ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: What to Do Before You Lose Your Phone

Tip of the Week: What to Do Before You Lose Your Phone

It isn’t like anyone actively means to lose their smartphone, but stuff happens. After all, many of us have our device in-hand for most of our waking hours, so there’s plenty of opportunities for it to be left behind somewhere. Fortunately, there are ways that you can set up your smartphone to help track it should it be lost, whether it’s an Apple device or on the Android platform.

Keep in mind, neither of these methods are enabled by default, so you’ll need to play in your device’s settings beforehand.

Keep Track of Your Android Device with Google Find My Device

Android users can download an application called Google Find My Device from the Google Play Store. Once the app is installed and accessed, it will prompt you to log in with your Google account. Make sure that the password to this account is sufficiently secure, and that you Allow Find My Device to access this device’s location when asked to do so.

Doing so will enable you to use Find My Device to track and manage your mobile device, if Wi-Fi and GPS are enabled, by signing into Google’s Find My Device website. As always, you should make sure that the password to your Google account is sufficiently secure to eliminate the chance of someone else logging in to track your location or wipe the data from your device.

Enabling Apple’s Find My iPhone

Built into Apple’s iCloud platform is the capability to track a lost iPhone, perfect for when you’ve accidentally set it down someplace and left it behind. While it might even be of some use in the case of a stolen iPhone, we recommend that you instead file a police report, rather than trying to track it down.

Furthermore, Find My iPhone can also allow you to delete all the data stored on the lost device. This will help protect you from identity theft, account breaches, and otherwise abusing your data. These features aren’t going to be enabled by default, so you need to activate it for it to work.

On your iPhone or iPad:

  • Open Settings.
  • Access the iCloud options.
  •  Switch the Find My iPhone/iPad slider to On.

If you’ve never set up the iCloud account on a particular device, you’ll be taken through the steps. We recommend that you use a strong and unique password for your iCloud account to minimize the possibility that your device is tracked, locked down, or wiped. Touch ID and Face ID are also recommended as authentication measures and can be activated during the device’s initial setup or in Settings, under Touch ID & Passcode.

Once you’ve done so, you’ll be able to log into your iCloud account to track your device, if your iPhone is turned on and Airplane mode isn’t activated.

Ideally, this is one feature that you’ll never need to take advantage of. However, considering the value of the data commonly stored on a mobile device (never mind the value of the device itself) it is better to be safe than sorry.

For more IT and cybersecurity best practices, make a habit of coming back to ClearView IT and our blog, or reach out to us directly at 866-326-7214!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 05 May 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Privacy Network Security Data Cloud Business User Tips IT Support Internet Hardware Innovation Malware Email Hosted Solutions Efficiency Workplace Tips Computer Microsoft Google Collaboration Android Cybersecurity Phishing Business Management IT Services Backup Ransomware Data Backup communications Smartphone Upgrade Smartphones Small Business Microsoft Office Mobile Devices Network Data Recovery Communication Managed IT Services Quick Tips Productivity Social Media VoIP Users Mobile Device Automation Tech Term Windows 10 Business Continuity Facebook Passwords Disaster Recovery Holiday Covid-19 IT Support Browser Apps Managed Service Windows 10 Cloud Computing Outsourced IT Miscellaneous Remote Work Managed Service Provider Internet of Things Data Management Saving Money Operating System Government Workplace Strategy Artificial Intelligence Gadgets Managed IT services Networking Windows Spam Business Technology Mobile Device Management Remote Blockchain WiFi Bandwidth Server Information Encryption App Virtualization Office 365 Employee/Employer Relationship Apple Information Technology Gmail History Office Budget Two-factor Authentication Analytics Conferencing Cybercrime Access Control Data Security Big Data Wi-Fi BDR Health IT Management Remote Computing Hacker Training Cost Management Voice over Internet Protocol Compliance Document Management Patch Management Vendor Save Money Help Desk Employer-Employee Relationship Remote Monitoring Hacking Hiring/Firing Outlook Computing Data loss Vendor Management Password Hard Drive Money Customer Service Unified Threat Management Firewall Legal Augmented Reality Mobile Office Word IBM Data storage Applications Managed Services Website Search... Best Practice Vulnerabilities Project Management Retail Alert BYOD User Google Maps Scam Chrome Social Windows 11 Sports SaaS VPN Twitter DDoS Update Law Enforcement End of Support Printer Remote Workers iPhone Mobile Computing Education Cortana Data Breach Content Filtering Marketing Windows 7 Free Resource Running Cable Paperless Office Antivirus Router How To Maintenance Travel Virtual Reality Storage Social Engineering Monitoring Cryptocurrency The Internet of Things Healthcare Black Market YouTube Cleaning Websites Robot Mobility Laptop Meetings Software as a Service Avoiding Downtime Data Protection Telephone Holidays Solid State Drive Downtime Safety Excel Cooperation Virtual Desktop Chromebook Drones Video Conferencing Experience Virtual Machines Automobile Computer Repair Tech Terms PowerPoint Virtual Assistant Professional Services How To Managed IT Microchip Administration Flexibility Disaster Digital Presentation Specifications Managed Services Provider IT Consultant Taxes Identity Theft Processor Lithium-ion battery Hack Notifications Virtual Private Network Unified Communications Customer Relationship Management Co-Managed IT Current Events Processors Google Docs Entertainment Bluetooth Physical Security Solutions Distributed Denial of Service Office Tips Multi-factor Authentication Private Cloud Memory Images 101 Integration Display Start Menu Downloads Saving Time Computer Care Vulnerability Politics Wireless Technology Employees eWaste HIPAA Computers Bitcoin Machine Learning Settings Banking Term Tablets Google Wallet Videos intranet Download Surveillance Piracy Managing Costs Messenger Wireless Deep Learning Shortcut HTML Heating/Cooling Browsers Supercomputer Environment Nanotechnology Google Calendar SSID Windows XP Virus Business Metrics Google Play Hosted Solution Media Social Networking Business Owner Upload Development Software License Employer/Employee Relationships Virtual Machine Books Social Network Motion Sickness Data Analysis Society Reviews Screen Reader Optimization Comparison Smart Technology Google Drive Language Security Cameras 2FA Trends Mobile Technology Teamwork Data Storage Devices Hypervisor Knowledge Reading Corporate Profile Monitors Customer Resource management Visible Light Communication Fileless Malware Employer Employee Relationship Windows 8 Shopping Tip of the week Television Medical IT Telephony SQL Server Cabling Paperless Inbound Marketing Gamification Company Culture PCI DSS Regulations Licensing Relocation Staffing Tablet Displays Telephone System G Suite Advertising Work/Life Balance IP Address Directions Tracking Tech Support Gig Economy Backup and Disaster Recovery Humor Mouse Supply Chain VoIP Azure Business Communications Content Internet Service Provider Desktop Regulations Compliance Accountants Managed IT Service Electronic Payment Electronic Medical Records Web Server Digital Payment Database Memes SharePoint Workplace In Internet of Things Hacks Worker Network Congestion Human Resources Net Neutrality Financial Data Phone System Equifax Reliable Computing Recovery Access Writing Competition Health IT Public Cloud Risk Management Tactics IT Hard Drive Disposal Scams Time Management LiFi Google Apps Entrepreneur Username Telework Startup Freedom of Information Audit Scalability Documents Spyware Application Text Messaging Navigation File Sharing Proactive IT Smartwatch Business Intelligence Addiction Communitications email scam Microsoft 365 Cables Administrator Redundancy Bring Your Own Device Procurement Computer Accessories Mobile Security FinTech Legislation News Securty Cache User Tip Domains Evernote Workers Music CES Network Management IT Assessment Point of Sale Unified Threat Management Value Supply Chain Management Organization Emails Cyber security Fake News Printing Shortcuts Proxy Server CCTV Service Level Agreement Smart Devices Computing Infrastructure Botnet Touchscreen Emergency Rental Service Micrsooft Management Computer Malfunction Remote Working Device security AI Wireless Headphones Trend Micro Microsoft Excel Be Proactive Vendor Mangement Flash Public Speaking Telephone Systems Tech Samsung Business Growth Digital Security Cameras Troubleshooting Going Green Electronic Health Records Business Cards Transportation Streaming Media Wasting Time Uninterrupted Power Supply Keyboard Error Webcam eCommerce Modem Workplace Strategies Business Mangement Hard Drives Bookmark

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?