ArtsAutosBooksBusinessEducationEntertainmentFamilyFashionFoodGamesGenderHealthHolidaysHomeHubPagesPersonal FinancePetsPoliticsReligionSportsTechnologyTravel

How to Use Find My iPhone to Protect Your iPhone

Updated on December 29, 2017
amuno profile image

Alfred is a long-time teacher and computer enthusiast who works with and troubleshoots a wide range of computing devices.

When the little known doulCi team got the better of iCloud Activation Lock in May 2014, privacy questions were raised again, and we wondered if Apple was capable of staying ahead of the game. It was early Christmas for hackers and the same old story for Apple.

The Christmas was short lived though as Apple worked around the clock to zip up lingering exploits in IOS firmware.

Despite doulCi and other security hacks though, you can still use Find My iPhone and other security features to protect against iPhone theft data compromise.

Use Find My iPhone in iCloud to find a lost iPhone
Use Find My iPhone in iCloud to find a lost iPhone

1. Use Passcode or Touch ID

Your first line of defense against iPhone and data theft is the passcode lock. It is a security feature which requires enabling and thereafter inputting a passcode in order to access the iPhone homescreen. It is integrated within all IOS versions.

Touch ID fingerprint sensor is an additional line of defense for owners of iPhone 5S and iPhone 6 and 6 Plus.

Use the iPhone pass code to secure it against theft
Use the iPhone pass code to secure it against theft

One example of the value of the passcode was illustrated when in May 2014, in Australia, a cracker remotely took control of a handful iPhones and demanded a fee from their owners before he could unlock their devices.

Affected users that had enabled passcode lock were able to access their devices once they keyed in the passwords. Those without passcode security remained locked.

A passcode enabled iPhone will also give you plenty of time to report a lost iPhone to Police and just in case Find My iPhone is enabled, it will also give you extra time to track it down before someone turns it off.

In addition to other security features, the passcode makes it hard for the iPhone thief to read through your data and flip through your photos.

Set up a passcode
Set up a Touch ID

Is passcode security enabled in your iPhone?

See results

2. Activate Find My iPhone – Activation Lock

Find My iPhone has been part of iPhone operating system since 2010 but took center stage in 2011 following reports of increasing iPhone theft.

Go to Settings iCloud to setup iCloud account
Go to Settings iCloud to setup iCloud account

2011 was also the year that Apple launched iCloud and besides the storage services it provided, iCloud made it possible for Apple device owners to send notifications to lost devices.

The Activation Lock feature was bundled in IOS 7 as a bonus to Find My iPhone.

The activation lock requires that you type the Apple ID credentials anytime you wish to turn off Find My iPhone, sign out of iCloud or erase your iPhone. This applies to the bad guys as well. Because they want to turn off Find My iPhone, they will have to fill in your Apple ID which they probably don't have.

When Find My iPhone is enabled in your device, you can use your iCloud account via a desktop browser, or the Find My iPhone app in another Apple device to track a missing iPhone.

iCloud account and Find My iPhone app will send a custom message or sound to alert the person with your iPhone that it is lost.

Perhaps the most reassuring thought even in the aftermath of doulCi hack, is that your data will remain safe after the activation bypass. Most times the activation notice will pop up after an iPhone has been erased or restored by you and the thief respectively.

To activate Find My iPhone or Activation Lock, simply log into iCloud in your device and the rest will be taken care of.

To log in to iCloud, tap Settings>iCloud

iCloud locating a missing Apple device
iCloud locating a missing Apple device

3. Enable Data Connection When Outdoors

We all disable data connection once in a while because we want to preserve the draining battery in the iPhone. Intensive data use leads to excessive heat and thus lessening battery hours, and weakening battery over time.

Toggle 3G connectivity on and off as you choose to save battery life
Toggle 3G connectivity on and off as you choose to save battery life

For the same reason, you may actually enable data connectivity only when you need it.

For security reasons however, make it a point to leave data connection enabled most of the time, especially when you are out of the house. At least disable 3G or 4G connectivity. I am imaging this is when thieves are bound to strike, or you are most likely to misplace your iPhone for one reason or another.

A running data connection in addition to enabled Find My iPhone feature should be the starting point for you to track your iPhone.

By remote use of another Apple device or iCloud in the browser, you should be able to see where your iPhone is before it is turned off.

Never mind about data bundle itself, for you should be able to activate additional data remotely. Most service providers around the world permit remote data activation.

4. Install and Use Security Apps to Track a Lost iPhone

Aside from the tracking capabilities installed in the iPhone and IOS, i.e. Find My iPhone, you may want to take advantage of third party apps to help track a missing iPhone.

Third party apps can be downloaded from App Store and Google Play.

Prey Anti Theft for Android

Besides using your laptop or desktop computer to track a lost iPhone, you can track it using Prey Anti Theft Android app. This app uses geo-location to track location, and front and rear camera to take pictures of whoever is using your iPhone.

Of course you will need an Android device to do this. If you own an Android device or a friend of yours does, why not help track each other in case your devices get misplaced?

Prey Anti Theft is also available for iPhone and can as well track Android devices.

Prey Anti Theft is available for free from App Store and Google Play.

Prey Anti Theft can be installed in Android phone or iPhone to track another iPhone or Android phone
Prey Anti Theft can be installed in Android phone or iPhone to track another iPhone or Android phone

Find My Friends

Find My Friends is a social app that is meant to locate friends and family for social purposes.

Find My Friends is a sneaky app I must add, but again if you find it socially acceptable to track each other for pleasure then an additional feature to track misplaced and stolen devices should be a bonus.

Once installed in your IOS or Android device, you can add friends or get added in friends’ circles so as to locate each other for not only social activities but cell phone tracking as well.

Find My Friends is available for free from App Store and Google Play.

Find My Friends social app can help track a lost iPhone
Find My Friends social app can help track a lost iPhone

A Word Of Warning

If you think you have successfully tracked down a thief in possession of your iPhone, exercise wisdom when deciding to approach him or her. Avoid superman sentimentalities and seek the services of law enforcement officers to effect arrest.

5. Do Not 'Trust This Computer'

The Trust This Computer feature Was introduced with IOS 7. It will pop up every now and then whenever you connect your iPhone to a new computer. You can choose to Trust or Don’t Trust a computer depending on what you want to do with it.

Trust ONLY your computer to safeguard information in your iPhone
Trust ONLY your computer to safeguard information in your iPhone

The warning will pop up when you connect your iPhone without a passcode to a computer. It will also pop up when you punch in access passcode in an iPhone that is connected to a computer.

If you trust a computer,

  • The data in your iPhone will sync with that computer if iTunes is installed and running.
  • Your files, especially photos will be accessed using that computer if your iPhone is not passcode protected

If you don’t trust a computer, none of the above will happen.

You do not want to trust any computer except yours.


The warning will pop up when you connect your iPhone without a passcode to a computer. It will also pop up when you punch in access passcode in an iPhone that is connected to a computer.

6. Do Not Jailbreak Your iPhone

As much as iPhone jailbreak is a pleasurable hactivity, it also creates a back door for crackers and mad men to access your iPhone.

A jailbroken iPhone and IOS spotting Cydia
A jailbroken iPhone and IOS spotting Cydia

Jailbreaking an iPhone practically opens up the IOS sandbox environment which is a hallmark of iPhone security.

Your enemies are not only the phone pickpockets in the alleys, but also data snippers that prowl the internet.

A jailbroken iPhone allows cracker developers to,

  • Have root access to your iPhone
  • Track your location
  • Install malware
  • Install keyloggers

Just in case jailbreaking is your bread and butter, ensure to install apps you are sure of, in order to be safe.

© 2014 Alfred Amuno

working

This website uses cookies

As a user in the EEA, your approval is needed on a few things. To provide a better website experience, hubpages.com uses cookies (and other similar technologies) and may collect, process, and share personal data. Please choose which areas of our service you consent to our doing so.

For more information on managing or withdrawing consents and how we handle data, visit our Privacy Policy at: https://corp.maven.io/privacy-policy

Show Details
Necessary
HubPages Device IDThis is used to identify particular browsers or devices when the access the service, and is used for security reasons.
LoginThis is necessary to sign in to the HubPages Service.
Google RecaptchaThis is used to prevent bots and spam. (Privacy Policy)
AkismetThis is used to detect comment spam. (Privacy Policy)
HubPages Google AnalyticsThis is used to provide data on traffic to our website, all personally identifyable data is anonymized. (Privacy Policy)
HubPages Traffic PixelThis is used to collect data on traffic to articles and other pages on our site. Unless you are signed in to a HubPages account, all personally identifiable information is anonymized.
Amazon Web ServicesThis is a cloud services platform that we used to host our service. (Privacy Policy)
CloudflareThis is a cloud CDN service that we use to efficiently deliver files required for our service to operate such as javascript, cascading style sheets, images, and videos. (Privacy Policy)
Google Hosted LibrariesJavascript software libraries such as jQuery are loaded at endpoints on the googleapis.com or gstatic.com domains, for performance and efficiency reasons. (Privacy Policy)
Features
Google Custom SearchThis is feature allows you to search the site. (Privacy Policy)
Google MapsSome articles have Google Maps embedded in them. (Privacy Policy)
Google ChartsThis is used to display charts and graphs on articles and the author center. (Privacy Policy)
Google AdSense Host APIThis service allows you to sign up for or associate a Google AdSense account with HubPages, so that you can earn money from ads on your articles. No data is shared unless you engage with this feature. (Privacy Policy)
Google YouTubeSome articles have YouTube videos embedded in them. (Privacy Policy)
VimeoSome articles have Vimeo videos embedded in them. (Privacy Policy)
PaypalThis is used for a registered author who enrolls in the HubPages Earnings program and requests to be paid via PayPal. No data is shared with Paypal unless you engage with this feature. (Privacy Policy)
Facebook LoginYou can use this to streamline signing up for, or signing in to your Hubpages account. No data is shared with Facebook unless you engage with this feature. (Privacy Policy)
MavenThis supports the Maven widget and search functionality. (Privacy Policy)
Marketing
Google AdSenseThis is an ad network. (Privacy Policy)
Google DoubleClickGoogle provides ad serving technology and runs an ad network. (Privacy Policy)
Index ExchangeThis is an ad network. (Privacy Policy)
SovrnThis is an ad network. (Privacy Policy)
Facebook AdsThis is an ad network. (Privacy Policy)
Amazon Unified Ad MarketplaceThis is an ad network. (Privacy Policy)
AppNexusThis is an ad network. (Privacy Policy)
OpenxThis is an ad network. (Privacy Policy)
Rubicon ProjectThis is an ad network. (Privacy Policy)
TripleLiftThis is an ad network. (Privacy Policy)
Say MediaWe partner with Say Media to deliver ad campaigns on our sites. (Privacy Policy)
Remarketing PixelsWe may use remarketing pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to advertise the HubPages Service to people that have visited our sites.
Conversion Tracking PixelsWe may use conversion tracking pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to identify when an advertisement has successfully resulted in the desired action, such as signing up for the HubPages Service or publishing an article on the HubPages Service.
Statistics
Author Google AnalyticsThis is used to provide traffic data and reports to the authors of articles on the HubPages Service. (Privacy Policy)
ComscoreComScore is a media measurement and analytics company providing marketing data and analytics to enterprises, media and advertising agencies, and publishers. Non-consent will result in ComScore only processing obfuscated personal data. (Privacy Policy)
Amazon Tracking PixelSome articles display amazon products as part of the Amazon Affiliate program, this pixel provides traffic statistics for those products (Privacy Policy)
ClickscoThis is a data management platform studying reader behavior (Privacy Policy)