facebook linkedin twitter

Computerware Blog

Tip of the Week: What to Do Before You Lose Your Phone

Tip of the Week: What to Do Before You Lose Your Phone

It isn’t like anyone actively means to lose their smartphone, but stuff happens. After all, many of us have our device in-hand for most of our waking hours, so there’s plenty of opportunities for it to be left behind somewhere. Fortunately, there are ways that you can set up your smartphone to help track it should it be lost, whether it’s an Apple device or on the Android platform.

Keep in mind, neither of these methods are enabled by default, so you’ll need to play in your device’s settings beforehand.

Keep Track of Your Android Device with Google Find My Device

Android users can download an application called Google Find My Device from the Google Play Store. Once the app is installed and accessed, it will prompt you to log in with your Google account. Make sure that the password to this account is sufficiently secure, and that you Allow Find My Device to access this device’s location when asked to do so.

Doing so will enable you to use Find My Device to track and manage your mobile device, if Wi-Fi and GPS are enabled, by signing into Google’s Find My Device website. As always, you should make sure that the password to your Google account is sufficiently secure to eliminate the chance of someone else logging in to track your location or wipe the data from your device.

Enabling Apple’s Find My iPhone

Built into Apple’s iCloud platform is the capability to track a lost iPhone, perfect for when you’ve accidentally set it down someplace and left it behind. While it might even be of some use in the case of a stolen iPhone, we recommend that you instead file a police report, rather than trying to track it down.

Furthermore, Find My iPhone can also allow you to delete all the data stored on the lost device. This will help protect you from identity theft, account breaches, and otherwise abusing your data. These features aren’t going to be enabled by default, so you need to activate it for it to work.

On your iPhone or iPad:

  • Open Settings.
  • Access the iCloud options.
  •  Switch the Find My iPhone/iPad slider to On.

If you’ve never set up the iCloud account on a particular device, you’ll be taken through the steps. We recommend that you use a strong and unique password for your iCloud account to minimize the possibility that your device is tracked, locked down, or wiped. Touch ID and Face ID are also recommended as authentication measures and can be activated during the device’s initial setup or in Settings, under Touch ID & Passcode.

Once you’ve done so, you’ll be able to log into your iCloud account to track your device, if your iPhone is turned on and Airplane mode isn’t activated.

Ideally, this is one feature that you’ll never need to take advantage of. However, considering the value of the data commonly stored on a mobile device (never mind the value of the device itself) it is better to be safe than sorry.

For more IT and cybersecurity best practices, make a habit of coming back to Computerware and our blog, or reach out to us directly at (703) 821-8200!

Tip of the Week: What to Do if Your Smartphone Goe...
Let’s Take a Look at a Few 2021 Business Trends
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, January 23, 2021

Captcha Image

By accepting you will be accessing a service provided by a third-party external to https://www.cwit.com/

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Business Computing Privacy Software Internet Cloud Data Hackers Business Management Workplace Tips Hardware Network Security Microsoft Productivity Backup Business Email Managed Service Provider Hosted Solutions Productivity IT Services Malware Saving Money Efficiency Innovation Google Small Business User Tips Collaboration Computer IT Support VoIP Data Backup Quick Tips Smartphones IT Support Network Data Recovery communications Mobile Devices Business Continuity Android Microsoft Office Disaster Recovery Gadgets Phishing Communication Smartphone Cybersecurity Social Media Upgrade Mobile Office Server Virtualization Mobile Device Miscellaneous Passwords Managed IT Services Mobile Device Management Windows Users Ransomware Holiday Operating System BDR Vendor Management Windows 10 Apps Outsourced IT Internet of Things Tech Term Unified Threat Management Facebook Remote Monitoring Automation BYOD Covid-19 Remote Computing Data Management Apple Mobile Computing WiFi Analytics Managed IT services Windows 10 Save Money History Artificial Intelligence Cloud Computing Marketing Spam Managed Service The Internet of Things Training Help Desk Browser Firewall Business Technology Alert App Big data Bandwidth Health Encryption Office Office 365 Information Technology Budget Two-factor Authentication IT Consultant VPN Networking Information Content Filtering Maintenance Wi-Fi Access Control Going Green Printer Managed IT Gmail Windows 7 Hard Drives Government Blockchain Bring Your Own Device Antivirus Cybercrime Retail Search Remote Work Cost Management Windows 8 Outlook Healthcare Lithium-ion Battery Best Practice Tech Support Virus Document Management Hiring/Firing Wireless Technology Recovery Saving Time Computers Employer-Employee Relationship Vendor Travel Education Avoiding Downtime Hacking Project Management Update iPhone Risk Management Computing Humor IBM Money Customer Service Data Security It Management Augmented Reality Conferencing Storage Patch Management Data Loss Phone System Legal Data Breach Twitter Mobility Intranet Value Regulations Password Hacker Meetings SaaS End of Support Remote Voice over Internet Protocol Law Enforcement Applications Save Time Router Downtime Customer Relationship Management Compliance Solid State Drive Data storage Wireless Flexibility PowerPoint Proactive IT Computer Repair Running Cable Website Laptop File Sharing Current Events Administration Hard Drive Word Google Maps Management Social Engineering Cortana Vulnerabilities Digital Paperless Office Sports Fax Server Websites Disaster Employees Net Neutrality Private Cloud Hosted Solution Robot Business Intelligence Software as a Service Chrome Excel Securty Digital Payment User Telephony Virtual Desktop Machine Learning Social Telephone Systems Comparison Tablet Black Market Company Culture DDoS Employee/Employer Relationship Cryptocurrency Social Networking Monitoring Business Growth Scam Cooperation Co-managed IT Monitors Network Congestion User Error Redundancy Cleaning Virtual Reality Office Tips Multi-factor Authentication Politics Processor eWaste Emails Evernote Telephone Automobile Chromebook YouTube Streaming Media Virtual Assistant Inbound Marketing Computing Infrastructure Hack Solutions Lifestyle Unified Communications Settings Start Menu Tech Terms Professional Services eCommerce Processors How To USB Download Mobile Technology Pain Points Integration Presentation Uninterrupted Power Supply Holidays IT service Smart Devices Microchip Taxes Distribution Specifications Safety Vulnerability Distributed Denial of Service Bitcoin Managed Services Provider Computer Accessories Data Protection Video Conferencing Display Bluetooth Documents Trending Teamwork Heating/Cooling Gaming Console Cost Entertainment Public Cloud Licensing How To Mouse Downloads Managed Services Identity Theft Webcam Google Docs Time Management Managed IT Service Text Messaging Memory Experience Statistics Notifications Programming Gig Economy Addiction Business Metrics Computer Malfunction Google Calendar Employer/Employee Relationships Remote Working Accountants A.I. Point of Contact Domains Reliable Computing Tip of the week Google Play Telephone Service email scam In Internet of Things VoIP Microsoft 365 Thin CLient CIO Public Speaking Touchscreen News Managing Costs 3D Ebay Advertising Flash Supply Chains Webinar Medical IT Smart Phones Trend Micro Staffing Google Wallet Electronic Health Records Migration Connected Devices Shortcut Consultation Browsers Windows XP Financial Data Wireless Headphones Knowledge Memes Smartwatch Network Management Recycling Entrepreneur Motion Sickness Technology Tips User Tip Proactive Maintenance Displays Equifax Fleet Tracking Analytic Troubleshooting Scalability Security Cameras Threats Society Audit Leadership Micrsooft Managing IT Services Device security MSP Product Reviews HIPAA Messenger Tracking Fake News Navigation Virtual Machine Adminstration Pirating Information 2FA Environment Drones Surveillance Desktop Finance Competition Rental Service Data Warehousing Data Analysis Telework Nanotechnology Social Network Read Electronic Payment IT Business Cards Service Level Agreement Web Server Access Printers SQL Server Remote Workers Startup Asset Tracking Business Owner Best Practives Cabling Emergency Hard Drive Disposal GDPR Managing Risk Administrator Computer Care Virtual Private Network Username IP Address Books Workers Microsoft Excel Tech Hypervisor Permissions Language Unified Threat Management Backup and Disaster Recovery Device Management Development Gamification Business Managemenet Application Microserver Supercomputer Google Drive Windows Server 2008 Fileless Malware Hybrid Cloud FinTech Screen Reader Customer Resource management Content Management Human Resources Piracy Upload Spyware Mobile Payment Proxy Server Azure Upselling switches Writing Data Storage Smart Tech Worker Modem Strategy Music online Currency Electricity Printing Electronic Medical Records Transportation Upgrades Procurement HTML Get More Done Reading Samsung Term Video Surveillance Fiber-Optic Reviews Database G Suite Recording Optimization Saving ZTime Mobile Security Digital Signature Turn Key Employer Employee Relationship Directions LiFi Organization Telephone System Printer Server Communitications Software License Trends LinkedIn Hacks Physical Security cache Television Dark Web Free Resource PCI DSS Multi-Factor Security Trojan SSID Organize Banking Botnet WannaCry Health IT Harddrive Deep Learning Supply Chain Management Devices Relocation Tablets Processing Debate Work/Life Balance Fraud Shopping Tactics Sync Corporate Profile Logistics Virtual Machines Internet Service Provider UTM Content Skype Freedom of Information Wasting Time GPS Visible Light Communication AI Archive PDF Cyber security IT Assessment IT Plan Enterprise Resource Planning Best Available Keyboard CCTV Assessment SharePoint Bookmark IT consulting Regulations Compliance Legislation Error External Harddrive CrashOverride Financial Capital CES Productuvuty Managing Stress Regulation Personal Information 3D Printing

toner1