XFER Blog

XFER has been serving Michigan since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Locating a Misplaced Smartphone

Tip of the Week: Locating a Misplaced Smartphone

The great thing about smartphones, in a business sense, is how portable they are - you can literally be productive almost anywhere. Unfortunately, this also means that they can be lost almost anywhere. Luckily, there just so happens to be a feature built into Android that can help you find yours.

The Stakes Are High
A lost smartphone is something that needs to be taken seriously nowadays. Not only is it an expensive device to replace, its contents could be considered priceless. Anything you’ve accessed via that phone (potentially including your finances and social media) is then at risk. If this device was used for business purposes, your data could be at stake if your device was stolen - and, if you used it as a part of a two-factor authentication measure, there goes your access to your network.

Clearly, this wouldn’t be a good thing.

This is precisely why Android includes a feature to help you find a device, should it ever be lost.

Auto-Location
On your Android device, you need to work proactively and enable a few settings.

In your Settings, you should be able to find a Find My Device option. Make sure this is turned on. Your Location should be set to High accuracy. Finally, you will want to enable Google to Use Location History. While this will diminish your privacy from the eyes of Google, it will make your phone that much easier to find.

To locate your device, you’ll then need to access the same Google account that is used on the device in question from a web browser. Google is able to give you a general idea of where the device was last located on a map, and even what Wi-Fi networks it is connected to. The Find My Device application can do the same thing if you have access to a second device.

Find My Device also allows you to remotely lock your device and display a message to help anyone who might find it get it back to you. Once you’re in the vicinity of your device, you can also command your device to ring. This command will override the volume settings, increasing the chances of it being heard.

If you truly believe that your device has been stolen, there is also the nuclear option: remotely wiping the device via Find My Device.

Keep in mind, in order for these features to work, you absolutely have to enable them on your phone first. Otherwise, you’ll be out of luck if the device ever goes missing.

Act Fast
It is also important to remember that these features will only work as long as the phone is on. Sure, you could still check for its last known location in Find My Device, but there’s no guarantee that it will still be there.

Finally, if you truly believe that your device was stolen, contact the proper authorities and give them everything you know.

With any luck, you’ll be able to find your lost phone lickety-split. While you’re here, take a look at some of our other blogs, where you can find other handy tricks and useful information, courtesy of XFER.

Protecting Your Business by Understanding IoT Secu...
The Good, Bad, and Ugly of the Internet
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, March 20 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Technology Tip of the Week Privacy Microsoft Internet Cloud Best Practices Saving Money Backup Workplace Tips Software Business Computing Hosted Solutions Managed Service Provider Data Hackers Small Business Google Mobile Devices Hardware VoIP Productivity Mobile Office Malware Email Gadgets Network Security Quick Tips Efficiency Business Management Network Innovation IT Support IT Services Business Social Media Server Business Continuity Smartphones Miscellaneous Upgrade Windows Communications Virtualization User Tips Communication Disaster Recovery Data Backup Computer Managed IT Services Microsoft Office Smartphone Users Data Recovery Passwords Browser Mobile Device Management Internet of Things Android Holiday Marketing Save Money WiFi Vendor Management Ransomware Tech Term Outsourced IT Alert Productivity Artificial Intelligence BDR Mobile Computing Cybercrime Cloud Computing Windows 10 Remote Monitoring Chrome Router Operating System Avoiding Downtime Remote Computing Bring Your Own Device Computers Apple BYOD Cybersecurity Automation Information Technology VPN Firewall IT Solutions The Internet of Things Current Events Health Managed IT Services Collaboration History Telephone Systems Best Practice Going Green Spam Big Data Facebook Windows 10 Trending Phone System Application Wireless Technology IT Consultant Hacking Social Engineering Proactive IT Employer-Employee Relationship Printer Mobility Budget IT Support Lithium-ion Battery Bandwidth Mobile Device Money Excel App Encryption Office Two-factor Authentication Phishing iPhone Training Business Managament Mouse Recovery Fax Server Content Filtering Maintenance Windows 8 Private Cloud Networking How To Unified Threat Management Office 365 Applications Business Intelligence Settings Information Humor Analytics Outlook Customer Relationship Management Google Drive Tutorials Hard Drives File Sharing Data Protection Virus Blockchain Managed IT Word Sports Save Time Value Data Security Website Apps Redundancy Law Enforcement Gmail PowerPoint Access Control Antivirus User Error Machine Learning Augmented Reality Retail Human Resources Downtime Analysis Software as a Service Memory Inbound Marketing Managed Service Network Congestion Hacker Social Paperless Office Business Technology Conferencing Vulnerability Connectivity Administration Wi-Fi Search Tablet Identity Theft Twitter Office Tips Digital Payment Meetings Tech Support Document Management Social Networking Voice over Internet Protocol Computer Repair Data Management Streaming Media Risk Management Scam Compliance Flexibility IT Management Servers Entertainment Saving Time Administrator IT Plan Wireless Physical Security Intranet Environment Cleaning Password Running Cable Computer Accessories Wearable Technology Manufacturing Public Cloud Content Management SaaS Net Neutrality Biometrics IT service Unsupported Software Infrastructure Data storage Display Best Available OneNote Update Webinar Bluetooth Virtual Private Network People Data Storage eWaste Internet Exlporer Touchscreen Comparison Keyboard Telephony PDF Help Desk Samsung Google Docs Safety Virtual Assistant Work/Life Balance Data Breach USB Windows 7 HaaS End of Support Robot Government Online Currency Botnet YouTube Recycling Workers Point of Sale Healthcare Video Surveillance Education Telephone System Statistics Credit Cards DDoS Data loss Solid State Drive Piracy Black Market Programming Smart Tech IBM Skype Cryptocurrency Leadership Fraud Spam Blocking Instant Messaging CES Vendor Screen Mirroring Digital Signage PC Care Workforce Authentication MSP 360 Emails Professional Services Google Apps Cameras 3D Lifestyle Insurance Scheduling Flash Fiber-Optic Notifications LinkedIn Smart Office Electronic Medical Records Laptop Safe Mode Business Owner Licensing Backup and Disaster Recovery Tip of the week Amazon Colocation Storage Windows 10s eBay HVAC Security Cameras Charger Cast WIndows 7 Google Search Alerts Telecommuting SharePoint Windows 8.1 Update Nanotechnology Remote Worker Virtual Reality Tools Shadow IT Printer Server Shortcut Practices HIPAA Sync Cables Hybrid Cloud Search Engine Hiring/Firing Touchpad Debate Accountants User Cryptomining Windows Server 2008 Amazon Web Services IaaS Computing Infrastructure Addiction Worker Commute Text Messaging Enterprise Content Management Employee/Employer Relationship Computer Care Managing Stress Domains ISP Work Station Software Tips Remote Work Relocation Wiring Hosted Solution Bloatware Gaming Console Password Manager Legal Monitor Hosted Computing Proactive Science Unified Communications Students Bing Staff Database Online Shopping Cache Project Management Audit Password Management File Versioning Devices GDPR Netflix Entrepreneur Business Mangement Root Cause Analysis Smartwatch Data Warehousing Specifications Reputation Inventory Remote Monitoring and Maintenance Tablets Start Menu Theft Shortcuts Digital Signature IT Security IoT Supercomputer Hiring/Firing Distribution Regulations Evernote Internet exploMicrosoft Wireless Internet Warranty Computer Fan Windows Media Player Virtual Desktop Print Server NIST Multiple Versions HBO Thought Leadership E-Commerce Cost Management Travel Criminal NarrowBand eCommerce Employee Millennials Customers Remote Support Macro Line of Business Upgrades Analyitcs Webcam Mobile Cortana Uninterrupted Power Supply nternet Crowdfunding Electronic Health Records Multi-Factor Security Strategy Co-managed IT Knowledge Logistics Wireless Charging Advertising Wire Microchip FENG Customer Service Chromecast Law Firm IT Consultant Restore Data Frequently Asked Questions Distributed Denial of Service Files Company Culture Content Filter Camera Patch Management Rootkit Politics Utility Computing How to Television Printers Transportation Troubleshooting Webinar Techology Biometric Security Automobile Public Computer Benefits IT solutions CrashOverride Employer Employee Relationship Thank You Smart Technology Loyalty Books Experience Battery Content Congratulations Two Factor Authentication Video Games Emergency Worker Music Regulation Audiobook Scalability Assessment

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *