k_Street Consulting, LLC Blog

Tip of the Week: Locating a Misplaced Smartphone

Tip of the Week: Locating a Misplaced Smartphone

The great thing about smartphones, in a business sense, is how portable they are - you can literally be productive almost anywhere. Unfortunately, this also means that they can be lost almost anywhere. Luckily, there just so happens to be a feature built into Android that can help you find yours.

The Stakes Are High
A lost smartphone is something that needs to be taken seriously nowadays. Not only is it an expensive device to replace, its contents could be considered priceless. Anything you’ve accessed via that phone (potentially including your finances and social media) is then at risk. If this device was used for business purposes, your data could be at stake if your device was stolen - and, if you used it as a part of a two-factor authentication measure, there goes your access to your network.

Clearly, this wouldn’t be a good thing.

This is precisely why Android includes a feature to help you find a device, should it ever be lost.

Auto-Location
On your Android device, you need to work proactively and enable a few settings.

In your Settings, you should be able to find a Find My Device option. Make sure this is turned on. Your Location should be set to High accuracy. Finally, you will want to enable Google to Use Location History. While this will diminish your privacy from the eyes of Google, it will make your phone that much easier to find.

To locate your device, you’ll then need to access the same Google account that is used on the device in question from a web browser. Google is able to give you a general idea of where the device was last located on a map, and even what Wi-Fi networks it is connected to. The Find My Device application can do the same thing if you have access to a second device.

Find My Device also allows you to remotely lock your device and display a message to help anyone who might find it get it back to you. Once you’re in the vicinity of your device, you can also command your device to ring. This command will override the volume settings, increasing the chances of it being heard.

If you truly believe that your device has been stolen, there is also the nuclear option: remotely wiping the device via Find My Device.

Keep in mind, in order for these features to work, you absolutely have to enable them on your phone first. Otherwise, you’ll be out of luck if the device ever goes missing.

Act Fast
It is also important to remember that these features will only work as long as the phone is on. Sure, you could still check for its last known location in Find My Device, but there’s no guarantee that it will still be there.

Finally, if you truly believe that your device was stolen, contact the proper authorities and give them everything you know.

With any luck, you’ll be able to find your lost phone lickety-split. While you’re here, take a look at some of our other blogs, where you can find other handy tricks and useful information, courtesy of k_Street Consulting, LLC.

Protecting Your Business by Understanding IoT Secu...
The Good, Bad, and Ugly of the Internet
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, August 25 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

VPN Unified Threat Management Wireless Windows 10s Saving Money Vulnerability Conferencing Programming Business Computing Email Authentication Hard Drive Productivity Environment Big data Search Engine HIPAA Staff Botnet Business Owner Investment communications Quick Tips Employer-Employee Relationship Chrome Remote Monitoring and Maintenance Value Content Management Biometric Security Windows Media Player Evernote Unified Communications Business Continuity Recovery Going Green Windows 10 Regulations Windows Server 2008 R2 Science People Physical Security Professional Services Windows 7 Biometrics Notifications Legal Antivirus WIndows 7 Tip of the week Laptop DDoS IT Management Smartwatch Cybersecurity Backup and Disaster Recovery Hring/Firing Remote Maintenance Enterprise Content Management Access Control E-Commerce Regulation Techology User Tips Settings Point of Sale FENG Outlook analytics How To USB Windows Server 2008 Tablets History Cloud Books Wireless Technology Amazon Web Services Workforce Business Management Cost Management IT Plan Proactive Maintenance Accountants IT Support Tech Term Application IT Services Budget Customer Relationship Management Root Cause Analysis Private Cloud Risk Management Tools Maintenance Logistics Cryptocurrency Wearable Technology webinar Entertainment Shortcut eCommerce Electronic Medical Records User Battery Amazon Cables Financial Downtime Project Management Company Culture Cleaning Remote Computing Word Networking Computer Repair Software Politics Online Currency Upgrade HVAC Miscellaneous End of Support Audiobook Consultant Data Backup Marketing Mobile Office OneNote Network Security Remote Monitoring Net Neutrality Trending App Worker Commute Proactive Smart Technology iphone Retail Music Read Save Time Hosted Computing LinkedIn NIST Apple Productivity Comparison Hard Drives Facebook Help Desk Microchip Social Networking Cabling Spam Blocking Sync Managed Services Provider Scalability Hiring/Firing Best Practices Internet Television Printer Software as a Service Office 365 Business Intelligence IoT Memory Online Shopping Streaming Media Data storage Hybrid Cloud Infrastructure Phone System Vendor Users Social Engineering Outsourced IT Telephone System Google Apps Robot Shortcuts Privacy Hypervisor Apps Workplace Tips Humor Public Cloud Pain Points Twitter Windows 8 Voice over Internet Protocol Hosted Solution Administration Smartphone Bluetooth Analyitcs Computer Rootkit Remote Work Data Warehousing Computer Accessories HBO Software Tips CrashOverride Technology Employee Procurement Servers ISP Audit Google Docs Devices Wiring Current Events Communication Virtual Assistant Disaster Recovery Intranet Multiple Versions Virtual Reality Cloud Computing Fax Server Money Managing Stress Computers Cache Bloatware Worker Manufacturing Business Technology Automobile Healthcare Sports Lifestyle Transportation Innovation Information Nanotechnology Content Filtering Data Management Smartphones Android Workers Content Virtual Desktop Backup Education Safe Mode Office Tips Passwords Hosted Solutions Data Protection Customer Service Running Cable Mobile Device Network Congestion Display Inventory Smart Devices Scam malware Fraud Mobility Database Video Games Leadership Security Virtual Private Network Gaming Console Assessment Patch Management Cortana Network Strategy IBM Analysis Mobile Device Management Experience NarrowBand Wireless Internet IT service Colocation OLED Best Available Storage Solid State Drive Bing Cryptomining Thank You Holiday Credit Cards Start Menu IT Solutions Phishing IT solutions Relocation Compliance Data Recovery Tablet Azure Utility Computing Distribution Criminal Two-factor Authentication Shadow IT Content Filter Windows 10 Thought Leadership Computing Infrastructure BDR Camera Chromecast Troubleshooting Internet Exlporer eWaste VoIP Social User Error Multi-Factor Security Windows Google Two Factor Authentication Mobile Computing Managed Service Internet of Things Collaboration Health travel Tech Support IT Support Business Processor Smart Tech Data Storage Instant Messaging Social Media Netflix Augmented Reality CES Fiber-Optic Human Resources Meetings Distributed Denial of Service Keyboard Computer Fan Black Market Connectivity Monitor Microsoft Office Virus Operating System Google Search File Sharing Blockchain Managed IT Services SaaS Work/Life Balance Files Virtualization Hardware Flash Server Addiction Skype Mobile Devices SharePoint File Versioning Firewall Wire Data loss Loyalty Wireless Charging Flexibility Advertising Screen Mirroring Statistics Students Computer Care Training Website Smart Office Supercomputer Data Breach Charger Administrator Internet exploMicrosoft Practices Password Management Information Technology Cast Hacking Remote Worker Save Money MSP Search Managed Service Provider Personal Information Unsupported Software ROI Efficiency Domains Law Enforcement Uninterrupted Power Supply Router Printers Specifications Analytic Emails Digital Signage PowerPoint Data Security HaaS Best Practice Alert Virtual Machine Excel IaaS Congratulations Archive IT Infrastructure Restore Data Data Spam avoiding downtime Product Reviews Operating Systems Employer Employee Relationship Insurance Hackers Update Reputation Entrepreneur Gmail Bring Your Own Device Tip of the Week Mobile Security Cameras Government Lithium-ion battery Employee/Employer Relationship Password Bandwidth Document Management Redundancy Touchscreen Paperless Office Telecommuting Recycling Office Millennials Line of Business Hacker Proactive IT Wi-Fi Gadgets Applications How to The Internet of Things Touchpad YouTube Frequently Asked Questions WiFi Automation BYOD Managed IT Services Default App Public Computer RMM Browser Identity Theft Knowledge Telephone Systems Vendor Management Warranty Emergency Machine Learning Password Manager Google Drive Artificial Intelligence Cybercrime Safety Customers Digital Signature GDPR Saving Time Business Mangement Printer Server 5G PDF Ransomware Webinar Telephony Encryption Theft Samsung Managed IT Benefits Cameras IT Consultant Electronic Health Records Small Business Digital Payment Mouse Microsoft

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *