Skip to main content

Are you prepared in case your phone is stolen?

Global reports on mobile theft has reported 1 in 3 phones are stolen or lost. You lose your photos, contacts, messages, data within apps and expose your identity (email, facebook, google+, banking apps) and importantly your two-factor authenticator app!

That’s quite of a risk in addition to value of your phone. Better option is to be prepared in case it happens. It takes less than 5 minutes to setup your phone so that you can remotely locate, lock and wipe it if required. If you have Android phone, here is how you do it. For iPhone users, here is another blog.

Android comes with built-in 'Android Device Manager' functionality that you need to setup. Here is how -



Step 1 - Enable 'Android Device Manager' (ADM)
Android Device Manager is functionality of Android to allow user to lock or erase a lost device. This is installed by default in android beyond Android version 4.1 (Jelly Bean). You need to tell give permissions to 'Android device manager' so that it can lock and erase data when needed.

Navigate to Settings > Security > Device Administrator > Enable check box for 'Android Device Manager'






Step 2 - Enable remote Lock and Erase functionality in Android Device Manager
You need to enable remote locate and remote lock/erase functionality.

Open 'Google Settings' > Android Device Manager > Enable both check boxes


Step 3 - Setup PIN/Password
Enable the PIN/Password for your phone. This will block anyone accessing your data and/or disable 'Android Device Manager'. No one should be able to disable ADM. Here is how to setup PIN/Password. Skip to next step if you already have this in place.

Setting > Lock Screen > Screen Lock > PIN / Password

Next time you lock your phone, it will ask for PIN/Password.

Step 4 - Go to web(on another device - tablet/phone) and you are ready to locate, lock, erase or ring your phone

Navigate to https://www.google.com/android/devicemanager and it will show you last location of your phone when it successfully located. You can click "Ring" to ring your phone even if its silent. Locate your phone, Lock your phone and erase content of your phone remotely. Do give it a try and be aware you can do this remotely anytime.



Step 5 - Note your phone IMEI 
Your phone has unique 15 digit ID which is called IMEI ( International Mobile Equipment Identity) You will need this number to register a complain to police and your network operator. Make a note of this number for future reference. You can find it by navigating to

Settings > About Device/About Phone > Status > IMEI




Pros and Cons

Pros

  • No third-party software required to install and setup. Its available in android 4.1 Jelly Bean version by default. You get performance advantage due integrated solution from android. Any third-party app will add some performance impact on memory, battery and CPU
  • It is well integrated in Android/Google ecosystem. Your phone is linked to google account and always accessible via web
  • Remotely set password on device using web interface even if your phone initially didn’t had PIN/Password set

Cons

  • No backup of your data done. You cannot get back data from phone once its lost. Note - Google does backup contacts via its account and photos/videos via google+ auto-backup. You need to set this up explicitly via Google Drive or DropBox
  • There are host of other features available from competitive products like, Lock phone when SIM changed, Capture photo of would-be thief, locking and erasing phone data with SMS commands from your friend, and working only on SMS commands if data network is not available due to SIM changed. This is where other vendors kick in to give you competitive advantage. Read my other blog on 'McAfee Mobile Security' to get all these functionality for free
For most of the people and myself, remote locate / Lock and data wipe is what is important and "Android Device Manager" fits perfectly. It is a clear winner when you want to get best of android/google ecosystem without third-party apps.

Why not avoid losing your phone in first place ?

  • Never leave your phone in unattended car
  • Never leave your phone behind in public places restaurants/pubs/coffee-shops/office/airports/cinema/etc.
  • Mobile is just any other thing that you take care to avoid loss. You know it better and can take care of it :-)


Hope this helps. Wish you don’t lose your phone and don’t need to lock or erase data - but being prepared for it is important!

Comments

Popular posts from this blog

Malls track your visits by Wi-Fi tracking

How does Wi-Fi works ?  Wi-Fi is preferred wireless way of internet connectivity on mobile devices. We connect to Wi-Fi at home/office/cafe/Hotels and public places to get fast internet connectivity and do all stuff using it. Usage of Wi-Fi has spread fast with smartphones/tablets as compared to laptops couple of years back. Wi-Fi uses network name (SSID) and shared-password to connect and that makes it easy for users to get internet without much hassle. Once you connect to a network, your mobile device remembers the network and tries to auto-connect to it whenever its available. Mobile devices store all this Wi-Fi network info and use to auto-connect on periodic basis so as to provide preferred connectivity; and all that happens behind the scene. May be its your android/iphone/blackberry/windows phone/tablet all work same way. Your phone tries to connect to Wi-Fi automatically. You can see list of Wi-Fi networks connected by your device going to settings > WiFi What i

Use Bookmarks for Bank websites!

Online banking is preferred way for bank transactions and we hardly visit bank building. Most banks do provide android/iphone apps  to take it further. Bank websites are here to stay and do provide rich set of services for customers; and here lies the security issue. You need to protect you identity while logging in and prevent using your credentials on any other fake websites. Use browser bookmarks to open bank website: Always visit your bank using a bookmark on your browser. Simple practice can save your money Never search for bank URL in google or any search engine. You may land up in fake website Never search bank website URL in emails, you might open fraudulent email with URL pointing to site that looks similar to your bank. You may end up entering credentials and give away access to hackers Do NOT bookmark 'Sign in' page as it can change, always bookmark main website of bank e.g. https://www.hsbc.co.in, you can then follow the 'Sign in' page from there. Jus

10 Ways your computer can get infected by viruses and how to avoid that

Getting infected by Virus on your laptop/desktop is easy as you read below. There is no one good way to be protected against all of them and thus you need to be cautious enough to keep your data and laptop secure. On other hand you don't need to be super paranoid or require geeky skills to be protected - just be aware about your actions and apply common sense. 1. USB/Pen-Drive:  The biggest reason to get infected is using extensively using USB/Pen drives to share data across multiple machines. This is the most exploited method use by viruses to spread and autorun on machines when inserted. This is not restraned only to USB/Pen-drive, but all devices that exposes USB interface to connect to computer. E.g Camera which provides USB to copy photos/videos to your computer, or your mobile phones to copy music/files, Kindle to copy books and external hard-disk that host huge data. Any USB/Pen-drive when connected to computer auto-runs set of files and viruses gets the entry poi