k_Street Consulting, LLC Blog

Tip of the Week: Locating a Misplaced Smartphone

Tip of the Week: Locating a Misplaced Smartphone

The great thing about smartphones, in a business sense, is how portable they are - you can literally be productive almost anywhere. Unfortunately, this also means that they can be lost almost anywhere. Luckily, there just so happens to be a feature built into Android that can help you find yours.

The Stakes Are High
A lost smartphone is something that needs to be taken seriously nowadays. Not only is it an expensive device to replace, its contents could be considered priceless. Anything you’ve accessed via that phone (potentially including your finances and social media) is then at risk. If this device was used for business purposes, your data could be at stake if your device was stolen - and, if you used it as a part of a two-factor authentication measure, there goes your access to your network.

Clearly, this wouldn’t be a good thing.

This is precisely why Android includes a feature to help you find a device, should it ever be lost.

Auto-Location
On your Android device, you need to work proactively and enable a few settings.

In your Settings, you should be able to find a Find My Device option. Make sure this is turned on. Your Location should be set to High accuracy. Finally, you will want to enable Google to Use Location History. While this will diminish your privacy from the eyes of Google, it will make your phone that much easier to find.

To locate your device, you’ll then need to access the same Google account that is used on the device in question from a web browser. Google is able to give you a general idea of where the device was last located on a map, and even what Wi-Fi networks it is connected to. The Find My Device application can do the same thing if you have access to a second device.

Find My Device also allows you to remotely lock your device and display a message to help anyone who might find it get it back to you. Once you’re in the vicinity of your device, you can also command your device to ring. This command will override the volume settings, increasing the chances of it being heard.

If you truly believe that your device has been stolen, there is also the nuclear option: remotely wiping the device via Find My Device.

Keep in mind, in order for these features to work, you absolutely have to enable them on your phone first. Otherwise, you’ll be out of luck if the device ever goes missing.

Act Fast
It is also important to remember that these features will only work as long as the phone is on. Sure, you could still check for its last known location in Find My Device, but there’s no guarantee that it will still be there.

Finally, if you truly believe that your device was stolen, contact the proper authorities and give them everything you know.

With any luck, you’ll be able to find your lost phone lickety-split. While you’re here, take a look at some of our other blogs, where you can find other handy tricks and useful information, courtesy of k_Street Consulting, LLC.

Protecting Your Business by Understanding IoT Secu...
The Good, Bad, and Ugly of the Internet
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, April 21 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Display Specifications Computer Care Alert Electronic Health Records Cortana Evernote Shadow IT Enterprise Content Management Telephony Mobile Device Management Printers Students Online Shopping Cloud Computing webinar Tech Support Nanotechnology App Hacker Customers Manufacturing Virus Bluetooth Business Fraud User Error Bring Your Own Device IT Support Computer Accessories Audiobook Current Events Application Backup and Disaster Recovery IT Support Thought Leadership Distribution Bing travel Staff Education Hiring/Firing Machine Learning Wireless Charging Saving Money Office Tips IT Plan Skype Firewall Privacy Multiple Versions Hackers Miscellaneous Scalability Touchscreen Internet Exlporer Unsupported Software Smartphones Flash Holiday Social Media Remote Worker Business Technology Regulation Hosted Solution Business Continuity Company Culture Screen Mirroring Healthcare VPN Work/Life Balance Mobile Device Start Menu File Sharing Audit Shortcuts Streaming Media Gmail Network Security Vendor Management Amazon Office 365 Telecommuting Laptop IT Services Colocation WIndows 7 Mobile Computing Restore Data Worker Safe Mode Server Windows Media Player Black Market Social Cybercrime Blockchain Meetings OLED Amazon Web Services Statistics SaaS Project Management Microchip Computers eWaste Windows 10s IaaS CrashOverride Private Cloud Netflix Patch Management DDoS Solid State Drive Theft Emergency Best Available E-Commerce Customer Service Sports Tablets Risk Management Tip of the Week How to SharePoint Software Wireless Technology Applications Music Data Storage Managed Service Provider Battery Save Money WiFi Android YouTube iphone Saving Time Worker Commute Mobility Politics Marketing Technology Google Public Computer Digital Signature Managed Service Instant Messaging Budget USB Administrator Smart Tech PDF Cybersecurity Bloatware NIST Mouse Remote Computing Workforce Intranet Botnet Ransomware Domains Electronic Medical Records Virtual Private Network Robot avoiding downtime HIPAA Hosted Solutions How To Value Security Cameras Physical Security Files Online Currency Digital Payment Compliance Google Drive Small Business Cleaning Charger Operating Systems Tablet Windows 10 Archive Accountants Assessment Password Manager Facebook Automobile Lithium-ion battery Connectivity Data Health Content Filtering Productivity Remote Monitoring Wire Congratulations Information Technology Television Conferencing IT Consultant IT solutions analytics Paperless Office Networking Database Running Cable Data loss Social Engineering Pain Points Employer-Employee Relationship Identity Theft ISP IT service Cables PowerPoint Humor Samsung Scam Credit Cards Backup Best Practice Wi-Fi Data storage Virtual Assistant User Storage Business Owner Network Programming Google Docs Employer Employee Relationship Bandwidth BDR Troubleshooting Data Protection Operating System Thank You BYOD Government Telephone System Virtual Reality Website History Legal LinkedIn Hybrid Cloud Trending Smart Technology Techology Cache Downtime Regulations Biometric Security Business Mangement Mobile Printer Server Microsoft Browser Reputation Product Reviews Windows 7 Vendor IoT Transportation Voice over Internet Protocol Windows Server 2008 Save Time Notifications Public Cloud Authentication IT Solutions HVAC Data Breach Proactive Benefits Internet exploMicrosoft VoIP Remote Monitoring and Maintenance Google Apps Chromecast Software Tips Distributed Denial of Service Flexibility Wireless Internet Recycling Workers Big data Wiring Email Read Computer Fan Loyalty Employee Users Passwords Phishing Communication Workplace Tips Fax Server Office HBO Point of Sale Net Neutrality Utility Computing Unified Communications OneNote Internet Apple Proactive IT Router Memory Hard Drives Smartphone Upgrade Search Engine Strategy Artificial Intelligence Entrepreneur Safety Multi-Factor Security Excel Two Factor Authentication eCommerce malware Books The Internet of Things Training Virtual Desktop Human Resources Consultant Windows 8 Devices Wearable Technology Outlook Logistics Analyitcs Business Intelligence Science Cryptocurrency Business Computing Going Green Document Management HaaS Help Desk Rootkit Vulnerability Content Managed IT Tip of the week NarrowBand Shortcut Money Camera Biometrics Employee/Employer Relationship Digital Signage Data Backup Insurance Criminal Hardware Unified Threat Management communications CES Settings Lifestyle Addiction Emails Professional Services Word Mobile Office Gaming Console Line of Business Millennials Security Computing Infrastructure Fiber-Optic Inventory Supercomputer Tools Keyboard Search Cost Management Innovation IBM Monitor Password Management Windows Encryption Outsourced IT Practices Root Cause Analysis Smartwatch IT Management Spam Blocking Printer Infrastructure Remote Work Gadgets Phone System Spam Warranty Microsoft Office Augmented Reality 5G End of Support Data Recovery Hosted Computing File Versioning MSP Touchpad Advertising Comparison Video Games Apps Entertainment Managing Stress Two-factor Authentication Smart Office User Tips Quick Tips Cryptomining Efficiency FENG GDPR Administration Cast Business Management Webinar Virtualization Cameras Best Practices Relocation Content Management Software as a Service Customer Relationship Management Hring/Firing Internet of Things Update Managed IT Services Antivirus Collaboration Wireless Social Networking Analytic Twitter Recovery Disaster Recovery Cloud Data Warehousing Managed IT Services Google Search Mobile Devices Content Filter Data Management Knowledge Automation Telephone Systems Data Security Servers Network Congestion Experience Leadership Environment People Law Enforcement Maintenance Information Uninterrupted Power Supply Sync Retail Password Redundancy Access Control Computer Tech Term Frequently Asked Questions Chrome Windows 10 Analysis Productivity Computer Repair Hacking

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *