Bredy Network Management Corporation Blogs

BNMC has been serving the Andover area since 1988, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Lock Your Computer By Simply Walking Away With Dynamic Lock

Tip of the Week: Lock Your Computer By Simply Walking Away With Dynamic Lock

Security best practices demand that a workstation should never be left unlocked. However, it can be really tempting to leave it unlocked if you only plan on stepping away for a moment--but unfortunately, that moment can easily turn into many if you are distracted from your task. Fortunately, there is now a fix that relies on the one device most of us are never without: our phones.

If your computer has the Windows 10 Creators Update in place, you can connect your phone to your PC via Bluetooth so that the PC will automatically lock if the two devices are separated. This is accomplished with the help of a piconet, a short-range radio-wave network that Bluetooth devices use to function. Depending on the strength of the piconet, the devices can remain connected while further and further apart from each other.

The Creators Update allows you to create a piconet between your desktop and your phone, which keeps the Dynamic Lock from activating. However, if the phone is taken out of the piconet’s range, Dynamic Lock will lock the computer, protecting it from unauthorized users using it to access the network.

However, it must be said that Dynamic Lock is not instantaneous. First, your device has to be out of range, and secondly, the computer has to register the fact that the connection has been lost before Dynamic Lock will take affect. Regardless, activating Dynamic Lock is more secure than leaving a workstation unlocked indefinitely.

How to Set Dynamic Lock
Pairing your phone to your PC is a fairly simple process, but you should be sure to confirm the configuration with your IT department before activating Dynamic Lock.

If IT has approved the use of the Dynamic Lock feature, here is how it can be set up.

With Bluetooth enabled on the mobile device you want paired, open Settings and access Bluetooth & Other Devices. Make sure that Bluetooth is set to on. Click Add Bluetooth or Other Device, and a dialog box Add a device will open.

Once it does, select Bluetooth. Once you do, Windows will take a few moments to locate your device. Once it does, you will be prompted to confirm that the codes displayed on both your computer and your mobile device match. Once you click Done, you will be taken back to the Bluetooth & Other Devices page in Settings, where you should see your device displayed.

Now, select Home, navigate to Accounts, and select Sign-In Options. Find Dynamic Lock and make sure the box labelled Allow Windows To Detect When You're Away And Automatically Lock The Device is checked. Restart to ensure the settings are saved, and Dynamic Lock should be enabled and linked to your mobile device.

Your device should now automatically lock your workstation if brought too far out of range.

For more tips, be sure to subscribe to our blog!



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, 19 October 2017
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Cloud Technology Privacy Email Malware Hackers Hosted Solutions Business Computing Microsoft Software Ransomware Internet Network Security Computer Windows Google IT Services Backup Business Smartphone Windows 10 Innovation App Data Hardware Business Continuity Tip of the week IT Support Internet of Things Android Data Management Cloud Computing Saving Money User Tips Productivity Small Business Phishing Mobile Devices Browser Big Data Smartphones Robot Remote Monitoring Facebook Google Drive Word Upgrade Efficiency Cybersecurity Managed IT Services Artificial Intelligence Data storage Settings Data Recovery Gmail Office Tips Passwords Telephone Systems Alert LiFi Vulnerability Managed Service Provider Administration Content Filtering End of Support IT Management Productivity Analytics Virtual Private Network Risk Management Microsoft Office Network IT Support Encryption Money Unified Threat Management Outlook Antivirus Managed IT Services Monitors Chrome Save Money Hosted Solution Server Outsourced IT Workplace Tips Miscellaneous YouTube Apple SaaS communications Social Media Mobile Device Windows 10 Office 365 Disaster Recovery The Internet of Things Data loss Customer Service Patch Management Computing VoIP Scam Customer Relationship Management Office Vendor Management WiFi Operating System Cybercrime Heating/Cooling desktop Digital Politics Social Marketing Information Technology Networking Firewall Social Engineering Collaboration Samsung Best Practice Servers Spyware VPN Data Security Safety File Sharing IT solutions Google Docs Server Management Solid State Drive Employer-Employee Relationship Network Congestion Websites Hacks Google Wallet Techology Quick Tips Running Cable Business Growth Statistics Hard Disk Drive Computers Buisness Password Mail Merge Drones Unified Threat Management VoIP Cabling Virtual Desktop Laptop Hacker Bluetooth How To Deep Learning Display Address Avoiding Downtime Infrastructure Spam Alt Codes Data Backup Firefox Digital Payment Bring Your Own Device Downtime Budget Time Management Disaster Humor Typing Gadgets Search Maintenance Emergency Automation Current Events Bandwidth Mouse Network Management Uninterrupted Power Supply IBM Virtual Reality Computer Care Apps Halloween Cryptocurrency Users Business Technology Wireless Communication Going Green Education Touchscreen Corporate Profile Training Storage Scary Stories Bitcoin Managed IT Lenovo Writing Automobile Website Printing Legal Dell WannaCry Unified Communications Dark Data Sports Windows 8 Shortcut Superfish Google Maps Retail Mobile Data Web Server Processors what was your? Recovery GPS Holiday Business Management Cameras Chromebook Tracking Physical Security CCTV Emoji Document Management Tech Support Personal Information Notifications Cortana Identity Theft Travel Wi-Fi G Suite Crowdsourcing CrashOverride Virtualization Supercomputer Botnet Motion Sickness Computer Repair Taxes Government IT Budget Machine Learning Mobile Device Management User Error How To Health IT Consultant BYOD Black Market Relocation Mobile Computing Meetings Electronic Medical Records Cleaning Work/Life Balance Twitter Private Cloud Upgrades Webcam Law Enforcement Remote Computing Error Point of Sale Ben McDonald shares 3D Printing Gadget Paperless Office Unsupported Software Update Staffing Administrator

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *

      What Our Clients Say

      • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
      • 1
      • 2
      • 3