Infracore LLC Blog

Tip of the Week: Locating a Misplaced Smartphone

Tip of the Week: Locating a Misplaced Smartphone

The great thing about smartphones, in a business sense, is how portable they are - you can literally be productive almost anywhere. Unfortunately, this also means that they can be lost almost anywhere. Luckily, there just so happens to be a feature built into Android that can help you find yours.

The Stakes Are High
A lost smartphone is something that needs to be taken seriously nowadays. Not only is it an expensive device to replace, its contents could be considered priceless. Anything you’ve accessed via that phone (potentially including your finances and social media) is then at risk. If this device was used for business purposes, your data could be at stake if your device was stolen - and, if you used it as a part of a two-factor authentication measure, there goes your access to your network.

Clearly, this wouldn’t be a good thing.

This is precisely why Android includes a feature to help you find a device, should it ever be lost.

On your Android device, you need to work proactively and enable a few settings.

In your Settings, you should be able to find a Find My Device option. Make sure this is turned on. Your Location should be set to High accuracy. Finally, you will want to enable Google to Use Location History. While this will diminish your privacy from the eyes of Google, it will make your phone that much easier to find.

To locate your device, you’ll then need to access the same Google account that is used on the device in question from a web browser. Google is able to give you a general idea of where the device was last located on a map, and even what Wi-Fi networks it is connected to. The Find My Device application can do the same thing if you have access to a second device.

Find My Device also allows you to remotely lock your device and display a message to help anyone who might find it get it back to you. Once you’re in the vicinity of your device, you can also command your device to ring. This command will override the volume settings, increasing the chances of it being heard.

If you truly believe that your device has been stolen, there is also the nuclear option: remotely wiping the device via Find My Device.

Keep in mind, in order for these features to work, you absolutely have to enable them on your phone first. Otherwise, you’ll be out of luck if the device ever goes missing.

Act Fast
It is also important to remember that these features will only work as long as the phone is on. Sure, you could still check for its last known location in Find My Device, but there’s no guarantee that it will still be there.

Finally, if you truly believe that your device was stolen, contact the proper authorities and give them everything you know.

With any luck, you’ll be able to find your lost phone lickety-split. While you’re here, take a look at some of our other blogs, where you can find other handy tricks and useful information, courtesy of Infracore LLC.

Infected Applications Removed from Google Play Sto...
Your IT Wish List: How to Improve Your Business


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, March 22 2019

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Cloud Business computing Google Hosted Solutions Network Security Malware Productivity Microsoft Data Software Innovation User Tips Hackers Internet Mobile Devices Backup Tech Term Smartphones Hardware Business Email Workplace Tips Efficiency Windows 10 Communications VoIP Android IT Services Browser Business Continuity Smartphone Data Backup Computer Business Management Cloud Computing Data Recovery Disaster Recovery Small Business Outsourced IT Managed IT Services Alert Communication Artificial Intelligence Managed IT Services Computers Router Ransomware Chrome Windows 10 Miscellaneous Office Internet of Things IT Support Network Law Enforcement Cybersecurity Cybercrime Windows Mobile Device Social Media Gadgets Server Telephone Systems Holiday Collaboration Quick Tips How To Office 365 Password Applications Productivity Facebook Virtualization Money Passwords Health Work/Life Balance Information Word Private Cloud Social Engineering Google Drive App Automation Spam Saving Money Upgrade Wi-Fi Phishing Apps Operating System Paperless Office Data Security BDR Bring Your Own Device HaaS Office Tips Save Money Managed Service Data Protection IT Support Voice over Internet Protocol Vulnerability Keyboard Settings Microsoft Office Hacking Two-factor Authentication Mobile Device Management Scam Data Breach Encryption Mobility Connectivity IT Plan Human Resources Cryptocurrency Samsung Google Docs Servers Electronic Medical Records Fraud Access Control Marketing Bandwidth Managed Service Provider Training Unsupported Software Comparison Entertainment Government Remote Monitoring USB Value Website CES Battery Machine Learning Firewall Networking Managed IT Virtual Assistant Telephony Public Cloud Content Management Windows 7 Save Time Employer-Employee Relationship Remote Computing Charger Botnet Sports BYOD Patch Management Business Intelligence Flexibility Telephone System Data Storage Blockchain End of Support Cleaning Update Software as a Service History Identity Theft Legal Meetings Infrastructure Automobile OneNote Worker IT Management Big Data Redundancy Avoiding Downtime Computer Care Spam Blocking Augmented Reality VPN Data Management PDF Information Technology Books Assessment Trending Techology Users Smartwatch Computer Fan Sync Employer Employee Relationship Advertising Wireless Charging Devices Data loss Wearable Technology Social Tip of the week Relocation User Error IT Consultant Content Remote Worker Business Mangement Search Search Engine Benefits Accountants ISP Downtime Instant Messaging Wireless Internet Warranty webinar Monitor Television Staff Virtual Reality Safe Mode Employee The Internet of Things Computer Accessories Cortana Thought Leadership Screen Mirroring HVAC Vendor Windows 10s Windows Server 2008 Leadership Amazon Authentication Video Games Audiobook Wiring Vendor Management Gmail How to Bing HBO Telecommuting Cryptomining Root Cause Analysis Wire Printer Conferencing Software Tips Emergency Public Computer Specifications Worker Commute Digital Signage FENG Bluetooth Google Apps Unified Threat Management Cast Troubleshooting Loyalty Education Enterprise Content Management Display Humor Internet Exlporer Amazon Web Services Nanotechnology Recovery Recycling Black Market YouTube Help Desk Outlook Smart Technology Files Current Events Remote Work Practices MSP Database Workers Addiction Mouse Emails Data storage Digital Signature Google Search Skype Hybrid Cloud Mobile Computing SaaS Computing Infrastructure Password Management Security Cameras Solid State Drive Flash Online Shopping Smart Tech Scalability Experience eWaste Frequently Asked Questions Two Factor Authentication Knowledge Hosted Computing File Sharing Business Technology Travel Cache Wireless Smart Office Administrator Millennials Proactive IT Start Menu Risk Management Apple Camera Multi-Factor Security HIPAA NIST Hacker Audit Hiring/Firing Internet exploMicrosoft Evernote Music WiFi Criminal Shortcuts Excel Network Congestion Credit Cards Inventory Best Practice Password Manager Document Management Microchip IT solutions Physical Security Transportation Safety Workforce Net Neutrality Tools Politics iPhone Rootkit Printers Congratulations Twitter Company Culture Webinar Compliance Thank You Managing Stress Biometric Security Regulation CrashOverride

Recent Comments

Thaddeus Greer Can Chargers Be Interchanged Between Devices?
21 March 2019
The infracore is known as the heart of the information technology all over the world and the issue d...
AngusCousens What is Encryption, Anyways?
19 March 2019
When we hold the computer the basic and stylish accessories with the desktop is the requirement of e...
Kevyn Hawkins In the Midst of Chaotic Financial Markets, Technology Remains a Constant
15 March 2019
For the finance market we have to read this blog really and very carefully for the chapter of the pa...
Micheal williams Tip of the Week: Improve Email Open Rates With an Attention-Grabbing Title
15 March 2019
In this modern world, technology has changed the world and even it has created many chances to creat...
Maddison Franklin Tip of the Week: Improve Email Open Rates With an Attention-Grabbing Title
14 March 2019
IT is the heart of technology all over the world and there are many ease by the use of this technolo...