DatCom Blog

Tip of the Week: Locating a Misplaced Smartphone

Tip of the Week: Locating a Misplaced Smartphone

The great thing about smartphones, in a business sense, is how portable they are - you can literally be productive almost anywhere. Unfortunately, this also means that they can be lost almost anywhere. Luckily, there just so happens to be a feature built into Android that can help you find yours.

The Stakes Are High
A lost smartphone is something that needs to be taken seriously nowadays. Not only is it an expensive device to replace, its contents could be considered priceless. Anything you’ve accessed via that phone (potentially including your finances and social media) is then at risk. If this device was used for business purposes, your data could be at stake if your device was stolen - and, if you used it as a part of a two-factor authentication measure, there goes your access to your network.

Clearly, this wouldn’t be a good thing.

This is precisely why Android includes a feature to help you find a device, should it ever be lost.

On your Android device, you need to work proactively and enable a few settings.

In your Settings, you should be able to find a Find My Device option. Make sure this is turned on. Your Location should be set to High accuracy. Finally, you will want to enable Google to Use Location History. While this will diminish your privacy from the eyes of Google, it will make your phone that much easier to find.

To locate your device, you’ll then need to access the same Google account that is used on the device in question from a web browser. Google is able to give you a general idea of where the device was last located on a map, and even what Wi-Fi networks it is connected to. The Find My Device application can do the same thing if you have access to a second device.

Find My Device also allows you to remotely lock your device and display a message to help anyone who might find it get it back to you. Once you’re in the vicinity of your device, you can also command your device to ring. This command will override the volume settings, increasing the chances of it being heard.

If you truly believe that your device has been stolen, there is also the nuclear option: remotely wiping the device via Find My Device.

Keep in mind, in order for these features to work, you absolutely have to enable them on your phone first. Otherwise, you’ll be out of luck if the device ever goes missing.

Act Fast
It is also important to remember that these features will only work as long as the phone is on. Sure, you could still check for its last known location in Find My Device, but there’s no guarantee that it will still be there.

Finally, if you truly believe that your device was stolen, contact the proper authorities and give them everything you know.

With any luck, you’ll be able to find your lost phone lickety-split. While you’re here, take a look at some of our other blogs, where you can find other handy tricks and useful information, courtesy of DatCom.

Infected Applications Removed from Google Play Sto...
Your IT Wish List: How to Improve Your Business


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, March 27 2019

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Cloud Business Computing Network Security Hosted Solutions User Tips Google Hackers Microsoft Productivity Malware Internet Software Tech Term Backup Workplace Tips Hardware Business Email Innovation Mobile Devices Communications Data Data Backup Smartphones Android VoIP Cloud Computing Data Recovery Business Continuity Efficiency IT Services Small Business Smartphone Managed IT Services Windows 10 Disaster Recovery Cybersecurity Ransomware Computer Network Communication Router IT Support Outsourced IT Windows Cybercrime Artificial Intelligence Law Enforcement Windows 10 Browser Business Management Internet of Things Chrome Server Alert Gadgets Computers Miscellaneous Password Applications How To Mobile Device Office 365 Money Collaboration Operating System Telephone Systems Spam Wi-Fi Managed IT Services Saving Money Social Media Information Quick Tips Productivity Virtualization Phishing Facebook Passwords Holiday Word BDR Mobility Social Engineering Vulnerability Government App Avoiding Downtime Keyboard Paperless Office Settings Encryption Mobile Device Management Work/Life Balance Connectivity Voice over Internet Protocol Managed Service Microsoft Office Health Save Money Two-factor Authentication BYOD Flexibility Apps Private Cloud Data Security Office Data Protection Sports Public Cloud Office Tips Botnet Unsupported Software Telephony Content Management Augmented Reality Bandwidth Google Docs Windows 7 Net Neutrality Data Management Cryptocurrency Comparison Blockchain Data Storage Identity Theft Legal Servers Scam Networking Website Infrastructure Remote Monitoring Meetings HaaS OneNote Human Resources Employer-Employee Relationship Automation IT Management Redundancy VPN Machine Learning Upgrade Entertainment Virtual Assistant Business Intelligence Google Drive Fraud Access Control Bring Your Own Device Spam Blocking Update Remote Computing Telephone System Managed IT End of Support IT Plan CES Software as a Service Data Breach Battery Firewall Administrator Travel HBO Google Apps Scalability Risk Management Proactive IT Root Cause Analysis Workforce Digital Signature Black Market Wearable Technology Camera Conferencing Internet exploMicrosoft Amazon Web Services Nanotechnology Biometric Security Automobile NIST Hacker FENG Trending Training IT Consultant Cast Remote Work Practices Managing Stress Patch Management Shortcuts Wireless Recycling Search Education Smart Office Microchip Users Hybrid Cloud Outlook Workers Content Politics ISP PDF Addiction USB Samsung Emails Software Tips Online Shopping Smart Tech Smartwatch Current Events Skype Remote Worker Leadership Hosted Computing Document Management Social Solid State Drive Flash eWaste How to Computing Infrastructure Big Data Search Engine Information Technology Frequently Asked Questions Audiobook Cryptomining FCC Cache Warranty Value Evernote Video Games Safe Mode Electronic Medical Records Employee Specifications Start Menu Experience Wiring Charger Credit Cards Inventory Best Practice Save Time HVAC Vendor IBM Audit Criminal Recovery History Bing Excel Password Manager Instant Messaging HIPAA Database Title II IT Support Wireless Internet Printer Advertising Physical Security Wireless Charging Digital Signage Tools Staff Devices Unified Threat Management Cleaning Internet Exlporer Enterprise Content Management Display Supercomputer Computer Fan Sync Knowledge Apple Data loss Online Accountants Virtual Reality YouTube Help Desk Tip of the week Business Mangement Budget MSP Business Technology Wire Mouse Netflix Cortana Hiring/Firing Google Search Downtime Millennials Thought Leadership Music Mobile Computing Computer Care webinar Amazon Authentication Hacking Password Management Security Cameras The Internet of Things Multi-Factor Security Network Congestion iPhone Screen Mirroring Telecommuting Techology Worker Commute Company Culture Marketing Windows 10s WiFi Windows Server 2008 Gmail File Sharing Compliance Employer Employee Relationship Safety Twitter Two Factor Authentication Managed Service Provider Business Owner Content Filtering Assessment Regulation Computer Accessories Printers Vendor Management Television Bluetooth Troubleshooting Webinar Transportation Books Public Computer Loyalty IT solutions CrashOverride Benefits Shadow IT Worker Hosted Solution SaaS Wireless Technology Smart Technology Emergency Rootkit