Direct Technology Group Blog

Direct Technology Group provides professional IT Support and Network Services for Businesses around Deerfield Beach. Computer Services, Tech Support, IT Solutions and more!

Tip of the Week: What to Do Before You Lose Your Mobile Device

Tip of the Week: What to Do Before You Lose Your Mobile Device

It isn’t as though anyone wants to lose their smartphone—for some, the very thought is almost debilitating. However, accidents can happen, so before one does, it only makes sense to put yourself in the best position to deal with a lost mobile device. The process for doing so will differ based on whether your device operates on Android or iOS.

Use Google’s Find My Device App to Find an Android Device

Android devices offer a feature that is meant to simplify the process of locating a lost device, called Google Find My Device, that you should set up if you have not yet done so already. You’ll need to install it from the Google Play Store.

Once opened, the app will ask you to log into your Google account. As always, we recommend that you use a strong and unique password to protect it. When prompted, you will want to Allow Find My Device to access this device’s location.

Using Apple’s Find My iPhone to Locate Your Device

Losing your Apple device is no laughing matter, but if you’ve enabled Find My iPhone on your device, you’ll be far better off if it ever does happen.

Find My iPhone is a built-in service that comes as a part of iCloud. As you would expect, it serves to provide a means of tracking your device if you should lose it—like if you drop it on public transit or forget to pick it up after you finish your lunch at your favorite spot. It even has some use if your iPhone was to be stolen, strictly as a means of validating any reports of a stolen phone. (Please don’t try to steal your device back.)

Find My iPhone also allows you to remotely wipe the device. As a result, it can help protect you from identity theft, data breach, and other cybercrimes. Of course, these features are not initially activated… that part is on you.

On your iPhone or iPad:

  • Open Settings.
  • Access iCloud.
  • Locate the Find My iPhone/Find My iPad slider and make sure it is switched On.

If you have yet to set up an iCloud account on your device, you’ll be walked through the steps. We want to remind you of the importance of password best practices as you do so, to prevent someone else from locking, wiping, or tracking your location.

If you should lose your device, you can then track it via the iCloud website (so long as the device is powered on and not in Airplane mode).

We recommend that you also set up either Touch ID or Face ID and check the security of your passwords. If you didn’t set these up initially, you can find them in Settings under Touch ID & Passcode.

With any luck, you’ll never need to use these features. However, given the price of a smartphone (and of course, the value of the data typically stored on them), this offers good insurance against an issue.

To learn more IT best practices concerning your security and beyond, subscribe to our blog and reach out to us directly at 954-739-4700.

Solid State is a Solid Choice for Your PC’s Main H...
Considering the Status of Net Neutrality in 2021
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 11 April 2021

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Privacy Productivity Efficiency Cloud Google Data Hackers Network Security Microsoft Software Malware Workplace Tips Communication User Tips Hardware Innovation Business Smartphones Miscellaneous Backup Email Internet IT Support Mobile Devices Hosted Solutions Small Business Android Collaboration communications Computer Users Mobile Device Smartphone Business Management Ransomware Network Cybersecurity VoIP Productivity Windows Social Media Upgrade Managed IT Services Outsourced IT Passwords Browser Windows 10 IT Services Managed Service Tech Term Microsoft Office Holiday Save Money Gadgets Remote Cloud Computing Automation Covid-19 Disaster Recovery Windows 10 Bandwidth Quick Tips Apps Business Continuity Employer-Employee Relationship Data Backup Saving Money Facebook Phishing Internet of Things Office Managed IT Services Marketing Chrome Data Recovery Information Wireless Mobile Device Management Apple Networking Health Gmail Wi-Fi Server IT Support Password Analytics Applications Router Alert Office 365 Computers Managed Service Provider App WiFi Access Control Office Tips Hacking Virtualization Remote Computing Cybercrime Settings Government Patch Management VPN Business Intelligence Mobility Retail Data Breach Remote Monitoring Going Green BYOD Application Recovery Twitter Excel Laptop Physical Security Remote Work Website Blockchain Compliance Operating System Data Management Law Enforcement BDR iPhone Battery Mouse Value VoIP Bring Your Own Device Entertainment Managed IT Service Big Data Environment HIPAA Google Drive Virus Maintenance Workers Safety Employee-Employer Relationship Net Neutrality Social Engineering Paperless Office Lithium-ion battery Information Technology Politics Conferencing Printer Spam Word Mobile Office Human Resources Telephone Systems Humor Voice over Internet Protocol Mobile Computing Biometrics Artificial Intelligence End of Support History Customer Relationship Management Remote Workers Current Events Shadow IT Risk Management Search Business Technology Customer Service Internet Exlporer Payment Cards Hosted Solution Vulnerability Fax Server Education Cortana Streaming Media Free Resource The Internet of Things Telephony SharePoint Windows 7 Two-factor Authentication Encryption Images 101 Training Remote Monitoring and Management Vendor RAM Hybrid Cloud eWaste PowerPoint Social Network Telephone System Sports User Error Cost Management Processor Best Practice Virtual Reality Healthcare Wireless Charging Company Culture Dark Web Shortcut Tablet Tip of the week Data Security G Suite Employees YouTube Scam Content Filtering Smart Technology Virtual Assistant Medical IT Data Protection Printer Server Connectivity Cleaning How To Managing Stress Meetings Files Tech Terms DDoS Robot IT solutions Batteries Hard Drives Data storage Tech Support Video Network Attached Storage Storage User Security Chromecast Distributed Denial of Service Budget Gifts Access Bitcoin SSD Memory Wireless Internet Millennials Monitor Trends Internet exploMicrosoft Amazon Licensing Phone System Co-Managed IT Vulnerabilities Processors Antivirus OneNote Server Management Techology Error User Gadget Customer relationships Printers Inventory Help Desk Reputation A.I. Advertising Plug-In Travel Programming Memes Google Maps Cryptocurrency Spyware Management Windows Server 2008 R2 Machine Learning HaaS Touchscreen Database Threats Mobile Security File Management Spotify Certification Customer Movies Private Cloud Proactive IT Live Streaming IT HP Remote Working Personal Information Taskbar Telecommute Flexibility Microsoft Office 365 Sales Bluetooth Tactics Scams e-waste Analyitcs Managed Services Provider Cabling Voice over IP Unified Communications Multi-Factor Security Public Cloud WhatsApp Hosted Desktop Botnet Time Management Document Management SaaS National Security Data loss Hacker Legal Authentication Knowledge USB Touchpad Internet Explorer Notifications Broadband Project Management Security Cameras eCommerce Analysis News Firewall Managed IT Chrome OS Digital PCI DSS Updates Staff Science Authorization Comparison Threat Copy internet consultant Insurance Windows XP Wearables Online Shopping Relocation Microsoft Teams PDF Consultant Computer Accessories Profiles Edge Regulations Compliance Websites Windows 8 Video Games Troubleshooting Specifications Printing Paste Software as a Service Distribution Best Available Cameras Wearable Technology Social Computer Repair Electronic Health Records Innovations Display Dongle Update Black Market Paper People Bloatware Fleet Management Webcam Lead Generation IT budget Reporting Remote Support Hiring/Firing Running Cable IT Service Tip of the Week/Security Worker Benchmarks Alerts Outlook Ink Remote Control Uninterrupted Power Supply Cables WIndows 7 Unified Threat Management Entrepreneur Multi-Factor Authentication E-Commerce Solid State Drive IT Management NarrowBand Staffing Social Networking Mobile Windows Media Player Reviews Recycling Technology Tips Tablets Work/Life Balance Profitability User Tip Downtime Spam Blocking Holidays Avoiding Downtime Payment WannaCry Automobile Hard Disk Drive GDPR File Sharing Wireless Technology disposal Gig Economy Backup and Disaster Recovery Eliminating Downtime Telecommuting Downloads Email Management Virtual Private Network instant Messaging Hard Drive

Mobile? Grab this Article!

QR-Code dieser Seite