Get Started Today!  (415) 295-4898

croom new

415 IT Blog

Steps to Take Before You Accidentally Lose Your Phone

Steps to Take Before You Accidentally Lose Your Phone

Nobody intends to lose their smartphone. For some of us, our mobile device is glued to our hands for a good portion of the day—it’s hard to imagine simply leaving it somewhere, right?

Mistakes happen. It doesn’t take more than a few minutes to set your smartphone up so you can track it down easily if you lose it. 

The steps are going to be a little different depending on if you have Android or an iPhone.

Prevent Your iPhone from Being Lost Forever with Apple’s Find My iPhone

Enable Apple’s Find My iPhone.

Apple has a built-in service that is a part of iCloud that will allow you to track the location of your lost iPhone in case you accidentally lose it. This is ideal for when it slips out of your pocket in a taxi or you accidentally leave it in the booth at a restaurant. Technically, it could be useful if your iPhone was stolen, but it’s advised that you report a stolen iPhone to the police instead of trying to steal it back yourself.

Another great feature that Find My iPhone has is the ability to delete all of the data on the device so nobody can use it to steal your identity, break into your online accounts, or otherwise do what they want with your data.

Usually these features aren’t enabled by default—it’s something you need to turn on.

On your iPhone (it also works on iPads):

Open the Settings app.

Tap on iCloud

Set the Find My iPhone (or Find My iPad) slider to On.

If you haven’t already set up an iCloud account on that particular device, you’ll be walked through the steps to do so. Make sure you use a strong, secure password that you aren’t using anywhere else for your iCloud account, or else someone could potentially lock or wipe your device on you, and track your location.

You’ll then be able to log into the iCloud website and track the location of your iPhone, provided that your iPhone is on and not in Airplane mode.

Beyond that, you’ll also want to set up Touch ID or Face ID, and make sure you are always using strong passwords. Touch ID and Face ID options are presented to you when you first set up your new iPhone, but you can also find them in the Settings app. Just look for Touch ID & Passcode.

Track Down Your Lost Android Phone with Google’s Find My Device App

Android phones have a feature that is similar to Apple’s Find My iPhone. It’s called Google Find My Device. Just like Apple, it’s not typically set up by default.

To get started, open the Google Play Store and search for Google Find My Device. Install the application (you can also use this link to get there). 

Once installed, open the Google Find My Device application.

The app will ask you what account you want to log in as, typically you’ll want to use the same Google account you use for everything else on your phone. Make sure your Google account password is strong and unique.

Be sure to Allow Find My Device to access this device’s location when you are prompted.

As long as your phone is on, and its Wi-Fi and GPS is enabled, Find My Device will be able to track your phone for you.

You can sign into Google’s Find My Device site to manage and track your devices.

Of course, make sure your password for your Google account is strong, secure, and unique. Otherwise, anyone could gain access and track your location or wipe your devices.

We hope you never have to use this feature, but it never hurts to have it set up. Most smartphones are pretty expensive, and the amount of data on them and access to all of your personal information makes them practically priceless. 

For more information pertaining to your device security and other IT best practices, make sure you return to our blog!

Steps to Take When You’ve Lost Your Phone
What to Expect from 5G in 2021


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, January 19 2021

Captcha Image

By accepting you will be accessing a service provided by a third-party external to

Mobile? Grab this Article

QR Code

Tag Cloud

Security Tip of the Week Technology Productivity Business Computing Best Practices Data IT Support Data Backup Network Security Privacy Hosted Solutions Cloud IT Services Data Recovery Internet Software Efficiency Email Managed IT Services Business Mobile Device Malware Google Phishing Small Business Collaboration Outsourced IT Innovation User Tips Hackers Cloud Computing Cybersecurity Smartphone Business Management Hardware Tech Term Upgrade Managed Service Communication Computer Mobile Devices Android Microsoft Workplace Tips Business Continuity Windows 10 VoIp Smartphones Covid-19 Backup Quick Tips Ransomware Disaster Recovery Managed Service Provider Paperless Office Remote Work Communications Network Encryption Wi-Fi Office 365 Users Business Technology Saving Money Passwords Browser Server Data Management Managed IT Help Desk Artificial Intelligence Social Media Internet of Things BDR Remote Monitoring Government Document Management Vulnerability Save Money Healthcare Windows 7 Compliance Holiday Miscellaneous Laptops Automation Scam Facebook Applications Blockchain Managed IT services Microsoft Office Windows Data Security Chrome Vendor Management Processor Gadgets Analytics Avoiding Downtime Project Management Bandwidth Antivirus Office Two-factor Authentication Redundancy Mobile Office Wireless Health Employer-Employee Relationship Virtualization Remote Information Tip of the week Meetings IT Management Hard Drive Customer Relationship Management Router Data Loss Storage BYOD Maintenance Information Technology Employee-Employer Relationship VPN Machine Learning Networking OneDrive Managed Services Training Apps Website Infrastructure Software as a Service Net Neutrality Files Access Control Company Culture RMM Virtual Private Network Mobility Proactive IoT Regulations Word Computing Monitoring Management File Sharing Patch Management Data Breach Remote Worker Spam Remote Monitoring and Management Financial Assessment File Management Operating System WiFi Data Storage Mobile Security Network Management Flexibility Bring Your Own Device Unified Communications Employees Payment Cards HIPAA Utility Computing Electronic Health Records Alert Consultation Instant Messaging Social Network Consulting Downtime Display Remote Computing The Internet of Things Time Management Gmail Risk Management Managed Services Provider Cooperation Professional Services Search Remote Workers Recycling Money Unified Threat Management Holidays Vendor Co-Managed IT Tablet Internet Exlporer Dark Web Augmented Reality Password Server Management Smart Technology Superfish CIO applications Banking Nanotechnology Wires Alerts Electronic Medical Records Mail Merge User Error Video Conferencing Chatbots Windows Server PCI DSS Mobile Computing Travel OneNote Permission Employer/Employee Relationships Apple Business Telephone Mirgation Virtual Reality Remote Working Enterprise Content Management Authorization Hard Disk Drives Websites Sensors Virtual Machines Wearable Technology Star Wars Firewall Features Database Downloads Politics Reviews App Comparison Licensing Address Notes Biometric Identity Theft Enterprise Resource Planning User Management Geography Technology Tips How To Test Proactive Maintenance Solid State Drive IT Assessment Cache Data Warehousing Private Cloud Budget Social Networking Legislation WPA3 Techology Solid State Drives SaaS Credit Cards Distributed Denial of Service Procurement Voice over Internet Protocol Projects Value of Managed Services End of Support Screen Reader Specifications PowerPoint Gamification Identity Teamwork CRM Modem High-Speed Internet Digital Payment Hotspot Touchscreen Technology Laws Cybercrime Hacking Cyber security Digitize Bookmarks Operations ROI G Suite Fleet Tracking Zero-Day Threat Outlook Disaster Resistance Options Telephone Computers Tech Support Managed IT Service Cyberattacks Social Emergency Multi-Factor Security Return on Investment Customer Service Heating/Cooling Windows Server 2008 Gifts Smart Tech Black Friday Mobile Device Management Printer Mobile Shared resources Going Green Content Filtering Development Mouse Language Unified Threat Management Database Management Trending Shadow IT Favorites Settings Personal Information Motherboard Chromebook Asset Tracking Backup and Disaster Recovery Shortcut Proactive IT 5G Statistics Mobile VoIP IT Technicians Cost Management Break Fix Read Only Security Cameras MSP Permissions Finance Manufacturing Servers Hacker Connectivity Cyber Monday Point of Sale Staff Tech Terms Virtual Assistant Bitcoin Outsource IT Microsoft Excel Conferencing Lenovo Batteries Cookies Cables Computing Infrastructure GDPR Outsourcing Migration eWaste Samsung Transportation Recovery Active Directory Peripheral Vulnerabilities Human Error IT Consulting Wireless Internet Bluetooth Big Data IT Printing Managing Stress Google Calendar Fraud Authentication Smart Devices Optimization E-Commerce Theft Wasting Time SharePoint Current Events Laptop Marketing Education CEO Students Regulation Daniel Stevens Twitter Printers CES

Latest Blog

It isn’t often that you’ll hear a managed service provider say something like, “There’s no school like the old school.” In many ways, however, the basic principles of a solid business IT strategy haven’t changed all that much… despite the momentous changes that we’ve witness...

Latest News

We are proud to announce that 415 IT and our CEO, Daniel Stevens, were recently featured by CIO Applications. We discussed how and why we serve our clients, as well as some sneak peeks for our future. Read our interview by visiting:  https:...