window._mfq = window._mfq || []; (function() { var mf = document.createElement("script"); mf.type = "text/javascript"; mf.async = true; mf.src = "//cdn.mouseflow.com/projects/0148bb62-7ff8-46ae-a466-bf3fd13c7d09.js"; document.getElementsByTagName("head")[0].appendChild(mf); })();
407-478-6600    Get SUPPORT

TaylorWorks Blog

Tip of the Week: Locating a Misplaced Smartphone

Tip of the Week: Locating a Misplaced Smartphone

The great thing about smartphones, in a business sense, is how portable they are - you can literally be productive almost anywhere. Unfortunately, this also means that they can be lost almost anywhere. Luckily, there just so happens to be a feature built into Android that can help you find yours.

The Stakes Are High
A lost smartphone is something that needs to be taken seriously nowadays. Not only is it an expensive device to replace, its contents could be considered priceless. Anything you’ve accessed via that phone (potentially including your finances and social media) is then at risk. If this device was used for business purposes, your data could be at stake if your device was stolen - and, if you used it as a part of a two-factor authentication measure, there goes your access to your network.

Clearly, this wouldn’t be a good thing.

This is precisely why Android includes a feature to help you find a device, should it ever be lost.

Auto-Location
On your Android device, you need to work proactively and enable a few settings.

In your Settings, you should be able to find a Find My Device option. Make sure this is turned on. Your Location should be set to High accuracy. Finally, you will want to enable Google to Use Location History. While this will diminish your privacy from the eyes of Google, it will make your phone that much easier to find.

To locate your device, you’ll then need to access the same Google account that is used on the device in question from a web browser. Google is able to give you a general idea of where the device was last located on a map, and even what Wi-Fi networks it is connected to. The Find My Device application can do the same thing if you have access to a second device.

Find My Device also allows you to remotely lock your device and display a message to help anyone who might find it get it back to you. Once you’re in the vicinity of your device, you can also command your device to ring. This command will override the volume settings, increasing the chances of it being heard.

If you truly believe that your device has been stolen, there is also the nuclear option: remotely wiping the device via Find My Device.

Keep in mind, in order for these features to work, you absolutely have to enable them on your phone first. Otherwise, you’ll be out of luck if the device ever goes missing.

Act Fast
It is also important to remember that these features will only work as long as the phone is on. Sure, you could still check for its last known location in Find My Device, but there’s no guarantee that it will still be there.

Finally, if you truly believe that your device was stolen, contact the proper authorities and give them everything you know.

With any luck, you’ll be able to find your lost phone lickety-split. While you’re here, take a look at some of our other blogs, where you can find other handy tricks and useful information, courtesy of TaylorWorks.

Protecting Your Business by Understanding IoT Secu...
The Good, Bad, and Ugly of the Internet
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, January 16 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Network Security Cloud Best Practices Business Computing Managed IT Services Data Backup Privacy Hackers Hosted Solutions Malware Data Recovery Mobile Devices VoIP Email Data Google Outsourced IT Innovation User Tips Tech Term Internet Microsoft Backup Hardware Internet of Things Cloud Computing Business Continuity Saving Money Communications Business IT Services Software BDR Efficiency Cybersecurity Ransomware Communication Productivity Router Artificial Intelligence Smartphones Managed IT Services Small Business Smartphone IT Support Cybercrime Android Workplace Tips Disaster Recovery IT Support Windows 10 Applications Chrome Network Browser Business Management Computer Phishing How To Gadgets Law Enforcement Managed IT Office 365 Save Money BYOD Computers Word Blockchain Access Control Business Intelligence Spam Mobile Device Management Avoiding Downtime Two-factor Authentication Data Security Holiday Virtualization Mobility Collaboration Information Data Protection Mobile Device Server Windows Money Identity Theft Automation Miscellaneous Upgrade Social Engineering Servers Social Media Bandwidth Analysis Proactive IT Telephone Systems Wi-Fi Remote Monitoring App Facebook IT Management Vulnerability Redundancy Passwords Document Management Settings Apps Training Connectivity Voice over Internet Protocol Productivity Software as a Service Compliance Encryption Machine Learning Managed Service Firewall Alert Data Storage Website Spam Blocking Scam Paperless Office Virtual Assistant Update Smart Tech Value Operating System Credit Cards Botnet Human Resources Telephone System Employer-Employee Relationship Fraud Networking Data loss Google Drive VPN Unified Threat Management Business Owner Infrastructure Education Workers Bring Your Own Device Mobile Computing Flexibility Google Docs Solid State Drive Keyboard Information Technology Password OneNote Private Cloud CES Sports IT Plan File Sharing Work/Life Balance Hacker Microsoft Office Windows 7 Budget Data Breach Comparison Content Management Unsupported Software Big Data Telephony Addiction Shortcuts Network Congestion Government IoT Password Management Wiring Samsung Regulations Users Gmail Downtime Root Cause Analysis Managed Service Provider Strategy YouTube Proactive Charger Virtual Reality Frequently Asked Questions Specifications Theft Thought Leadership Microchip End of Support Black Market Content Filtering Software Tips Trending Project Management Computer Fan Skype Evernote Recycling Cache eCommerce Electronic Medical Records Instant Messaging IT Consultant NIST GDPR Hacking HIPAA Meetings Wireless PDF Remote Monitoring and Maintenance Worker Commute Excel Millennials Health Google Apps Office Tips Streaming Media Start Menu Wireless Charging Students Battery Physical Security Lifestyle Windows 10 Technology Tips Authentication Warranty Legal Entertainment FENG eWaste HaaS Wireless Internet Social Leadership USB Data Warehousing WiFi Insurance Cryptocurrency E-Commerce Windows 10s Flash Remote Computing Travel Line of Business Netflix Tip of the week Workforce Content Filter Search Engine Mobile Staff Healthcare Fiber-Optic Nanotechnology Printer Criminal Wire Vendor Recovery Augmented Reality Practices Safe Mode Camera SaaS Data Management Amazon Current Events Screen Mirroring Wireless Technology Hard Drives Accountants HVAC MSP Cleaning Windows Server 2008 Telecommuting Password Manager Storage Bing Professional Services Digital Signature Electronic Health Records HBO Cables Mouse Computing Infrastructure Display webinar The Internet of Things Hosted Computing Audit Sync Marketing Amazon Web Services Help Desk Knowledge Cast Enterprise Content Management Remote Worker Computer Care Save Time Remote Work Business Mangement Risk Management Tools Public Cloud Emails Patch Management Outlook Unified Communications Devices Administrator Smart Office Business Technology Security Cameras Conferencing Multi-Factor Security Cortana Inventory Virtual Private Network Online Shopping Music User Error Politics Hybrid Cloud Webinar Customer Service Mobile Office Employee/Employer Relationship Television Audiobook Wearable Technology Domains Hiring/Firing Video Games Company Culture IT solutions Transportation Utility Computing Fun Internet exploMicrosoft Smartwatch Worker Books Quick Tips Public Computer How to Public Speaking Loyalty Automobile Presentation Managing Stress Benefits Files Lithium-ion battery Advertising Regulation Rootkit Office Best Practice Colocation Employer Employee Relationship Troubleshooting Scalability 5G Smart Technology Tech Support History Safety Search Emergency IBM Relocation Computer Accessories Shadow IT Hosted Solution Printers Two Factor Authentication Experience Techology Twitter CrashOverride Competition Vendor Management Customer Relationship Management Humor Internet Exlporer Bluetooth Assessment Content IP Address

Mobile? Grab this Article!

QR-Code dieser Seite