253.777.0763    Get SUPPORT

Graemouse Technologies Blog

Tip of the Week: Locating a Misplaced Smartphone

Tip of the Week: Locating a Misplaced Smartphone

The great thing about smartphones, in a business sense, is how portable they are - you can literally be productive almost anywhere. Unfortunately, this also means that they can be lost almost anywhere. Luckily, there just so happens to be a feature built into Android that can help you find yours.

The Stakes Are High
A lost smartphone is something that needs to be taken seriously nowadays. Not only is it an expensive device to replace, its contents could be considered priceless. Anything you’ve accessed via that phone (potentially including your finances and social media) is then at risk. If this device was used for business purposes, your data could be at stake if your device was stolen - and, if you used it as a part of a two-factor authentication measure, there goes your access to your network.

Clearly, this wouldn’t be a good thing.

This is precisely why Android includes a feature to help you find a device, should it ever be lost.

On your Android device, you need to work proactively and enable a few settings.

In your Settings, you should be able to find a Find My Device option. Make sure this is turned on. Your Location should be set to High accuracy. Finally, you will want to enable Google to Use Location History. While this will diminish your privacy from the eyes of Google, it will make your phone that much easier to find.

To locate your device, you’ll then need to access the same Google account that is used on the device in question from a web browser. Google is able to give you a general idea of where the device was last located on a map, and even what Wi-Fi networks it is connected to. The Find My Device application can do the same thing if you have access to a second device.

Find My Device also allows you to remotely lock your device and display a message to help anyone who might find it get it back to you. Once you’re in the vicinity of your device, you can also command your device to ring. This command will override the volume settings, increasing the chances of it being heard.

If you truly believe that your device has been stolen, there is also the nuclear option: remotely wiping the device via Find My Device.

Keep in mind, in order for these features to work, you absolutely have to enable them on your phone first. Otherwise, you’ll be out of luck if the device ever goes missing.

Act Fast
It is also important to remember that these features will only work as long as the phone is on. Sure, you could still check for its last known location in Find My Device, but there’s no guarantee that it will still be there.

Finally, if you truly believe that your device was stolen, contact the proper authorities and give them everything you know.

With any luck, you’ll be able to find your lost phone lickety-split. While you’re here, take a look at some of our other blogs, where you can find other handy tricks and useful information, courtesy of Graemouse Technologies.

Infected Applications Removed from Google Play Sto...
Your IT Wish List: How to Improve Your Business


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, January 21 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

BDR Infrastructure Managed IT Services Hosted Solutions Scam Automation eWaste Disaster Recovery Money Facebook Electronic Medical Records Downtime Router Wi-Fi BYOD Government Screen Mirroring Augmented Reality Access Control Business Management Collaboration VoIP Windows 10 Software Tips Tip of the Week Password Managing Stress Chrome Quick Tips Efficiency Outlook Information Practices Fraud Camera Machine Learning Malware Cloud Computing Ransomware Backup Voice over Internet Protocol Supercomputer App Managed IT Social Spam Blocking Computer Bring Your Own Device Redundancy Data Breach Managed Service Provider Twitter Software Encryption Privacy OneNote Productivity Managed IT Services Google Drive Communication Microchip Office 365 Two-factor Authentication Keyboard Email Blockchain Data loss Applications Internet of Things Best Practices WiFi Save Money Cybercrime Mobile Device CES NIST Gadgets Avoiding Downtime Smart Tech Miscellaneous User Tips Microsoft Mobile Devices Outsourced IT Data Protection Upgrade Business Intelligence Workers Social Media Company Culture Social Engineering Remote Worker Networking Cloud Data Backup Update Android Mobility FCC Leadership Data Storage VPN Hackers Hardware Botnet IT Plan Trending Employer-Employee Relationship Virtual Assistant Business Continuity Health Cybersecurity Phishing Alert Samsung Tech Term Comparison Data Security Audit HBO Telephony Security File Sharing Word Remote Monitoring IT Management Net Neutrality Google Docs Business Online Shopping Network Technology Servers Smart Office Human Resources Amazon Web Services Website Microsoft Office Public Cloud Identity Theft How To Bandwidth Training Document Management Remote Work Unsupported Software IT Services IT Support Digital Signature Spam Business Computing Connectivity Managed Service Telephone System Recycling Smartphones Server Network Security Internet Software as a Service Private Cloud Saving Money Telephone Systems Nanotechnology Settings Artificial Intelligence Windows Server 2008 Content Management Data Recovery Cortana Windows 10 Computers Holiday Office Workplace Tips Browser Sports Smartphone Passwords Hiring/Firing Windows 7 Innovation Shortcuts Law Enforcement Operating System Windows Password Management Smartwatch Communications Small Business Vulnerability Skype Paperless Office Mobile Device Management Search Engine Google Data Apps Virtualization Addiction

Newsletter Sign Up