS Bing Default App Business Mangement Smart Tech FENG MSP Windows Server 2008 Net Neutrality Digital Signature Cortana Alert Servers Biometric Security Google Apps HBO Employee Electronic Medical Records Wire Entertainment Warranty Big Data NIST Vendor Telecommuting Addiction Unified Threat Management Online Shopping HVAC Help Desk IT Infrastructure Gmail File Sharing ISP Computer Care Credit Cards PDF Manufacturing Workers Solid State Drive Outlook Digital Signage Data Management Printer Skype Cleaning Windows 10s Travel Remote Work Downtime Mobile Computing Evernote Screen Mirroring Tools Work/Life Balance Recycling Devices Patch Management Cryptomining Wireless Virtual Reality Authentication Audit Physical Security Frequently Asked Questions Google Search Recovery Employer-Employee Relationship YouTube Mouse Start Menu Public Speaking ROI Presentation Lithium-ion battery Company Culture Hard Drives Tech Support Search Wireless Technology IBM Safety Managing Stress Marketing Printers Productivity Budget Twitter CrashOverride Customer Relationship Management Competition IP Address Managed Service Provider Emergency Customer Service Compliance Mobile Office Hiring/Firing Domains Investment Fun Regulation Windows 10