XFER Blog

XFER has been serving Michigan since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Locating a Misplaced Smartphone

Tip of the Week: Locating a Misplaced Smartphone

The great thing about smartphones, in a business sense, is how portable they are - you can literally be productive almost anywhere. Unfortunately, this also means that they can be lost almost anywhere. Luckily, there just so happens to be a feature built into Android that can help you find yours.

The Stakes Are High
A lost smartphone is something that needs to be taken seriously nowadays. Not only is it an expensive device to replace, its contents could be considered priceless. Anything you’ve accessed via that phone (potentially including your finances and social media) is then at risk. If this device was used for business purposes, your data could be at stake if your device was stolen - and, if you used it as a part of a two-factor authentication measure, there goes your access to your network.

Clearly, this wouldn’t be a good thing.

This is precisely why Android includes a feature to help you find a device, should it ever be lost.

Auto-Location
On your Android device, you need to work proactively and enable a few settings.

In your Settings, you should be able to find a Find My Device option. Make sure this is turned on. Your Location should be set to High accuracy. Finally, you will want to enable Google to Use Location History. While this will diminish your privacy from the eyes of Google, it will make your phone that much easier to find.

To locate your device, you’ll then need to access the same Google account that is used on the device in question from a web browser. Google is able to give you a general idea of where the device was last located on a map, and even what Wi-Fi networks it is connected to. The Find My Device application can do the same thing if you have access to a second device.

Find My Device also allows you to remotely lock your device and display a message to help anyone who might find it get it back to you. Once you’re in the vicinity of your device, you can also command your device to ring. This command will override the volume settings, increasing the chances of it being heard.

If you truly believe that your device has been stolen, there is also the nuclear option: remotely wiping the device via Find My Device.

Keep in mind, in order for these features to work, you absolutely have to enable them on your phone first. Otherwise, you’ll be out of luck if the device ever goes missing.

Act Fast
It is also important to remember that these features will only work as long as the phone is on. Sure, you could still check for its last known location in Find My Device, but there’s no guarantee that it will still be there.

Finally, if you truly believe that your device was stolen, contact the proper authorities and give them everything you know.

With any luck, you’ll be able to find your lost phone lickety-split. While you’re here, take a look at some of our other blogs, where you can find other handy tricks and useful information, courtesy of XFER.

Protecting Your Business by Understanding IoT Secu...
The Good, Bad, and Ugly of the Internet
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, January 17 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Technology Tip of the Week Privacy Microsoft Internet Cloud Best Practices Saving Money Backup Workplace Tips Software Business Computing Managed Service Provider Hosted Solutions Data Hackers Small Business Google Hardware Mobile Devices Productivity VoIP Mobile Office Malware Email Gadgets Quick Tips Network Security Efficiency Network Innovation IT Support Business IT Services Social Media Business Management Business Continuity Miscellaneous Smartphones Server Upgrade Communication Virtualization Disaster Recovery User Tips Windows Communications Data Backup Computer Microsoft Office Managed IT Services Users Smartphone Passwords Browser Data Recovery Mobile Device Management Android Holiday WiFi Save Money Marketing Tech Term Ransomware Outsourced IT Alert Internet of Things BDR Mobile Computing Cybercrime Vendor Management Windows 10 Router Cloud Computing Chrome Operating System Remote Monitoring Bring Your Own Device Apple Artificial Intelligence BYOD Computers Information Technology Automation Avoiding Downtime Remote Computing Managed IT Services History IT Solutions Best Practice Cybersecurity The Internet of Things Going Green Firewall Telephone Systems Spam VPN Big Data Current Events Wireless Technology Trending IT Consultant Application Collaboration Printer Hacking Facebook Social Engineering Employer-Employee Relationship Health Phone System Lithium-ion Battery Budget Mobility Excel App Productivity Bandwidth Windows 10 Money Proactive IT Office Mouse Maintenance Two-factor Authentication Windows 8 Content Filtering Mobile Device Recovery How To Unified Threat Management Phishing Business Managament Networking IT Support Office 365 Business Intelligence iPhone Applications Fax Server Settings Analytics Data Security Google Drive Managed IT Apps Access Control Value User Error Sports PowerPoint Humor Private Cloud Website Information Redundancy Outlook Law Enforcement Tutorials Virus Data Protection Gmail Encryption Blockchain Antivirus Customer Relationship Management Word Training Hard Drives Inbound Marketing Retail Social Human Resources Downtime Identity Theft File Sharing Memory Tech Support Network Congestion Administration Hacker Voice over Internet Protocol Conferencing Scam Digital Payment IT Management Social Networking Computer Repair Servers Tablet Wi-Fi Search Save Time Twitter Machine Learning Office Tips Document Management Data Management Streaming Media Risk Management Software as a Service Analysis Administrator Compliance Flexibility Managed Service Vulnerability Entertainment Saving Time Connectivity Help Desk Environment Cleaning Password Running Cable Comparison Keyboard Wireless Physical Security Augmented Reality Intranet Telephony Public Cloud Google Docs Virtual Assistant Work/Life Balance Data Breach Wearable Technology Windows 7 SaaS Botnet Biometrics Touchscreen IT service Workers Best Available Telephone System Data storage Display Bluetooth Credit Cards Data loss Internet Exlporer People eWaste Video Surveillance PDF Samsung Smart Tech Spam Blocking HaaS End of Support CES Robot Safety Fraud USB Online Currency YouTube IT Plan Government Piracy Point of Sale IBM Meetings Recycling Content Management Leadership Education Infrastructure Unsupported Software Statistics DDoS Computer Accessories Paperless Office OneNote Solid State Drive Skype Update Webinar Black Market Programming Instant Messaging Data Storage Students Bing Hosted Computing Proactive Unified Communications Text Messaging Cache Project Management Audit Notifications LinkedIn Staff Cameras Online Shopping Colocation Net Neutrality Business Mangement Work Station Password Management Laptop Gaming Console Licensing Devices GDPR Netflix Theft Virtual Reality Healthcare Shortcuts Root Cause Analysis Shadow IT Data Warehousing Specifications WIndows 7 Inventory Remote Monitoring and Maintenance SharePoint Windows 8.1 Update Start Menu Wireless Internet Warranty Computer Fan Hybrid Cloud Digital Signature Printer Server IoT Shortcut Supercomputer Regulations Evernote IaaS Computing Infrastructure Travel Criminal Worker Commute NIST Touchpad HBO Debate User Thought Leadership E-Commerce Mobile Cortana Bloatware Electronic Health Records eCommerce Legal Millennials Macro Managing Stress Domains Line of Business Relocation Science Wire Microchip FENG Multi-Factor Security Strategy Co-managed IT Knowledge Monitor Wireless Charging Cryptocurrency Frequently Asked Questions Content Filter Camera Patch Management Professional Services Google Apps Entrepreneur Vendor Screen Mirroring Workforce Webcam Authentication MSP 360 Emails Tablets Smart Office Electronic Medical Records Lifestyle Insurance Reputation Flash Fiber-Optic Windows 10s Internet exploMicrosoft Windows Media Player Virtual Desktop Safe Mode Business Owner IT Security Tip of the week Amazon Hiring/Firing Storage Tools PC Care Cost Management HVAC Security Cameras Charger Cast NarrowBand Print Server Telecommuting Nanotechnology Remote Worker 3D Upgrades Analyitcs Search Engine Hiring/Firing Uninterrupted Power Supply nternet Crowdfunding Scheduling Practices HIPAA Customers Remote Support Sync Cables Virtual Private Network Advertising Accountants Customer Service Business Technology Windows Server 2008 Amazon Web Services eBay Addiction Distributed Denial of Service Files Company Culture Password Manager Alerts Enterprise Content Management Computer Care Chromecast Law Firm IT Software Tips Remote Work Consultant Wiring Hosted Solution Employer Employee Relationship CrashOverride Smart Technology Thank You Loyalty How to Books Smartwatch Techology Experience Two Factor Authentication Content Congratulations Emergency Worker Music Regulation Audiobook Assessment Rootkit Utility Computing Politics Transportation Television Battery Printers Video Games Troubleshooting Webinar Benefits Automobile Public Computer Employee/Employer Relationship Scalability IT solutions

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *