Skip to main content

Are you prepared in case your phone is stolen?

Global reports on mobile theft has reported 1 in 3 phones are stolen or lost. You lose your photos, contacts, messages, data within apps and expose your identity (email, facebook, google+, banking apps) and importantly your two-factor authenticator app!

That’s quite of a risk in addition to value of your phone. Better option is to be prepared in case it happens. It takes less than 5 minutes to setup your phone so that you can remotely locate, lock and wipe it if required. If you have Android phone, here is how you do it. For iPhone users, here is another blog.

Android comes with built-in 'Android Device Manager' functionality that you need to setup. Here is how -



Step 1 - Enable 'Android Device Manager' (ADM)
Android Device Manager is functionality of Android to allow user to lock or erase a lost device. This is installed by default in android beyond Android version 4.1 (Jelly Bean). You need to tell give permissions to 'Android device manager' so that it can lock and erase data when needed.

Navigate to Settings > Security > Device Administrator > Enable check box for 'Android Device Manager'






Step 2 - Enable remote Lock and Erase functionality in Android Device Manager
You need to enable remote locate and remote lock/erase functionality.

Open 'Google Settings' > Android Device Manager > Enable both check boxes


Step 3 - Setup PIN/Password
Enable the PIN/Password for your phone. This will block anyone accessing your data and/or disable 'Android Device Manager'. No one should be able to disable ADM. Here is how to setup PIN/Password. Skip to next step if you already have this in place.

Setting > Lock Screen > Screen Lock > PIN / Password

Next time you lock your phone, it will ask for PIN/Password.

Step 4 - Go to web(on another device - tablet/phone) and you are ready to locate, lock, erase or ring your phone

Navigate to https://www.google.com/android/devicemanager and it will show you last location of your phone when it successfully located. You can click "Ring" to ring your phone even if its silent. Locate your phone, Lock your phone and erase content of your phone remotely. Do give it a try and be aware you can do this remotely anytime.



Step 5 - Note your phone IMEI 
Your phone has unique 15 digit ID which is called IMEI ( International Mobile Equipment Identity) You will need this number to register a complain to police and your network operator. Make a note of this number for future reference. You can find it by navigating to

Settings > About Device/About Phone > Status > IMEI




Pros and Cons

Pros

  • No third-party software required to install and setup. Its available in android 4.1 Jelly Bean version by default. You get performance advantage due integrated solution from android. Any third-party app will add some performance impact on memory, battery and CPU
  • It is well integrated in Android/Google ecosystem. Your phone is linked to google account and always accessible via web
  • Remotely set password on device using web interface even if your phone initially didn’t had PIN/Password set

Cons

  • No backup of your data done. You cannot get back data from phone once its lost. Note - Google does backup contacts via its account and photos/videos via google+ auto-backup. You need to set this up explicitly via Google Drive or DropBox
  • There are host of other features available from competitive products like, Lock phone when SIM changed, Capture photo of would-be thief, locking and erasing phone data with SMS commands from your friend, and working only on SMS commands if data network is not available due to SIM changed. This is where other vendors kick in to give you competitive advantage. Read my other blog on 'McAfee Mobile Security' to get all these functionality for free
For most of the people and myself, remote locate / Lock and data wipe is what is important and "Android Device Manager" fits perfectly. It is a clear winner when you want to get best of android/google ecosystem without third-party apps.

Why not avoid losing your phone in first place ?

  • Never leave your phone in unattended car
  • Never leave your phone behind in public places restaurants/pubs/coffee-shops/office/airports/cinema/etc.
  • Mobile is just any other thing that you take care to avoid loss. You know it better and can take care of it :-)


Hope this helps. Wish you don’t lose your phone and don’t need to lock or erase data - but being prepared for it is important!

Comments

Popular posts from this blog

Malls track your visits by Wi-Fi tracking

How does Wi-Fi works ? 
Wi-Fi is preferred wireless way of internet connectivity on mobile devices. We connect to Wi-Fi at home/office/cafe/Hotels and public places to get fast internet connectivity and do all stuff using it. Usage of Wi-Fi has spread fast with smartphones/tablets as compared to laptops couple of years back.

Wi-Fi uses network name (SSID) and shared-password to connect and that makes it easy for users to get internet without much hassle. Once you connect to a network, your mobile device remembers the network and tries to auto-connect to it whenever its available.

Mobile devices store all this Wi-Fi network info and use to auto-connect on periodic basis so as to provide preferred connectivity; and all that happens behind the scene. May be its your android/iphone/blackberry/windows phone/tablet all work same way. Your phone tries to connect to Wi-Fi automatically.

You can see list of Wi-Fi networks connected by your device going to settings > WiFi




What is Wi-Fi track…

Your Privacy is Fuxxked up!

What is Online Privacy and why anyone should care about it  online? 

Online Privacy is about you and personal privacy concerning your data the way its stored and used by third-parties, and displaying that via internet.

With internet age, your data is captured every moment with what you do online and is available for companies to use and share with others without you noticing it and that's the reason why you should care. Your identity and data is not only yours anymore.




Google the web king:  
Every google search you do after login to google is stored. Google exactly know what kind of info you are looking for and what was your search history which it can relate and then show new results. Search done on webpage/tablet will also show up on phone and vice-versa.

If you have android then you can also see that "Google Now" will show related blogs/articles around your search. E.g. if you search for a name of place then few minutes later you will see a short map with time to trav…

Encrypt personal data with TrueCrypt

WARNING - TrueCrypt has stopped development and issued security warning. Please don't use TrueCrpt. Maintaining this blog for historical purposes. Updated 29th May 2014. 
-----------------------------------------------------------------------------------------------------------

You got personal data or photos that you don't want anyone to see ? Got confidential files in your external-HDD/Pendrive and want to share it with your friends?  Or want to create a secure vault to store sensitive data ?  Answer is TrueCrypt

TrueCrypt is Open-Source, free disk encryption software available for Windows/Mac & Linux. http://www.truecrypt.org/



Main features -

Create virtual disk within the real hard drive - You can create a vault and lock it using a password. You can then see all files within it with passwordEncrypts entire hard-disk or pen-drive. If your laptop is stolen or you lose pendrive with data then no one can read the content and see your files
Encryption is automatic and thus you…