fbpx
253.777.0763    Get SUPPORT

Graemouse Technologies Blog

Tip of the Week: Locating a Misplaced Smartphone

Tip of the Week: Locating a Misplaced Smartphone

The great thing about smartphones, in a business sense, is how portable they are - you can literally be productive almost anywhere. Unfortunately, this also means that they can be lost almost anywhere. Luckily, there just so happens to be a feature built into Android that can help you find yours.

The Stakes Are High
A lost smartphone is something that needs to be taken seriously nowadays. Not only is it an expensive device to replace, its contents could be considered priceless. Anything you’ve accessed via that phone (potentially including your finances and social media) is then at risk. If this device was used for business purposes, your data could be at stake if your device was stolen - and, if you used it as a part of a two-factor authentication measure, there goes your access to your network.

Clearly, this wouldn’t be a good thing.

This is precisely why Android includes a feature to help you find a device, should it ever be lost.

Auto-Location
On your Android device, you need to work proactively and enable a few settings.

In your Settings, you should be able to find a Find My Device option. Make sure this is turned on. Your Location should be set to High accuracy. Finally, you will want to enable Google to Use Location History. While this will diminish your privacy from the eyes of Google, it will make your phone that much easier to find.

To locate your device, you’ll then need to access the same Google account that is used on the device in question from a web browser. Google is able to give you a general idea of where the device was last located on a map, and even what Wi-Fi networks it is connected to. The Find My Device application can do the same thing if you have access to a second device.

Find My Device also allows you to remotely lock your device and display a message to help anyone who might find it get it back to you. Once you’re in the vicinity of your device, you can also command your device to ring. This command will override the volume settings, increasing the chances of it being heard.

If you truly believe that your device has been stolen, there is also the nuclear option: remotely wiping the device via Find My Device.

Keep in mind, in order for these features to work, you absolutely have to enable them on your phone first. Otherwise, you’ll be out of luck if the device ever goes missing.

Act Fast
It is also important to remember that these features will only work as long as the phone is on. Sure, you could still check for its last known location in Find My Device, but there’s no guarantee that it will still be there.

Finally, if you truly believe that your device was stolen, contact the proper authorities and give them everything you know.

With any luck, you’ll be able to find your lost phone lickety-split. While you’re here, take a look at some of our other blogs, where you can find other handy tricks and useful information, courtesy of Graemouse Technologies.

Infected Applications Removed from Google Play Sto...
Your IT Wish List: How to Improve Your Business
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, March 19 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Access Control Internet of Things Gadgets Bandwidth Managed IT Services Employer-Employee Relationship Voice over Internet Protocol Humor Thought Leadership HaaS Password Accountants Redundancy Computer Blockchain Data Backup Cybercrime Miscellaneous Authentication Cloud PDF Privacy Save Money Paperless Office Tip of the Week Private Cloud Upgrade Network Congestion Microsoft Passwords Cryptocurrency Hybrid Cloud Two-factor Authentication FCC eWaste Router Business Computing Virtualization Enterprise Content Management Sports Start Menu YouTube Collaboration Government Big Data Conferencing Mouse Office 365 Alert Mobile Device End of Support Hackers Tech Term Security Data Administrator Chrome Unsupported Software Infrastructure Email Managed IT App Website Augmented Reality Network Security Identity Theft Network Smartphone Travel Skype Machine Learning CES Keyboard Online Shopping Money Excel Entertainment Windows 7 Business Management Managed IT Services Software as a Service Business Intelligence Smartphones BYOD Connectivity Efficiency Malware Spam Blocking Mobile Computing Comparison Scam Outsourced IT Technology Word IT Services OneNote Facebook Backup Spam Microsoft Office Best Practices Avoiding Downtime Remote Monitoring Vulnerability Meetings Data Recovery Productivity Electronic Medical Records Password Management WiFi Disaster Recovery Managed Service History Windows Artificial Intelligence Settings IT Plan Data Security Mobile Device Management Cybersecurity Health Specifications Holiday Wi-Fi Quick Tips Botnet Hardware Social Engineering Business Internet Google Drive Hacker Ransomware Update MSP Mobile Devices Law Enforcement Applications Information Bring Your Own Device Productivity Net Neutrality Software ISP Browser Public Cloud VoIP Social Media Telephone System BDR Innovation Data Protection Cloud Computing Proactive IT Automation Evernote Business Continuity Saving Money IT Support Windows 10 Small Business Communication Encryption Hosted Solutions Google Docs Phishing Operating System Marketing Telephony Networking Emergency Workplace Tips Windows 10 Virtual Assistant Human Resources Android VPN How To IT Management HIPAA Data Breach Telephone Systems Google Cleaning Physical Security Computers Apps Fraud Data Storage Security Cameras Wire iPhone Content Management Server Apple Servers The Internet of Things Budget User Tips Communications

Newsletter Sign Up