094 90 48200     Get SUPPORT

Aniar IT Services Blog

Tip of the Week: Locating a Misplaced Smartphone

Tip of the Week: Locating a Misplaced Smartphone

The great thing about smartphones, in a business sense, is how portable they are - you can literally be productive almost anywhere. Unfortunately, this also means that they can be lost almost anywhere. Luckily, there just so happens to be a feature built into Android that can help you find yours.

The Stakes Are High
A lost smartphone is something that needs to be taken seriously nowadays. Not only is it an expensive device to replace, its contents could be considered priceless. Anything you’ve accessed via that phone (potentially including your finances and social media) is then at risk. If this device was used for business purposes, your data could be at stake if your device was stolen - and, if you used it as a part of a two-factor authentication measure, there goes your access to your network.

Clearly, this wouldn’t be a good thing.

This is precisely why Android includes a feature to help you find a device, should it ever be lost.

On your Android device, you need to work proactively and enable a few settings.

In your Settings, you should be able to find a Find My Device option. Make sure this is turned on. Your Location should be set to High accuracy. Finally, you will want to enable Google to Use Location History. While this will diminish your privacy from the eyes of Google, it will make your phone that much easier to find.

To locate your device, you’ll then need to access the same Google account that is used on the device in question from a web browser. Google is able to give you a general idea of where the device was last located on a map, and even what Wi-Fi networks it is connected to. The Find My Device application can do the same thing if you have access to a second device.

Find My Device also allows you to remotely lock your device and display a message to help anyone who might find it get it back to you. Once you’re in the vicinity of your device, you can also command your device to ring. This command will override the volume settings, increasing the chances of it being heard.

If you truly believe that your device has been stolen, there is also the nuclear option: remotely wiping the device via Find My Device.

Keep in mind, in order for these features to work, you absolutely have to enable them on your phone first. Otherwise, you’ll be out of luck if the device ever goes missing.

Act Fast
It is also important to remember that these features will only work as long as the phone is on. Sure, you could still check for its last known location in Find My Device, but there’s no guarantee that it will still be there.

Finally, if you truly believe that your device was stolen, contact the proper authorities and give them everything you know.

With any luck, you’ll be able to find your lost phone lickety-split. While you’re here, take a look at some of our other blogs, where you can find other handy tricks and useful information, courtesy of Aniar IT Services.

Infected Applications Removed from Google Play Sto...
Your IT Wish List: How to Improve Your Business


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, January 17 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy User Tips Tech Term Google Cloud Business Computing Data Backup Data Recovery Email Microsoft Data Hackers Innovation Hardware Mobile Devices Network Security Malware Cloud Computing Internet VoIP Smartphone Communication Browser Hosted Solutions Workplace Tips Backup Business Android Artificial Intelligence IT Services Windows 10 Managed IT Services Chrome How To Network Router Smartphones IT Support Communications Small Business Internet of Things Applications Efficiency Office 365 Windows Word Saving Money Cybercrime Collaboration Business Management Spam Information BDR Cybersecurity Computer Outsourced IT Business Continuity Software Productivity Computers Gadgets Server Miscellaneous Ransomware Vulnerability Mobile Device Management Money Data Protection Two-factor Authentication Managed Service Holiday Facebook Passwords Mobile Device Settings Connectivity Data Security Redundancy Voice over Internet Protocol Microsoft Office Sports Unsupported Software Access Control Telephone Systems CES Machine Learning Data Storage Social Engineering Fraud Encryption Website Human Resources Software as a Service Avoiding Downtime Infrastructure Phishing Content Management Spam Blocking Keyboard Comparison Upgrade VPN Password Bring Your Own Device Social Media Google Docs Blockchain Operating System IT Management Automation Law Enforcement Virtual Assistant App Telephony BYOD Scam Wi-Fi Managed IT Google Drive Paperless Office Business Intelligence Save Money Update Identity Theft Remote Monitoring Botnet IT Plan Windows 7 OneNote Apps Disaster Recovery Telephone System Managed IT services Virtualization Data Management HVAC Help Desk Travel Remote Work Public Cloud Workers File Sharing Patch Management Printer Tools Work/Life Balance Evernote Cleaning Recycling Devices Mobile Computing Start Menu Data loss Big Data Cryptocurrency Display Frequently Asked Questions Recovery Computer Fan Authentication Training Sync Multi-Factor Security Software Tips WiFi YouTube Cache Mouse Millennials Practices eWaste Smart Office Thought Leadership Cortana Alert Amazon Safe Mode Security Cameras Excel FENG Bandwidth Remote Worker Staff Networking Shortcuts Flash Wireless Internet Microchip Value Workforce Charger Hosted Computing Legal Document Management Camera Specifications Amazon Web Services Accountants Tip of the week Password Manager Nanotechnology Wiring Trending Meetings Enterprise Content Management Mobility Solid State Drive HaaS Downtime HIPAA USB Search Engine Windows 10s Wireless Charging Inventory Criminal Screen Mirroring Windows Server 2008 Business Mangement Smart Tech Firewall Employer-Employee Relationship Augmented Reality Digital Signature Password Management Social HBO Audit Physical Security Root Cause Analysis Electronic Medical Records Servers Wire Bing Telecommuting Private Cloud Google Apps MSP Computer Care Entertainment Addiction Warranty Cast Online Shopping Gmail Unified Threat Management Skype The Internet of Things Credit Cards PDF NIST Vendor Outlook Government Hacker Hard Drives Budget Search Competition Customer Relationship Management Compliance IP Address Users CrashOverride Customer Service Regulation Mobile Office Quick Tips Domains Managed Service Provider Wireless Company Culture Windows 10 Smartwatch Hiring/Firing Public Speaking Presentation Managing Stress Lithium-ion battery Twitter Printers Fun Wireless Technology 5G Tech Support Safety Emergency IBM Productivity Marketing