Infracore LLC Blog

Tip of the Week: Locating a Misplaced Smartphone

Tip of the Week: Locating a Misplaced Smartphone

The great thing about smartphones, in a business sense, is how portable they are - you can literally be productive almost anywhere. Unfortunately, this also means that they can be lost almost anywhere. Luckily, there just so happens to be a feature built into Android that can help you find yours.

The Stakes Are High
A lost smartphone is something that needs to be taken seriously nowadays. Not only is it an expensive device to replace, its contents could be considered priceless. Anything you’ve accessed via that phone (potentially including your finances and social media) is then at risk. If this device was used for business purposes, your data could be at stake if your device was stolen - and, if you used it as a part of a two-factor authentication measure, there goes your access to your network.

Clearly, this wouldn’t be a good thing.

This is precisely why Android includes a feature to help you find a device, should it ever be lost.

On your Android device, you need to work proactively and enable a few settings.

In your Settings, you should be able to find a Find My Device option. Make sure this is turned on. Your Location should be set to High accuracy. Finally, you will want to enable Google to Use Location History. While this will diminish your privacy from the eyes of Google, it will make your phone that much easier to find.

To locate your device, you’ll then need to access the same Google account that is used on the device in question from a web browser. Google is able to give you a general idea of where the device was last located on a map, and even what Wi-Fi networks it is connected to. The Find My Device application can do the same thing if you have access to a second device.

Find My Device also allows you to remotely lock your device and display a message to help anyone who might find it get it back to you. Once you’re in the vicinity of your device, you can also command your device to ring. This command will override the volume settings, increasing the chances of it being heard.

If you truly believe that your device has been stolen, there is also the nuclear option: remotely wiping the device via Find My Device.

Keep in mind, in order for these features to work, you absolutely have to enable them on your phone first. Otherwise, you’ll be out of luck if the device ever goes missing.

Act Fast
It is also important to remember that these features will only work as long as the phone is on. Sure, you could still check for its last known location in Find My Device, but there’s no guarantee that it will still be there.

Finally, if you truly believe that your device was stolen, contact the proper authorities and give them everything you know.

With any luck, you’ll be able to find your lost phone lickety-split. While you’re here, take a look at some of our other blogs, where you can find other handy tricks and useful information, courtesy of Infracore LLC.

Infected Applications Removed from Google Play Sto...
Your IT Wish List: How to Improve Your Business


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, January 18 2019

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Cloud Google Business computing Network Security Microsoft Hosted Solutions Data Malware Hackers Software User Tips Innovation Backup Tech Term Internet Hardware Business Mobile Devices Smartphones Browser Windows 10 Business Continuity Smartphone Data Backup Email Android IT Services Productivity VoIP Computer Data Recovery Business Management Outsourced IT Cloud Computing Disaster Recovery Managed IT Services Small Business Alert Workplace Tips Communications Artificial Intelligence Chrome Efficiency Router Communication Ransomware Managed IT Services Computers Miscellaneous Office Law Enforcement Windows 10 Cybercrime Network Passwords IT Support Collaboration Cybersecurity Social Media Office 365 Password Applications Facebook Virtualization How To Windows Telephone Systems Holiday Productivity Internet of Things Money Health Server Word App Gadgets Social Engineering Wi-Fi Spam Google Drive Automation Saving Money Quick Tips Information Upgrade Mobile Device Work/Life Balance BDR Keyboard Data Security IT Support Microsoft Office Scam Data Breach Hacking Data Protection Private Cloud Voice over Internet Protocol Vulnerability Settings Mobility Two-factor Authentication Connectivity Bring Your Own Device Mobile Device Management Apps Save Money Managed Service HaaS Office Tips Phishing PDF Operating System Charger Patch Management Comparison Telephone System Sports Website CES Remote Computing Unsupported Software Managed Service Provider Remote Monitoring Cleaning Flexibility Managed IT Software as a Service Worker Government Big Data Telephony Content Management Windows 7 Legal Computer Care Automobile Botnet Business Intelligence Public Cloud Blockchain BYOD Samsung Update Electronic Medical Records Data Storage Identity Theft Infrastructure Bandwidth Data Management Servers Encryption Training OneNote Paperless Office Entertainment End of Support USB Value Redundancy History IT Management Spam Blocking Firewall Networking Avoiding Downtime VPN Marketing Machine Learning Human Resources Access Control Battery Google Docs Employer-Employee Relationship IT Plan Virtual Assistant Fraud iPhone How to Tip of the week Unified Threat Management Business Mangement Smart Technology Current Events Data loss Enterprise Content Management Display Accountants MSP Cortana Thought Leadership Worker Commute Downtime YouTube Help Desk Staff Advertising Amazon Authentication SaaS Education The Internet of Things Mouse Relocation User Error webinar Black Market Windows 10s Windows Server 2008 Mobile Computing Gmail Two Factor Authentication Knowledge Screen Mirroring Password Management Telecommuting Security Cameras Experience HBO File Sharing Google Apps Monitor Root Cause Analysis Specifications Risk Management Amazon Web Services Nanotechnology Computing Infrastructure FENG Smart Office Administrator Hiring/Firing Scalability Conferencing Software Tips Recovery Camera Recycling Network Congestion Cast NIST Remote Work Hacker Practices Music Outlook Augmented Reality Workers Addiction Transportation Safety Shortcuts Digital Signature Politics Rootkit Wireless Online Shopping Smart Tech Books Assessment Skype Document Management Microchip Employer Employee Relationship Humor Internet Exlporer Emails Solid State Drive Flash eWaste IT Consultant Files Best Practice Cryptocurrency Hosted Computing Wearable Technology Frequently Asked Questions Remote Worker Cache Benefits Data storage Meetings Travel Millennials Social Hybrid Cloud Evernote Television Techology Users Start Menu Multi-Factor Security Search Engine HIPAA Computer Accessories Information Technology Audit Wireless Internet WiFi Warranty Criminal Leadership Content Safe Mode Credit Cards Inventory Search Excel Wiring Password Manager HVAC Workforce Vendor Vendor Management Apple Wireless Charging Devices Emergency Public Computer Virtual Reality Tools Trending Bing Bluetooth Internet exploMicrosoft Instant Messaging IT solutions Physical Security Troubleshooting Loyalty Computer Fan Sync Wire Printer Save Time Video Games Audiobook Congratulations Twitter Company Culture Compliance Managing Stress Regulation Printers Smartwatch Webinar CrashOverride Thank You

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

AngusCousens Preventing Identity Theft Should be a Priority, But Do You Know How to Handle It?
27 December 2018
What a good story you have written and I feel good reading about your story and we should share thin...
George Nivison Bring Your Own Device Is Great...When Applied Properly
21 December 2018
If you think you device get slow then try once again for the device sharing speed with the connectin...
Chantale Bass Tip of the Week: How to Use Tabs to Their Full Potential
15 December 2018
Tabs we need to use only with the ways of the potentially uses from the internet use and also for th...
JoseSClark How You Can Get Microsoft Office Certified
14 December 2018
Many users want to get Microsoft Office certified for theirselve and it was a good post for them. Re...
Donna Brock 3 Significant Ways the Cloud Can Grow Your Business
13 December 2018
In every field of life technology have a big name and now technology provide the facility to save yo...