094 90 48200     Get SUPPORT

Aniar IT Services Blog

Tip of the Week: Locating a Misplaced Smartphone

Tip of the Week: Locating a Misplaced Smartphone

The great thing about smartphones, in a business sense, is how portable they are - you can literally be productive almost anywhere. Unfortunately, this also means that they can be lost almost anywhere. Luckily, there just so happens to be a feature built into Android that can help you find yours.

The Stakes Are High
A lost smartphone is something that needs to be taken seriously nowadays. Not only is it an expensive device to replace, its contents could be considered priceless. Anything you’ve accessed via that phone (potentially including your finances and social media) is then at risk. If this device was used for business purposes, your data could be at stake if your device was stolen - and, if you used it as a part of a two-factor authentication measure, there goes your access to your network.

Clearly, this wouldn’t be a good thing.

This is precisely why Android includes a feature to help you find a device, should it ever be lost.

Auto-Location
On your Android device, you need to work proactively and enable a few settings.

In your Settings, you should be able to find a Find My Device option. Make sure this is turned on. Your Location should be set to High accuracy. Finally, you will want to enable Google to Use Location History. While this will diminish your privacy from the eyes of Google, it will make your phone that much easier to find.

To locate your device, you’ll then need to access the same Google account that is used on the device in question from a web browser. Google is able to give you a general idea of where the device was last located on a map, and even what Wi-Fi networks it is connected to. The Find My Device application can do the same thing if you have access to a second device.

Find My Device also allows you to remotely lock your device and display a message to help anyone who might find it get it back to you. Once you’re in the vicinity of your device, you can also command your device to ring. This command will override the volume settings, increasing the chances of it being heard.

If you truly believe that your device has been stolen, there is also the nuclear option: remotely wiping the device via Find My Device.

Keep in mind, in order for these features to work, you absolutely have to enable them on your phone first. Otherwise, you’ll be out of luck if the device ever goes missing.

Act Fast
It is also important to remember that these features will only work as long as the phone is on. Sure, you could still check for its last known location in Find My Device, but there’s no guarantee that it will still be there.

Finally, if you truly believe that your device was stolen, contact the proper authorities and give them everything you know.

With any luck, you’ll be able to find your lost phone lickety-split. While you’re here, take a look at some of our other blogs, where you can find other handy tricks and useful information, courtesy of Aniar IT Services.

Infected Applications Removed from Google Play Sto...
Your IT Wish List: How to Improve Your Business
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, March 18 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy User Tips Google Business Computing Tech Term Cloud Email Data Backup Mobile Devices Microsoft Hosted Solutions Data Data Recovery Productivity Network Security Innovation Hardware VoIP Malware Internet Cloud Computing Hackers Workplace Tips Communications Communication IT Services Smartphone Windows 10 Backup Smartphones Business Efficiency Internet of Things IT Support Android Artificial Intelligence Browser Managed IT Services Chrome How To Windows Network Router Small Business Software Business Management Cybersecurity Business Continuity Saving Money Information Computers Spam Server Word Computer Mobile Device Cybercrime Collaboration Applications Gadgets BDR Outsourced IT Office 365 Facebook Miscellaneous Settings Data Security Mobile Device Management Managed Service Data Protection Paperless Office Holiday Two-factor Authentication Passwords Ransomware Connectivity Vulnerability Money Encryption Botnet VPN Password Private Cloud IT Plan Disaster Recovery Upgrade Remote Monitoring Windows 7 Virtual Assistant Managed IT services Blockchain OneNote Social Media Virtualization Redundancy Voice over Internet Protocol Automation Unsupported Software Telephone Systems Save Money Data Storage Social Engineering Wi-Fi Avoiding Downtime Identity Theft Phishing Telephone System Spam Blocking Comparison Augmented Reality Apps Bring Your Own Device Google Docs Access Control Operating System IT Management Law Enforcement Sports Machine Learning Cryptocurrency Telephony CES Microsoft Office App Scam BYOD Managed IT Fraud Software as a Service Meetings Infrastructure Google Drive Business Intelligence Human Resources Update Content Management Website Keyboard eWaste Thought Leadership Remote Worker Database Audit Physical Security Telecommuting Amazon Networking Shortcuts Employer-Employee Relationship Bandwidth Save Time Staff Microchip Root Cause Analysis Computer Care Smartwatch Cast Skype Wireless Internet Document Management Camera Outlook Government Charger Hosted Computing Mobility Legal Wiring Business Technology Travel Remote Work Amazon Web Services Accountants Enterprise Content Management Password Manager Nanotechnology Proactive IT Public Cloud Tools Work/Life Balance Search Engine Patch Management Health Start Menu HIPAA USB Frequently Asked Questions Recovery Wireless Charging Inventory Password Management Social Data loss Sync Multi-Factor Security Criminal Firewall Computer Fan Business Mangement Smart Tech MSP Net Neutrality Software Tips Millennials Digital Signature Servers Bing WiFi Employee Electronic Medical Records Wire Entertainment Warranty Excel Google Apps NIST Vendor Cortana Alert Addiction Unified Threat Management FENG Online Shopping Gmail File Sharing ISP Value Workforce Credit Cards PDF HVAC Help Desk Flash Workers Hacker Digital Signage Specifications Data Management The Internet of Things Printer Tip of the week Display Trending Mobile Computing Evernote Cleaning Recycling Devices Training Cryptomining Solid State Drive HaaS Authentication Google Search Windows 10s Big Data YouTube Mouse Downtime Windows Server 2008 Safe Mode Security Cameras Screen Mirroring Cache Smart Office Quick Tips HBO Practices Customer Service Mobile Office Emergency Company Culture Domains Wireless Windows 10 Managing Stress Hard Drives Public Speaking Printers Search Twitter Presentation Lithium-ion battery CrashOverride Wireless Technology 5G Tech Support Safety IBM Marketing Compliance Productivity Managed Service Provider Budget Competition Customer Relationship Management Hiring/Firing IP Address Regulation Fun Users