Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: What to Do Before You Lose Your Phone

Tip of the Week: What to Do Before You Lose Your Phone

It isn’t like anyone actively means to lose their smartphone, but stuff happens. After all, many of us have our device in-hand for most of our waking hours, so there’s plenty of opportunities for it to be left behind somewhere. Fortunately, there are ways that you can set up your smartphone to help track it should it be lost, whether it’s an Apple device or on the Android platform.

Keep in mind, neither of these methods are enabled by default, so you’ll need to play in your device’s settings beforehand.

Keep Track of Your Android Device with Google Find My Device

Android users can download an application called Google Find My Device from the Google Play Store. Once the app is installed and accessed, it will prompt you to log in with your Google account. Make sure that the password to this account is sufficiently secure, and that you Allow Find My Device to access this device’s location when asked to do so.

Doing so will enable you to use Find My Device to track and manage your mobile device, if Wi-Fi and GPS are enabled, by signing into Google’s Find My Device website. As always, you should make sure that the password to your Google account is sufficiently secure to eliminate the chance of someone else logging in to track your location or wipe the data from your device.

Enabling Apple’s Find My iPhone

Built into Apple’s iCloud platform is the capability to track a lost iPhone, perfect for when you’ve accidentally set it down someplace and left it behind. While it might even be of some use in the case of a stolen iPhone, we recommend that you instead file a police report, rather than trying to track it down.

Furthermore, Find My iPhone can also allow you to delete all the data stored on the lost device. This will help protect you from identity theft, account breaches, and otherwise abusing your data. These features aren’t going to be enabled by default, so you need to activate it for it to work.

On your iPhone or iPad:

  • Open Settings.
  • Access the iCloud options.
  •  Switch the Find My iPhone/iPad slider to On.

If you’ve never set up the iCloud account on a particular device, you’ll be taken through the steps. We recommend that you use a strong and unique password for your iCloud account to minimize the possibility that your device is tracked, locked down, or wiped. Touch ID and Face ID are also recommended as authentication measures and can be activated during the device’s initial setup or in Settings, under Touch ID & Passcode.

Once you’ve done so, you’ll be able to log into your iCloud account to track your device, if your iPhone is turned on and Airplane mode isn’t activated.

Ideally, this is one feature that you’ll never need to take advantage of. However, considering the value of the data commonly stored on a mobile device (never mind the value of the device itself) it is better to be safe than sorry.

For more IT and cybersecurity best practices, make a habit of coming back to Voyage Technology and our blog, or reach out to us directly at 800.618.9844!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 22 February 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Hackers Innovation Cloud Network Security User Tips Hardware Internet Efficiency IT Support Malware Privacy Email Google Phishing Workplace Tips Computer IT Services Collaboration Users Hosted Solutions Mobile Device Quick Tips Ransomware Microsoft Cybersecurity Workplace Strategy Small Business Data Backup Communication Smartphone Passwords Saving Money VoIP Business Management Smartphones Android Mobile Devices communications Backup Upgrade Managed Service Data Recovery Managed IT Services Browser Microsoft Office Disaster Recovery Social Media Windows Network Tech Term Remote Internet of Things Artificial Intelligence Automation Facebook Cloud Computing Covid-19 Server Remote Work Managed Service Provider Current Events Miscellaneous Gadgets Productivity Information Holiday Outsourced IT AI Employee/Employer Relationship Encryption Spam Windows 10 Office Government Training Business Continuity Data Management Compliance Bandwidth Windows 10 Business Technology Virtualization Wi-Fi Blockchain Two-factor Authentication Mobile Office Apps Data Security Vendor Chrome Mobile Device Management Budget Gmail Apple Managed Services Voice over Internet Protocol App Employer-Employee Relationship Networking Avoiding Downtime Office 365 BYOD Marketing Applications Access Control Tip of the week WiFi Conferencing How To Computing BDR Information Technology Hacker HIPAA Analytics Website Office Tips Router Augmented Reality Virtual Private Network Storage Health Password Bring Your Own Device Help Desk Retail Big Data Healthcare Operating System Managed IT Services Risk Management Computers Remote Monitoring Vulnerability End of Support Vendor Management Solutions IT Support Display Printer Firewall Paperless Office Infrastructure Monitoring The Internet of Things Document Management Remote Workers Social Going Green Windows 11 Telephone Scam 2FA Data loss Cybercrime Excel Cooperation Free Resource Project Management Windows 7 Customer Service Patch Management Save Money Microsoft 365 Virtual Desktop Data storage LiFi Wireless Technology IT Management Outlook Data Privacy VPN Employees Meetings Physical Security Integration Money Humor User Tip Word Modem Computer Repair Mobile Security Processor Holidays Sports Data Storage Mouse Smart Technology Safety Video Conferencing Administration Machine Learning Managed Services Provider Saving Time Virtual Machines Professional Services Managed IT Service Maintenance Antivirus Downloads iPhone Settings Wireless Licensing Printing Supply Chain Content Filtering Vulnerabilities Customer Relationship Management Entertainment YouTube Cryptocurrency Images 101 Hacking Presentation Telephone System Multi-Factor Authentication Robot Mobility Cost Management Scams Content Remote Working Wearable Technology Memory Google Wallet Hybrid Work Health IT Unified Threat Management Motherboard Data Breach Comparison Google Play Permissions Windows 8 IP Address Unified Threat Management Directions Videos Laptop Human Resources Assessment Electronic Health Records Cables Wasting Time Drones Trend Micro Network Congestion Specifications Security Cameras Fraud User Error Microchip Halloween Google Apps Recovery Internet Exlporer Software as a Service IT Maintenance Hard Drives Username Managing Costs Business Intelligence Domains Point of Sale eCommerce Black Friday SSID Virtual Assistant Hacks Scary Stories Shortcuts Database Surveillance Ransmoware Refrigeration Network Management Fun Tech Support IT Technicians Virtual Machine Deep Learning Vendors Public Speaking Proxy Server Reviews Cookies Monitors Cyber Monday Medical IT Hotspot Transportation Lithium-ion battery Be Proactive Tactics Development Education Workforce Entrepreneur Websites Mirgation Hypervisor Threats Shopping Nanotechnology Optimization PowerPoint Electronic Medical Records Language Employer/Employee Relationships Mobile Computing SharePoint Workplace Strategies Addiction Meta Undo Management PCI DSS Search Chatbots Navigation Best Practice Amazon Lenovo Gig Economy Screen Reader Writing Distributed Denial of Service Service Level Agreement Internet Service Provider Virtual Reality Computing Infrastructure Teamwork Buisness IT solutions Outsource IT Server Management Regulations Compliance Private Cloud Identity Evernote Legal Business Growth Environment Superfish Bookmark Media Identity Theft Smart Tech Memes Download Net Neutrality Twitter Alerts SQL Server Application Small Businesses Financial Data Cortana Error History Social Engineering Break Fix Alt Codes Displays IBM Browsers Smartwatch Connectivity IT Upload Procurement Remote Computing Azure Downtime Hosted Solution Outsourcing Social Network Telework Cyber security Multi-Factor Security Tech Dark Web Typing CES Tablet IoT Communitications Trends Supply Chain Management Alert Workplace Hiring/Firing Competition Managed IT Customer Resource management FinTech Knowledge File Sharing Regulations Dark Data Google Calendar Term Google Drive How To Microsoft Excel Data Analysis Paperless Star Wars IT Assessment Co-managed IT Gamification Flexibility 5G Notifications Staff Value Unified Communications Technology Care Organization Experience Travel Social Networking Legislation Google Docs Bitcoin Techology Fileless Malware Digital Security Cameras Running Cable Business Communications User Google Maps Smart Devices

Blog Archive