facebook linkedin twitter

Computerware Blog

Tip of the Week: How to Remotely Wipe Data From Your Android Device

b2ap3_thumbnail_data_wipe_from_android_400.jpgJust for one second, try to imagine your life without your personal mobile device. Mobile devices has pervaded our very existence, and they are integral tools for connecting to your business’s network. But even with this colossal amount of data on the device, some people still manage to lose them. What would happen if your smartphone fell into the hands of one of your competitors, or even a hacker?

That’s right; your information could very well be compromised and taken advantage of. What would be the first place a hacker would go to with your device? Would they take over your Facebook account and ruin your reputation, or would they criminalize your company by looking up illicit activities and material? What about your contact lists and client data? Whatever the hackers have planned for your smartphone, you can bet that it’ll be something nasty, and you don’t want any part in it. Therefore, the best course of action is to prevent it from happening in the first place.

Presenting… the Android Device Manager
One of the often-forgotten features of the Android operating system is the Android Device Manager. The Android Device Manager is similar to the iCloud, allowing you to locate your lost device or erase information from it. While deleting everything on your phone can be traumatic, it sure beats the other possibilities (i.e. your business collapsing, or worse).

The Android Device Manager allows its owner to wipe their Android device clean with a few easy steps. To access this great feature, choose Google Settings:

1 google settings

This feature can be found under the section of your Android device know as All Apps. Once you’ve clicked on Google Settings, notice the option to access the Android Device Manager.

2 android device manager

Keep in mind, if you sync your apps and data through Google, restoring them onto your new smartphone is a possibility. Reach out to us if you want help setting that up.

Arm the Device for the Remote Erasure
Upon entering the Android Device Manager, you’ll notice that the option Remotely locate this device is already set. This setting lets you locate the device wherever it is, but it also gives you the option to erase any information on it and reset it to the factory default. This can be infinitely useful if you have lost your device and think someone may have stolen it for nefarious use. To set your device for mobile wiping, select Allow remote lock and erase:

3 allow remote lock

Afterward, your device will prompt you to grant permissions to the Android Device Manager.

4 activate device administrator

This activates the device manager. Now, you have to sign into your Gmail account from your web browser.

Squeaky Clean
To quickly access the Android Device Manager on your PC, click on this link. If you haven’t accessed the manager yet, you’ll need to accept the agreement. Afterward, you’re all set. Just select your device from the list available and you can remotely command the device to lock up and erase all information on it. Your device will be wiped and it’ll be reset to the default factory settings.

Be careful with this feature, though, for once you press Erase, the action cannot be stopped. Even if the device is turned off, the process will begin as soon as it turns on.

It’s important to be able to wipe your device when necessary, especially if you’re in a tight spot and have misplaced it. By setting your device in preparation for remote wiping, you are taking important steps toward protecting your business’s future. What are some of the hairier situations losing a mobile device has brought for you? Let us know in the comments.

Are Ghosts Haunting the Halls of Your Servers?
Objection: Data Backup is Not the Same As Disaster...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, May 27, 2020

Captcha Image

By accepting you will be accessing a service provided by a third-party external to https://www.cwit.com/

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Business Computing Internet Cloud Software Business Management Data Hackers Hardware Microsoft Network Security Workplace Tips Backup Managed Service Provider Hosted Solutions Business Productivity Email Productivity Malware IT Services Saving Money Efficiency Google Computer User Tips Small Business Innovation IT Support Data Backup Collaboration VoIP IT Support Smartphones Quick Tips Mobile Devices Network Business Continuity communications Microsoft Office Gadgets Android Data Recovery Social Media Upgrade Cybersecurity Disaster Recovery Communication Mobile Office Server Smartphone Virtualization Mobile Device Management Miscellaneous Phishing Vendor Management Holiday Ransomware Windows 10 Passwords Windows Tech Term Outsourced IT Operating System Unified Threat Management Remote Monitoring Apps Mobile Device Facebook Internet of Things Users Managed IT Services BDR Automation Managed IT services Apple Mobile Computing Data Management Analytics BYOD Remote Computing Windows 10 WiFi Cloud Computing The Internet of Things Marketing History Artificial Intelligence Save Money Firewall Training Browser App Encryption Big data Help Desk Alert IT Consultant Information Technology Spam Business Technology Office 365 Two-factor Authentication Bandwidth Office Health Cybercrime Content Filtering Access Control Going Green Windows 7 Hard Drives Budget Bring Your Own Device Maintenance Antivirus Printer Gmail Government Managed IT Employer-Employee Relationship Retail Healthcare Best Practice Lithium-ion Battery Cost Management Outlook Windows 8 Hiring/Firing Managed Service Wireless Technology Saving Time Computers Search VPN Virus Tech Support Information Recovery Update Phone System iPhone Networking Hacking IBM It Management Money Document Management Augmented Reality Blockchain Computing Data Loss Humor Customer Service Travel Education Project Management Flexibility Risk Management Current Events Value Password Legal Save Time Covid-19 Hacker Downtime Customer Relationship Management Regulations Data Security Applications PowerPoint Patch Management Proactive IT Conferencing SaaS Computer Repair Running Cable File Sharing Administration Wireless Law Enforcement Data Breach Hard Drive Intranet Twitter Compliance Mobility Storage Website Solid State Drive Data storage Avoiding Downtime Black Market Word Vulnerabilities Cryptocurrency Cooperation Laptop Software as a Service Net Neutrality Meetings Business Growth Vendor Business Intelligence Remote Work Private Cloud Cortana Wi-Fi Excel Digital Payment Telephony Router Machine Learning Paperless Office Fax Server Telephone Systems Comparison Tablet Sports Company Culture Disaster User Hosted Solution Virtual Desktop End of Support Scam Social Networking Social Voice over Internet Protocol Robot Securty Monitoring Google Maps DDoS Digital Websites Social Engineering Management Managed Services Chromebook Telephone Employee/Employer Relationship Start Menu Tech Terms Mobile Technology Computing Infrastructure Hack Managed IT Service How To eWaste Google Docs Pain Points Memory Experience Chrome User Error Download Uninterrupted Power Supply Co-managed IT Cleaning Monitors Vulnerability Processor Office Tips Bitcoin Processors Computer Accessories Microchip Taxes Data Protection Lifestyle Distributed Denial of Service USB Distribution YouTube Professional Services Trending Presentation Gaming Console Unified Communications Settings Downloads Mouse Public Cloud Licensing Webcam Integration Specifications Safety Text Messaging Programming Identity Theft Redundancy Statistics Smart Devices Documents IT service Network Congestion Managed Services Provider Evernote Teamwork Heating/Cooling Entertainment Virtual Reality Virtual Assistant Politics Automobile Multi-factor Authentication Inbound Marketing Emails Bluetooth Streaming Media Pirating Information Processing Data Warehousing Motion Sickness Wireless Headphones Best Available Keyboard Leadership Health IT Product Reviews Organize Internet Service Provider Scalability Migration Connected Devices Adminstration Work/Life Balance Read Equifax Fleet Tracking Logistics Virtual Machines Deep Learning Emergency Hard Drive Disposal IT Assessment Messenger Tracking Network Management Domains Wasting Time Access Device security MSP Cyber security Microsoft Excel Rental Service Public Speaking Bookmark Visible Light Communication Computer Care Remote Working Google Play Telephone Service Google Drive Device Management Windows Server 2008 Web Server Nanotechnology Social Network Shortcut Employer/Employee Relationships IT consulting Desktop Cabling Finance Spyware Mobile Payment Content Management Administrator Startup Asset Tracking Entrepreneur Microsoft 365 Business Managemenet Webinar Electronic Health Records Books Business Cards Workers Service Level Agreement Troubleshooting Managing Costs Username Environment Medical IT CIO Trend Micro Memes Unified Threat Management Supercomputer Backup and Disaster Recovery HIPAA Upselling Browsers Advertising Electricity Flash Printing Video Surveillance Security Cameras Staffing Threats Google Wallet online Currency Screen Reader Customer Resource management Competition User Tip Proactive Maintenance Windows XP Managing IT Services Worker Gamification Electronic Payment Virtual Machine Society cache Television Smart Tech Saving ZTime Solutions Displays Surveillance Reading Piracy Samsung Upload Business Owner Navigation Remote Workers G Suite HTML eCommerce Micrsooft LinkedIn IT Fiber-Optic Employer Employee Relationship Database IP Address Data Analysis Employees WannaCry Human Resources Debate GDPR Managing Risk Drones Time Management Freedom of Information Best Practives Hacks Physical Security Telephone System Application Harddrive SQL Server Corporate Profile Virtual Private Network Mobile Security Tech Hypervisor Assessment SharePoint Archive Banking Botnet Multi-Factor Security Cost Skype Development Relocation Software License Tablets Trends GPS Microserver Sync Devices External Harddrive Holidays Tip of the week Fraud Tactics Fileless Malware Hybrid Cloud Permissions Language Google Calendar Content Modem Strategy Touchscreen News Notifications CCTV Digital Signature Proxy Server Azure VoIP Point of Contact Procurement UTM Term Music Consultation Get More Done Business Metrics Computer Malfunction Legislation Error Thin CLient Electronic Medical Records Transportation switches Writing Knowledge Video Conferencing Reliable Computing IT Plan Enterprise Resource Planning 3D Ebay Turn Key In Internet of Things Accountants A.I. Smart Phones Recording Optimization Upgrades Printer Server Communitications email scam Addiction Directions Display Technology Tips PDF SSID How To Recycling Fake News Trojan Dark Web Free Resource LiFi Audit Analytic Supply Chain Management Personal Information Productuvuty 3D Printing Financial Printers Managing Stress Regulation CrashOverride Capital

toner1