Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: What to Do Before You Lose Your Phone

Tip of the Week: What to Do Before You Lose Your Phone

It isn’t like anyone actively means to lose their smartphone, but stuff happens. After all, many of us have our device in-hand for most of our waking hours, so there’s plenty of opportunities for it to be left behind somewhere. Fortunately, there are ways that you can set up your smartphone to help track it should it be lost, whether it’s an Apple device or on the Android platform.

Keep in mind, neither of these methods are enabled by default, so you’ll need to play in your device’s settings beforehand.

Keep Track of Your Android Device with Google Find My Device

Android users can download an application called Google Find My Device from the Google Play Store. Once the app is installed and accessed, it will prompt you to log in with your Google account. Make sure that the password to this account is sufficiently secure, and that you Allow Find My Device to access this device’s location when asked to do so.

Doing so will enable you to use Find My Device to track and manage your mobile device, if Wi-Fi and GPS are enabled, by signing into Google’s Find My Device website. As always, you should make sure that the password to your Google account is sufficiently secure to eliminate the chance of someone else logging in to track your location or wipe the data from your device.

Enabling Apple’s Find My iPhone

Built into Apple’s iCloud platform is the capability to track a lost iPhone, perfect for when you’ve accidentally set it down someplace and left it behind. While it might even be of some use in the case of a stolen iPhone, we recommend that you instead file a police report, rather than trying to track it down.

Furthermore, Find My iPhone can also allow you to delete all the data stored on the lost device. This will help protect you from identity theft, account breaches, and otherwise abusing your data. These features aren’t going to be enabled by default, so you need to activate it for it to work.

On your iPhone or iPad:

  • Open Settings.
  • Access the iCloud options.
  •  Switch the Find My iPhone/iPad slider to On.

If you’ve never set up the iCloud account on a particular device, you’ll be taken through the steps. We recommend that you use a strong and unique password for your iCloud account to minimize the possibility that your device is tracked, locked down, or wiped. Touch ID and Face ID are also recommended as authentication measures and can be activated during the device’s initial setup or in Settings, under Touch ID & Passcode.

Once you’ve done so, you’ll be able to log into your iCloud account to track your device, if your iPhone is turned on and Airplane mode isn’t activated.

Ideally, this is one feature that you’ll never need to take advantage of. However, considering the value of the data commonly stored on a mobile device (never mind the value of the device itself) it is better to be safe than sorry.

For more IT and cybersecurity best practices, make a habit of coming back to Voyage Technology and our blog, or reach out to us directly at 800.618.9844!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 07 November 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing Collaboration IT Services Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Passwords Quick Tips Backup Communication Cybersecurity Saving Money Data Backup Productivity Smartphone Managed Service Upgrade Android Business Management Smartphones VoIP Mobile Devices Data Recovery communications Windows Disaster Recovery AI Browser Social Media Managed IT Services Microsoft Office Current Events Network Tech Term Remote Internet of Things Facebook Automation Artificial Intelligence Information Miscellaneous Gadgets Covid-19 Cloud Computing Holiday Training Server Remote Work Managed Service Provider Outsourced IT IT Support Compliance Spam Encryption Employee/Employer Relationship Windows 10 Office Business Continuity Government Data Management Business Technology Virtualization Bandwidth Blockchain Wi-Fi Windows 10 Two-factor Authentication Apps Data Security Vendor Mobile Office Managed Services Tip of the week Voice over Internet Protocol Chrome Budget Employer-Employee Relationship Apple Networking App BYOD Mobile Device Management Gmail Access Control WiFi Office 365 Conferencing How To Hacker BDR Avoiding Downtime HIPAA Marketing Applications Computing Information Technology 2FA Health Analytics Office Tips Big Data Augmented Reality Healthcare Retail Storage Password Bring Your Own Device Managed IT Services Computers Website Router Operating System Virtual Private Network Risk Management Help Desk Paperless Office Infrastructure The Internet of Things Excel Remote Workers Social Document Management Telephone Cooperation Free Resource Scam Data loss Project Management Customer Service Windows 7 Microsoft 365 Going Green Patch Management Solutions Save Money Remote Monitoring Vulnerability End of Support Vendor Management Cybercrime Physical Security Firewall Display Monitoring Printer Windows 11 Safety Virtual Desktop Video Conferencing Supply Chain Managed Services Provider Data storage LiFi Saving Time Virtual Machines Professional Services Outlook Machine Learning Managed IT Service Money Downloads Humor iPhone Licensing Maintenance Antivirus Entertainment Customer Relationship Management Sports Vulnerabilities Mouse Data Privacy Images 101 Administration Hacking Telephone System Presentation Multi-Factor Authentication Mobility Cost Management Wireless Technology Robot Employees Settings Printing Wireless Integration Content Filtering IT Management User Tip Modem Word Mobile Security VPN Processor YouTube Meetings Cryptocurrency Holidays Data Storage Computer Repair Smart Technology Language Employer/Employee Relationships Google Wallet Displays Addiction Monitors Management PCI DSS Undo Chatbots Navigation Windows 8 Outsourcing Gig Economy Laptop Websites Screen Reader Distributed Denial of Service Computing Infrastructure Teamwork Drones Service Level Agreement Internet Service Provider Workplace Regulations Compliance Electronic Medical Records Identity Evernote SharePoint Hiring/Firing Bookmark Halloween Smart Tech Memes Writing Alerts SQL Server Lenovo Paperless Download Net Neutrality Application Co-managed IT Financial Data Virtual Reality History Hacks Server Management Technology Care Browsers Smartwatch IBM Scary Stories Private Cloud Connectivity IT Break Fix Fun Azure Superfish Identity Theft Business Communications Upload Procurement Deep Learning Scams Social Network Telework Twitter Cyber security Multi-Factor Security Tech Hybrid Work CES Error IoT Communitications Dark Web Social Engineering Education Human Resources Trends Supply Chain Management Cables Customer Resource management FinTech Competition Remote Computing Regulations Google Calendar Term Mobile Computing Data Analysis Star Wars IT Assessment Microsoft Excel Search Staff Value Tablet Google Apps Gamification Flexibility Best Practice IT Maintenance Organization Alert Social Networking Legislation Managed IT Business Intelligence Fileless Malware Digital Security Cameras Buisness File Sharing Smart Devices User Dark Data How To Wearable Technology Memory Legal IT solutions Shortcuts Content Remote Working Business Growth Ransmoware Health IT Notifications Motherboard Data Breach Comparison Google Play Vendors Directions Videos IP Address Travel Assessment Electronic Health Records Permissions Cortana Wasting Time Techology Google Maps Be Proactive Alt Codes Workforce Trend Micro Specifications Security Cameras Threats Microchip Downtime Unified Threat Management Internet Exlporer Software as a Service Recovery Fraud Username Hard Drives Managing Costs Unified Threat Management Hosted Solution Workplace Strategies Typing Meta Domains eCommerce Black Friday SSID Virtual Assistant Amazon Database Surveillance Network Congestion Refrigeration Knowledge IT Technicians Virtual Machine Google Drive User Error Outsource IT Proxy Server Reviews Public Speaking Cookies Cyber Monday Medical IT Hotspot Transportation Environment Lithium-ion battery Point of Sale Media Tactics Development 5G Experience Mirgation Hypervisor Entrepreneur Google Docs Unified Communications Bitcoin Network Management Small Businesses Shopping Running Cable Tech Support Nanotechnology Optimization PowerPoint

Blog Archive