Female Rep2


 "Real People, Real Solutions"

Have IT Questions?
Call us now (888) 894-6411

TWINTEL Solutions Blog

Tip of the Week: Locating a Misplaced Smartphone

Tip of the Week: Locating a Misplaced Smartphone

The great thing about smartphones, in a business sense, is how portable they are - you can literally be productive almost anywhere. Unfortunately, this also means that they can be lost almost anywhere. Luckily, there just so happens to be a feature built into Android that can help you find yours.

The Stakes Are High
A lost smartphone is something that needs to be taken seriously nowadays. Not only is it an expensive device to replace, its contents could be considered priceless. Anything you’ve accessed via that phone (potentially including your finances and social media) is then at risk. If this device was used for business purposes, your data could be at stake if your device was stolen - and, if you used it as a part of a two-factor authentication measure, there goes your access to your network.

Clearly, this wouldn’t be a good thing.

This is precisely why Android includes a feature to help you find a device, should it ever be lost.

On your Android device, you need to work proactively and enable a few settings.

In your Settings, you should be able to find a Find My Device option. Make sure this is turned on. Your Location should be set to High accuracy. Finally, you will want to enable Google to Use Location History. While this will diminish your privacy from the eyes of Google, it will make your phone that much easier to find.

To locate your device, you’ll then need to access the same Google account that is used on the device in question from a web browser. Google is able to give you a general idea of where the device was last located on a map, and even what Wi-Fi networks it is connected to. The Find My Device application can do the same thing if you have access to a second device.

Find My Device also allows you to remotely lock your device and display a message to help anyone who might find it get it back to you. Once you’re in the vicinity of your device, you can also command your device to ring. This command will override the volume settings, increasing the chances of it being heard.

If you truly believe that your device has been stolen, there is also the nuclear option: remotely wiping the device via Find My Device.

Keep in mind, in order for these features to work, you absolutely have to enable them on your phone first. Otherwise, you’ll be out of luck if the device ever goes missing.

Act Fast
It is also important to remember that these features will only work as long as the phone is on. Sure, you could still check for its last known location in Find My Device, but there’s no guarantee that it will still be there.

Finally, if you truly believe that your device was stolen, contact the proper authorities and give them everything you know.

With any luck, you’ll be able to find your lost phone lickety-split. While you’re here, take a look at some of our other blogs, where you can find other handy tricks and useful information, courtesy of TWINTEL Solutions.

Infected Applications Removed from Google Play Sto...
Your IT Wish List: How to Improve Your Business


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, January 22 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!


Our 10 Benefits

Our 10 Benefits Whitepaper

This whitepaper will evaluate the differences between traditional technical support practices and modern managed IT practices and the pros and cons of both in regards to small and medium-sized businesses.

Download Now!   Need A Consultation?

Tag Cloud

Security Tip of the Week Best Practices Technology Cloud Privacy Business Computing Hackers Network Security Backup Hosted Solutions Malware Mobile Devices Google VoIP Data Microsoft Disaster Recovery Business Business Continuity bgc communications Email roundup nonprofit Software Outsourced IT Managed IT Services Alert Innovation Internet Smartphones Hardware User Tips IT Services Data Backup Tech Term Windows 10 Managed IT Services Browser Server Computer Saving Money Data Recovery Smartphone Ransomware Android Cybercrime Efficiency Internet of Things Cloud Computing Small Business Business Management Productivity Workplace Tips Communication Network IT Support BDR Computers IT Support Save Money Office Productivity Miscellaneous Cybersecurity Windows Artificial Intelligence Quick Tips Passwords Mobile Device Management Holiday Telephone Systems Applications BYOD Router Chrome Managed IT Recovery Money Social Engineering Windows 10 Mobility Gadgets Wi-Fi Work/Life Balance Vulnerability Social Media Virtualization Automation Office 365 Collaboration Hacking Upgrade Law Enforcement Facebook Phishing Mobile Device Firewall Bandwidth Word Bring Your Own Device Two-factor Authentication App Health Password Microsoft Office Data Protection Remote Monitoring How To Google Drive Managed Service Provider Compliance VPN Information Budget Office Tips Flexibility Avoiding Downtime Proactive IT Private Cloud Keyboard Redundancy Sports Spam Settings Mobile Computing Scam Value Information Technology Voice over Internet Protocol Safety Software as a Service HaaS Data Security History Servers Black Market Connectivity Identity Theft Operating System Data Breach Apps Business Intelligence Remote Computing Managed Service Access Control Computer Care Data storage Entertainment Patch Management Battery Content Filtering Windows 7 Fraud OneNote Google Docs Blockchain Virtual Assistant Samsung Business Owner Telephony Emergency Unsupported Software Charger PDF Big Data Data Storage Website Government Human Resources Telephone System Computing Infrastructure Wireless Technology Solid State Drive Electronic Medical Records Document Management Marketing Infrastructure Paperless Office YouTube IT Management Worker Legal Hacker HIPAA Employer-Employee Relationship Save Time Unified Threat Management Spam Blocking Risk Management Machine Learning Comparison Physical Security IT Plan SaaS Update CES Hiring/Firing Automobile The Internet of Things Cleaning Encryption Training Workers Credit Cards End of Support USB WiFi Content Management Data Management User Error Public Cloud Gmail Networking Two Factor Authentication Worker Commute Outlook Vendor Millennials Video Games Sync Wireless Charging Wireless Cortana Wire IBM Data Warehousing Search Engine Lifestyle Downtime Accountants MSP Vendor Management Reputation Advertising Thought Leadership Mouse Assessment Troubleshooting Cast Touchpad Computer Accessories Conferencing Monitor Colocation Authentication NarrowBand Scalability Experience Mobile Hard Drives Recycling Enterprise Content Management IT Consultant Display Workforce Fiber-Optic Google Apps Smart Office Supercomputer Education Bing Robot File Sharing Regulations Amazon Customers Twitter Administrator Television CrashOverride Bluetooth Netflix Nanotechnology Camera Audit Professional Services Relocation eWaste Password Management Going Green Leadership Techology Frequently Asked Questions Security Cameras Telecommuting Skype Cables Transportation Current Events Software Tips Help Desk Files Practices Augmented Reality Amazon Web Services Addiction Public Computer Shadow IT Books Staff Regulation Smart Tech Printers Loyalty Computer Fan Instant Messaging Meetings Humor Criminal NIST Excel Botnet Remote Work Remote Worker Start Menu Unified Communications Password Manager Benefits Knowledge Users Shortcuts Hosted Computing Online Shopping Cache Hosted Solution Multi-Factor Security Apple Digital Signature Rootkit Best Practice Content Internet Exlporer Warranty FENG Search Data loss Cryptocurrency Tip of the week Smartwatch Inventory Wiring Windows 10s Politics Tools Theft Business Mangement HVAC Smart Technology Network Congestion Virtual Reality HBO Social Specifications Audiobook Flash Evernote Wireless Internet Microchip Trending iPhone Devices Chromecast Printer How to Screen Mirroring Safe Mode Laptop Employer Employee Relationship webinar Windows Server 2008 GDPR E-Commerce nonprofits Thank You Congratulations