Bredy Network Management Corporation Blogs

2 minutes reading time (468 words)

Tip of the Week: Lock Your Computer By Simply Walking Away With Dynamic Lock

Tip of the Week: Lock Your Computer By Simply Walking Away With Dynamic Lock

Security best practices demand that a workstation should never be left unlocked. However, it can be really tempting to leave it unlocked if you only plan on stepping away for a moment--but unfortunately, that moment can easily turn into many if you are distracted from your task. Fortunately, there is now a fix that relies on the one device most of us are never without: our phones.

If your computer has the Windows 10 Creators Update in place, you can connect your phone to your PC via Bluetooth so that the PC will automatically lock if the two devices are separated. This is accomplished with the help of a piconet, a short-range radio-wave network that Bluetooth devices use to function. Depending on the strength of the piconet, the devices can remain connected while further and further apart from each other.

The Creators Update allows you to create a piconet between your desktop and your phone, which keeps the Dynamic Lock from activating. However, if the phone is taken out of the piconet’s range, Dynamic Lock will lock the computer, protecting it from unauthorized users using it to access the network.

However, it must be said that Dynamic Lock is not instantaneous. First, your device has to be out of range, and secondly, the computer has to register the fact that the connection has been lost before Dynamic Lock will take affect. Regardless, activating Dynamic Lock is more secure than leaving a workstation unlocked indefinitely.

How to Set Dynamic Lock
Pairing your phone to your PC is a fairly simple process, but you should be sure to confirm the configuration with your IT department before activating Dynamic Lock.

If IT has approved the use of the Dynamic Lock feature, here is how it can be set up.

With Bluetooth enabled on the mobile device you want paired, open Settings and access Bluetooth & Other Devices. Make sure that Bluetooth is set to on. Click Add Bluetooth or Other Device, and a dialog box Add a device will open.

Once it does, select Bluetooth. Once you do, Windows will take a few moments to locate your device. Once it does, you will be prompted to confirm that the codes displayed on both your computer and your mobile device match. Once you click Done, you will be taken back to the Bluetooth & Other Devices page in Settings, where you should see your device displayed.

Now, select Home, navigate to Accounts, and select Sign-In Options. Find Dynamic Lock and make sure the box labelled Allow Windows To Detect When You're Away And Automatically Lock The Device is checked. Restart to ensure the settings are saved, and Dynamic Lock should be enabled and linked to your mobile device.

Your device should now automatically lock your workstation if brought too far out of range.

For more tips, be sure to subscribe to our blog!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, July 23 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Technology Cloud Email Malware Privacy Business Computing Hackers Internet Software Microsoft Google Business Computer Hosted Solutions Mobile Devices Ransomware Network Security Managed IT Services Smartphone Android IT Services Tech Term Hardware Data Management Windows Small Business Backup IT Support Windows 10 User Tips Internet of Things Cloud Computing Data Cybersecurity Browser Innovation App Business Continuity Business Management Encryption Server Facebook Remote Monitoring Gmail Artificial Intelligence Data Recovery Saving Money Windows 10 Office 365 Infrastructure Disaster Recovery Managed IT Services Tip of the week Productivity Smartphones Outsourced IT Word Data Backup Vulnerability Chrome Managed Service Provider Productivity Phishing Efficiency IT Support Money Communication Office Tips Applications Government Google Drive Microsoft Office Bandwidth Passwords Big Data Content Filtering Antivirus Upgrade Analytics Settings communications Employer-Employee Relationship Robot IT Management Data storage Network YouTube Social Media Risk Management Website WiFi Unified Threat Management SaaS LiFi Data loss Telephone Systems Hosted Solution The Internet of Things Two-factor Authentication Holiday Administration BYOD Mouse Avoiding Downtime Alert Miscellaneous Firewall Company Culture VoIP Maintenance Scam Apple Storage Managing Stress Wireless Vendor Management Monitors Save Money VPN Workplace Tips Data Security Mobile Device Server Management Business Technology Automation HIPAA Paperless Office Virtual Private Network End of Support Virtual Reality Outlook Spam Computing Mobile Security Downloads Work Buisness Mail Merge Blockchain Network Congestion Smart Tech Bring Your Own Device Operating System Cooperation Service Level Agreement Social Sports Shortcut Distributed Denial of Service Router Voice over Internet Protocol Budget Virtual Desktop VoIP Unified Threat Management Typing Humor Laptop Bluetooth Comparison Compliance Wi-Fi Business Intelligence Information Technology Firefox Superfish Hotspot Writing Internet Exlporer Digital Payment IT Technicians Optimization Current Events desktop Address Permissions Computers Connectivity Best Practice User Error Staff Leominster Disaster Patch Management Managed IT Service Dark Data Modem FinTech Digital Retail Value Cryptocurrency Collaboration Specifications Regulations Apps Customer Relationship Management Language Google Docs Cybercrime Heating/Cooling Multi-Factor Security Mirgation Recycling Politics IT solutions Going Green Downtime Display IoT Time Management Printer Augmented Reality K-12 Schools Education Hacks Marketing Uninterrupted Power Supply Break Fix Customer Service Cookies MSP Document Management Spyware Computing Infrastructure Office Professional Services Samsung Bitcoin Gadgets File Sharing Search Black Friday Social Networking Google Wallet Computer Care IBM Networking Business Growth Servers Google Calendar Chatbots eWaste Tech Support Printing Solid State Drive Emergency Star Wars Network Management Access Control Wearable Technology Network upgrade Password Dark Web Nanotechnology Chromebook Development Legal Identity Theft Alerts Social Engineering USB Windows 8 Users Halloween Cyber Monday Motherboard Cables Unified Communications Drones Training Corporate Profile Hacker Automobile Legislation Identity Continuity Websites Hard Disk Drive Fraud Cost Management Touchscreen SharePoint Smart Office Dell Microsoft Excel Screen Reader Charging Deep Learning Licensing Safety Dongle Scary Stories Cabling Managed IT Smart Technology Wires WannaCry Quick Tips Techology Alt Codes Running Cable Google Maps Statistics Tablet Solar How To Lenovo Assessment Remote Computing IT Budget 3D Printing Mobile Computing Web Server what was your? Cortana GPS Machine Learning IT Consultant Processors Unsupported Software Cameras Virtualization Meetings Update Tracking Computer Repair Relocation Cleaning Mobile Data CCTV How To Work/Life Balance Webcam Recovery Health Private Cloud Error Black Market Law Enforcement Point of Sale Ben McDonald shares Notifications Travel Electronic Medical Records Physical Security G Suite Twitter Supercomputer CrashOverride Upgrades Gadget Mobile Device Management Emoji Crowdsourcing Motion Sickness BDR Staffing Administrator Personal Information Botnet Taxes

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *

      What Our Clients Say

      • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
      • 1
      • 2
      • 3