k_Street Consulting, LLC Blog

Tip of the Week: Locating a Misplaced Smartphone

Tip of the Week: Locating a Misplaced Smartphone

The great thing about smartphones, in a business sense, is how portable they are - you can literally be productive almost anywhere. Unfortunately, this also means that they can be lost almost anywhere. Luckily, there just so happens to be a feature built into Android that can help you find yours.

The Stakes Are High
A lost smartphone is something that needs to be taken seriously nowadays. Not only is it an expensive device to replace, its contents could be considered priceless. Anything you’ve accessed via that phone (potentially including your finances and social media) is then at risk. If this device was used for business purposes, your data could be at stake if your device was stolen - and, if you used it as a part of a two-factor authentication measure, there goes your access to your network.

Clearly, this wouldn’t be a good thing.

This is precisely why Android includes a feature to help you find a device, should it ever be lost.

Auto-Location
On your Android device, you need to work proactively and enable a few settings.

In your Settings, you should be able to find a Find My Device option. Make sure this is turned on. Your Location should be set to High accuracy. Finally, you will want to enable Google to Use Location History. While this will diminish your privacy from the eyes of Google, it will make your phone that much easier to find.

To locate your device, you’ll then need to access the same Google account that is used on the device in question from a web browser. Google is able to give you a general idea of where the device was last located on a map, and even what Wi-Fi networks it is connected to. The Find My Device application can do the same thing if you have access to a second device.

Find My Device also allows you to remotely lock your device and display a message to help anyone who might find it get it back to you. Once you’re in the vicinity of your device, you can also command your device to ring. This command will override the volume settings, increasing the chances of it being heard.

If you truly believe that your device has been stolen, there is also the nuclear option: remotely wiping the device via Find My Device.

Keep in mind, in order for these features to work, you absolutely have to enable them on your phone first. Otherwise, you’ll be out of luck if the device ever goes missing.

Act Fast
It is also important to remember that these features will only work as long as the phone is on. Sure, you could still check for its last known location in Find My Device, but there’s no guarantee that it will still be there.

Finally, if you truly believe that your device was stolen, contact the proper authorities and give them everything you know.

With any luck, you’ll be able to find your lost phone lickety-split. While you’re here, take a look at some of our other blogs, where you can find other handy tricks and useful information, courtesy of k_Street Consulting, LLC.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, February 21 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

LinkedIn IT solutions Search Engine Science Social Networking Windows Server 2008 Lifestyle Employer Employee Relationship Conferencing Screen Mirroring Congratulations Colocation BDR Save Time Workplace Tips Wi-Fi Hackers Business Intelligence Data Breach Memory USB Data Management Reputation Information Downtime Managed IT Services Staff Data storage Sync Computer Fan Data Servers Public Computer Vendor Management Machine Learning Users CES Miscellaneous Data Backup Google Search Windows Media Player Paperless Office Read Botnet Current Events Document Management Best Available Office 365 Operating Systems Employee Charger Hacking Nanotechnology Environment Android Television Google Apps Consultant DDoS Marketing Accountants GDPR PowerPoint Emails Online Shopping Net Neutrality Gaming Console Remote Work Worker Commute Remote Worker iphone Best Practices Saving Time Productivity Communication Smart Office Windows 10 Camera Data Warehousing Intranet Network Congestion Touchpad Facebook Tip of the Week Millennials Managed Service Provider End of Support Humor Wearable Technology BYOD People Employer-Employee Relationship Telecommuting Operating System Comparison Hring/Firing MSP Business Tip of the week Loyalty Search Bring Your Own Device Content Business Continuity Trending Telephone Systems Audiobook Multi-Factor Security Sports Safe Mode Router Tablets Entertainment Microsoft Office Business Mangement webinar Programming Compliance Restore Data eWaste Fraud VPN Professional Services Privacy Internet Exlporer Electronic Health Records Knowledge Windows 8 Robot Wireless Bandwidth travel Pain Points Students Benefits Patch Management Network Security Hosted Solution Augmented Reality Cryptocurrency Wireless Technology Going Green Google Docs Education IT Services Voice over Internet Protocol Point of Sale HIPAA Digital Signature Software as a Service Wireless Charging Fax Server Antivirus Software Internet Bing Cameras IT Solutions Mobile Office Outlook Data Storage Microchip Insurance HaaS Spam Criminal Content Filter Business Computing Safety VoIP Mobile Device Efficiency Instant Messaging Product Reviews Data Security Infrastructure Archive Cast Customer Relationship Management Remote Computing Netflix Cache Automobile Printers Analytic Connectivity Proactive IT Files Password Management Social Redundancy Uninterrupted Power Supply Scam Employee/Employer Relationship Entrepreneur IT Consultant Addiction Computers Identity Theft Strategy Risk Management Content Management Recycling Advertising User Tips Smartphone Computer Accessories Managed IT Services Samsung Hybrid Cloud Thank You Two Factor Authentication IT Plan Maintenance Solid State Drive Law Enforcement Legal Apps Apple Monitor Amazon Web Services IT Management Administrator Virus Bluetooth Alert Bloatware Backup and Disaster Recovery Application Frequently Asked Questions Big data Encryption Physical Security Server WiFi Transportation Software Tips Assessment Backup Audit Meetings Unified Threat Management Line of Business Mobile Computing Printer Virtual Desktop Vulnerability Outsourced IT Data Recovery Private Cloud Thought Leadership Quick Tips Mobile Device Management Warranty Innovation Firewall Enterprise Content Management IBM Administration Remote Monitoring and Maintenance Hiring/Firing Wiring Cybercrime Health Techology Best Practice Public Cloud Inventory Smart Technology Computing Infrastructure Recovery Smartphones Hacker Save Money Analysis Tablet File Versioning Business Management E-Commerce Digital Payment Devices PDF YouTube Networking Worker Experience Computer Care communications Telephone System Company Culture Office Practices Upgrade Password Manager Evernote OneNote Distributed Denial of Service Cleaning Theft NarrowBand Managed IT Emergency Cables CrashOverride Human Resources Flash Virtual Reality Windows 7 Black Market Workforce NIST Browser Cost Management Content Filtering Email Rootkit Tools Two-factor Authentication Vendor Politics Smartwatch Social Media User Work/Life Balance Budget Electronic Medical Records Workers User Error Credit Cards Wireless Internet Holiday Money Remote Monitoring eCommerce Supercomputer WIndows 7 Display HVAC Training Business Owner Chrome Tech Support Streaming Media Managing Stress Proactive Running Cable SharePoint Authentication Virtual Private Network Social Engineering Mobility Password Wire Passwords Domains Phone System Tech Term Root Cause Analysis Spam Blocking Regulation Gmail Government Update IT Support IaaS Hardware Amazon Start Menu Applications Customer Service Touchscreen Shadow IT Unsupported Software avoiding downtime Leadership Keyboard IoT Automation Music Skype Shortcuts IT Support Internet of Things Mouse Access Control History Storage Lithium-ion battery Cortana Webinar Windows Website Cybersecurity Video Games Managed Service How To The Internet of Things Telephony Smart Tech Ransomware How to Network App Value Relocation ISP Specifications Digital Signage Artificial Intelligence Excel Fiber-Optic Hosted Solutions Saving Money Phishing Biometrics Virtual Assistant Settings Customers Mobile Information Technology analytics Hard Drives Word Healthcare Security Regulations Data loss Statistics Mobile Devices Utility Computing Cloud Online Currency Help Desk Windows 10 Google Drive Blockchain Scalability Microsoft Cloud Computing Analyitcs Books Windows 10s malware Flexibility Computer Productivity Google Technology Printer Server Computer Repair Chromecast Collaboration Gadgets FENG Disaster Recovery Office Tips Battery Multiple Versions Data Protection Small Business File Sharing SaaS Troubleshooting Security Cameras Business Technology Twitter Internet exploMicrosoft Notifications Virtualization Hosted Computing IT service Shortcut Laptop Project Management Retail Unified Communications HBO

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *