DatCom Blog

Tip of the Week: Locating a Misplaced Smartphone

Tip of the Week: Locating a Misplaced Smartphone

The great thing about smartphones, in a business sense, is how portable they are - you can literally be productive almost anywhere. Unfortunately, this also means that they can be lost almost anywhere. Luckily, there just so happens to be a feature built into Android that can help you find yours.

The Stakes Are High
A lost smartphone is something that needs to be taken seriously nowadays. Not only is it an expensive device to replace, its contents could be considered priceless. Anything you’ve accessed via that phone (potentially including your finances and social media) is then at risk. If this device was used for business purposes, your data could be at stake if your device was stolen - and, if you used it as a part of a two-factor authentication measure, there goes your access to your network.

Clearly, this wouldn’t be a good thing.

This is precisely why Android includes a feature to help you find a device, should it ever be lost.

On your Android device, you need to work proactively and enable a few settings.

In your Settings, you should be able to find a Find My Device option. Make sure this is turned on. Your Location should be set to High accuracy. Finally, you will want to enable Google to Use Location History. While this will diminish your privacy from the eyes of Google, it will make your phone that much easier to find.

To locate your device, you’ll then need to access the same Google account that is used on the device in question from a web browser. Google is able to give you a general idea of where the device was last located on a map, and even what Wi-Fi networks it is connected to. The Find My Device application can do the same thing if you have access to a second device.

Find My Device also allows you to remotely lock your device and display a message to help anyone who might find it get it back to you. Once you’re in the vicinity of your device, you can also command your device to ring. This command will override the volume settings, increasing the chances of it being heard.

If you truly believe that your device has been stolen, there is also the nuclear option: remotely wiping the device via Find My Device.

Keep in mind, in order for these features to work, you absolutely have to enable them on your phone first. Otherwise, you’ll be out of luck if the device ever goes missing.

Act Fast
It is also important to remember that these features will only work as long as the phone is on. Sure, you could still check for its last known location in Find My Device, but there’s no guarantee that it will still be there.

Finally, if you truly believe that your device was stolen, contact the proper authorities and give them everything you know.

With any luck, you’ll be able to find your lost phone lickety-split. While you’re here, take a look at some of our other blogs, where you can find other handy tricks and useful information, courtesy of DatCom.

Infected Applications Removed from Google Play Sto...
Your IT Wish List: How to Improve Your Business


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, January 17 2019

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Cloud Business Computing Network Security Hackers User Tips Microsoft Google Hosted Solutions Tech Term Backup Malware Internet Business Software Data Backup Mobile Devices Hardware Innovation Data Email Smartphones Communications Business Continuity VoIP Android Small Business Smartphone Workplace Tips Data Recovery Computer IT Services Communication Disaster Recovery Managed IT Services Ransomware Cloud Computing Router Artificial Intelligence Cybersecurity Browser Law Enforcement Windows 10 Alert Chrome Outsourced IT Windows 10 Cybercrime Network Productivity How To Applications Computers Office 365 Business Management Internet of Things Efficiency Password IT Support Money Collaboration Windows Miscellaneous Server Gadgets Information Virtualization Mobile Device Word Holiday Saving Money Social Media BDR Productivity Spam Facebook Wi-Fi Passwords Managed IT Services Telephone Systems Keyboard Operating System Phishing Microsoft Office BYOD Voice over Internet Protocol Save Money Government App Connectivity Data Security Managed Service Flexibility Apps Two-factor Authentication Mobility Data Protection Vulnerability Quick Tips Avoiding Downtime Social Engineering Settings Office Mobile Device Management Work/Life Balance Website Public Cloud Servers Identity Theft Scam Networking Office Tips Infrastructure Remote Monitoring Paperless Office Encryption Entertainment Google Drive Human Resources Spam Blocking Upgrade Machine Learning VPN IT Plan Business Intelligence Virtual Assistant Remote Computing Managed IT Fraud Access Control Update Bring Your Own Device Botnet Automation Unsupported Software Telephone System Telephony CES Windows 7 Software as a Service Data Breach Health Sports Data Storage Content Management Data Management Google Docs Private Cloud Legal Bandwidth End of Support OneNote Employer-Employee Relationship IT Management HaaS Comparison Blockchain Redundancy Recovery eWaste Social Excel Best Practice Hosted Computing Remote Worker Internet exploMicrosoft Search Engine Physical Security History FCC Big Data Tools Instant Messaging Cache Warranty IT Support Specifications Value Wireless Safe Mode Computer Fan Sync Evernote Electronic Medical Records Data loss Criminal Experience Charger Users Hybrid Cloud HVAC Vendor Tip of the week Credit Cards Inventory IBM Wiring Knowledge Password Manager HIPAA Bing Netflix Virtual Reality Title II Downtime Wireless Internet Printer webinar Staff The Internet of Things Wireless Charging Network Congestion Screen Mirroring Cleaning Information Technology Enterprise Content Management Display Windows 10s Windows Server 2008 Hacking Supercomputer Devices Unified Threat Management Business Mangement Budget YouTube Help Desk HBO Worker Commute Online Accountants MSP Root Cause Analysis Hiring/Firing Wire Mouse Conferencing Battery Millennials FENG Scalability Cortana Mobile Computing IT Consultant Cast Black Market Multi-Factor Security Music Computer Care Password Management Security Cameras Automobile Amazon Authentication Thought Leadership Search WiFi Gmail Advertising Company Culture Outlook Telecommuting File Sharing Risk Management Internet Exlporer Administrator Emails Software Tips Education Workforce Digital Signature Firewall Skype Content Travel Google Apps Camera Leadership Trending Wearable Technology NIST Hacker Solid State Drive Flash Amazon Web Services Nanotechnology Apple How to Recycling Training Managing Stress Shortcuts Frequently Asked Questions Document Management Remote Work Practices Patch Management Augmented Reality Meetings Workers Politics Smart Office Microchip Computing Infrastructure Net Neutrality PDF Start Menu Audiobook iPhone Techology Addiction USB Samsung Marketing Cryptocurrency Audit Video Games Online Shopping Smart Tech Current Events Vendor Management Save Time Safety Bluetooth IT solutions Television CrashOverride Managed Service Provider Troubleshooting Shadow IT Transportation Books Public Computer Loyalty Wireless Technology Benefits Worker Hosted Solution SaaS Smart Technology Rootkit Business Owner Emergency Employer Employee Relationship Compliance Twitter Two Factor Authentication Computer Accessories Webinar Content Filtering Assessment Regulation Printers Smartwatch