Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: What to Do Before You Lose Your Phone

Tip of the Week: What to Do Before You Lose Your Phone

It isn’t like anyone actively means to lose their smartphone, but stuff happens. After all, many of us have our device in-hand for most of our waking hours, so there’s plenty of opportunities for it to be left behind somewhere. Fortunately, there are ways that you can set up your smartphone to help track it should it be lost, whether it’s an Apple device or on the Android platform.

Keep in mind, neither of these methods are enabled by default, so you’ll need to play in your device’s settings beforehand.

Keep Track of Your Android Device with Google Find My Device

Android users can download an application called Google Find My Device from the Google Play Store. Once the app is installed and accessed, it will prompt you to log in with your Google account. Make sure that the password to this account is sufficiently secure, and that you Allow Find My Device to access this device’s location when asked to do so.

Doing so will enable you to use Find My Device to track and manage your mobile device, if Wi-Fi and GPS are enabled, by signing into Google’s Find My Device website. As always, you should make sure that the password to your Google account is sufficiently secure to eliminate the chance of someone else logging in to track your location or wipe the data from your device.

Enabling Apple’s Find My iPhone

Built into Apple’s iCloud platform is the capability to track a lost iPhone, perfect for when you’ve accidentally set it down someplace and left it behind. While it might even be of some use in the case of a stolen iPhone, we recommend that you instead file a police report, rather than trying to track it down.

Furthermore, Find My iPhone can also allow you to delete all the data stored on the lost device. This will help protect you from identity theft, account breaches, and otherwise abusing your data. These features aren’t going to be enabled by default, so you need to activate it for it to work.

On your iPhone or iPad:

  • Open Settings.
  • Access the iCloud options.
  •  Switch the Find My iPhone/iPad slider to On.

If you’ve never set up the iCloud account on a particular device, you’ll be taken through the steps. We recommend that you use a strong and unique password for your iCloud account to minimize the possibility that your device is tracked, locked down, or wiped. Touch ID and Face ID are also recommended as authentication measures and can be activated during the device’s initial setup or in Settings, under Touch ID & Passcode.

Once you’ve done so, you’ll be able to log into your iCloud account to track your device, if your iPhone is turned on and Airplane mode isn’t activated.

Ideally, this is one feature that you’ll never need to take advantage of. However, considering the value of the data commonly stored on a mobile device (never mind the value of the device itself) it is better to be safe than sorry.

For more IT and cybersecurity best practices, make a habit of coming back to Voyage Technology and our blog, or reach out to us directly at 800.618.9844!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 25 April 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud User Tips Network Security Internet Hardware Efficiency IT Support Malware Privacy Google Email Phishing Workplace Tips Computer IT Services Collaboration Hosted Solutions Users Mobile Device Ransomware Quick Tips Workplace Strategy Cybersecurity Microsoft Small Business Passwords Data Backup Communication Smartphone Backup Saving Money Android Business Management VoIP Smartphones Mobile Devices communications Upgrade Managed Service Disaster Recovery Browser Data Recovery Social Media Managed IT Services Microsoft Office Windows Tech Term Remote Network Internet of Things Current Events Productivity Automation Artificial Intelligence Facebook Cloud Computing Covid-19 Gadgets Server Managed Service Provider AI Remote Work Miscellaneous Holiday Information Outsourced IT Employee/Employer Relationship Encryption Spam Office Compliance Windows 10 Government Training Data Management Business Continuity Wi-Fi Business Technology Blockchain Windows 10 Bandwidth Virtualization Two-factor Authentication Mobile Office Data Security Apps Managed Services Voice over Internet Protocol BYOD Mobile Device Management Chrome Gmail Vendor Budget Apple Networking App Employer-Employee Relationship Conferencing Computing Hacker Information Technology Avoiding Downtime Marketing Access Control Office 365 IT Support Tip of the week Applications WiFi How To BDR Operating System Healthcare Computers Virtual Private Network Risk Management Website Health Office Tips Analytics Augmented Reality HIPAA Router Retail Storage Password Bring Your Own Device Big Data Managed IT Services Help Desk Remote Monitoring Remote Workers Vulnerability End of Support Customer Service Vendor Management Cybercrime Telephone Physical Security Display Cooperation Free Resource Printer Project Management Paperless Office Windows 7 Infrastructure Microsoft 365 Firewall Document Management Solutions The Internet of Things Scam Data loss Windows 11 Social 2FA Monitoring Excel Going Green Patch Management Save Money Settings Printing Managed IT Service Wireless Content Filtering IT Management Downloads Hacking Presentation VPN YouTube Meetings iPhone Licensing Cryptocurrency Wireless Technology Entertainment Vulnerabilities Data Privacy Computer Repair Images 101 Virtual Desktop Data storage LiFi Telephone System Multi-Factor Authentication Mobility Word Cost Management Outlook Machine Learning Money Humor Employees Integration Safety Maintenance User Tip Antivirus Modem Sports Processor Mouse Mobile Security Holidays Administration Data Storage Smart Technology Supply Chain Video Conferencing Managed Services Provider Saving Time Virtual Machines Professional Services Robot Customer Relationship Management Identity Evernote Paperless Regulations Compliance Alt Codes Competition Bookmark Smart Tech Memes Downtime Unified Threat Management Co-managed IT Unified Threat Management Download Net Neutrality Hosted Solution Alerts SQL Server Technology Care Typing History Business Communications Financial Data Browsers Smartwatch Connectivity IT Break Fix Scams Network Congestion Knowledge Google Drive User Error User Upload Procurement Azure Hybrid Work Social Network Telework Cyber security Multi-Factor Security Tech Human Resources CES IoT Communitications Point of Sale Dark Web Cables 5G Experience IP Address Google Docs Trends Supply Chain Management Unified Communications Customer Resource management FinTech Bitcoin Network Management Regulations Running Cable Tech Support Google Calendar Term Google Apps Data Analysis Google Wallet Star Wars IT Assessment Microsoft Excel IT Maintenance Monitors Staff Value Business Intelligence Recovery Gamification Flexibility Hard Drives Organization Windows 8 Social Networking Laptop Websites Legislation Shortcuts Domains Fileless Malware Digital Security Cameras Drones Smart Devices Ransmoware Wearable Technology Memory Vendors Electronic Medical Records SharePoint Content Remote Working Refrigeration Health IT Motherboard Data Breach Halloween Comparison Google Play Be Proactive Public Speaking Directions Videos Lenovo Assessment Electronic Health Records Permissions Workforce Writing Wasting Time Threats Virtual Reality Lithium-ion battery Hacks Server Management Entrepreneur Trend Micro Scary Stories Private Cloud Specifications Security Cameras Workplace Strategies Microchip Superfish Internet Exlporer Software as a Service Identity Theft Fraud Meta Fun Managing Costs Amazon Twitter Username Deep Learning Undo eCommerce Error Black Friday SSID Database Surveillance Education Virtual Assistant Outsource IT Social Engineering IT Technicians Virtual Machine Environment Remote Computing Media Proxy Server Reviews Mobile Computing Cookies Cyber Monday Medical IT Tactics Development Tablet Hotspot Transportation Small Businesses Search Mirgation Hypervisor Displays Alert Application Best Practice Shopping Managed IT Nanotechnology Optimization Buisness File Sharing PowerPoint Dark Data IBM Legal Addiction IT solutions Language Employer/Employee Relationships Outsourcing How To Chatbots Notifications Navigation Management PCI DSS Business Growth Gig Economy Screen Reader Travel Distributed Denial of Service Workplace Techology Service Level Agreement Internet Service Provider Google Maps Computing Infrastructure Teamwork Hiring/Firing Cortana

Blog Archive