Bredy Network Management Corporation Blogs

BNMC has been serving the Andover area since 1988, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Lock Your Computer By Simply Walking Away With Dynamic Lock

Tip of the Week: Lock Your Computer By Simply Walking Away With Dynamic Lock

Security best practices demand that a workstation should never be left unlocked. However, it can be really tempting to leave it unlocked if you only plan on stepping away for a moment--but unfortunately, that moment can easily turn into many if you are distracted from your task. Fortunately, there is now a fix that relies on the one device most of us are never without: our phones.

If your computer has the Windows 10 Creators Update in place, you can connect your phone to your PC via Bluetooth so that the PC will automatically lock if the two devices are separated. This is accomplished with the help of a piconet, a short-range radio-wave network that Bluetooth devices use to function. Depending on the strength of the piconet, the devices can remain connected while further and further apart from each other.

The Creators Update allows you to create a piconet between your desktop and your phone, which keeps the Dynamic Lock from activating. However, if the phone is taken out of the piconet’s range, Dynamic Lock will lock the computer, protecting it from unauthorized users using it to access the network.

However, it must be said that Dynamic Lock is not instantaneous. First, your device has to be out of range, and secondly, the computer has to register the fact that the connection has been lost before Dynamic Lock will take affect. Regardless, activating Dynamic Lock is more secure than leaving a workstation unlocked indefinitely.

How to Set Dynamic Lock
Pairing your phone to your PC is a fairly simple process, but you should be sure to confirm the configuration with your IT department before activating Dynamic Lock.

If IT has approved the use of the Dynamic Lock feature, here is how it can be set up.

With Bluetooth enabled on the mobile device you want paired, open Settings and access Bluetooth & Other Devices. Make sure that Bluetooth is set to on. Click Add Bluetooth or Other Device, and a dialog box Add a device will open.

Once it does, select Bluetooth. Once you do, Windows will take a few moments to locate your device. Once it does, you will be prompted to confirm that the codes displayed on both your computer and your mobile device match. Once you click Done, you will be taken back to the Bluetooth & Other Devices page in Settings, where you should see your device displayed.

Now, select Home, navigate to Accounts, and select Sign-In Options. Find Dynamic Lock and make sure the box labelled Allow Windows To Detect When You're Away And Automatically Lock The Device is checked. Restart to ensure the settings are saved, and Dynamic Lock should be enabled and linked to your mobile device.

Your device should now automatically lock your workstation if brought too far out of range.

For more tips, be sure to subscribe to our blog!



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, 19 March 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Technology Cloud Email Privacy Malware Hackers Business Computing Software Internet Hosted Solutions Ransomware Microsoft Android IT Services Business Google Network Security Computer Backup Smartphone Windows Mobile Devices Data Management Small Business Windows 10 Innovation Internet of Things Data App Artificial Intelligence Hardware Encryption Server Cloud Computing Business Continuity Browser Managed Service Provider Outsourced IT Efficiency Managed IT Services Saving Money User Tips Office 365 Data Recovery Productivity Business Management Phishing Tip of the week Gmail Remote Monitoring IT Support Smartphones Google Drive Facebook Upgrade Antivirus Risk Management Data storage Money Chrome Settings Windows 10 Communication Word Productivity Vulnerability Office Tips Cybersecurity IT Management Big Data IT Support Robot Infrastructure BYOD LiFi Managed IT Services End of Support Administration Content Filtering Maintenance Analytics Data Backup Microsoft Office HIPAA Mobile Device Mobile Security Network Outlook Monitors Business Technology Save Money Holiday Data loss Telephone Systems Automation Alert Hosted Solution Mouse Virtual Reality Miscellaneous Bandwidth Workplace Tips Firewall Two-factor Authentication Apple SaaS Storage YouTube Scam communications Social Media Employer-Employee Relationship Disaster Recovery VPN Computing Data Security Government Server Management Passwords Virtual Private Network Unified Threat Management Regulations Tablet Statistics Best Practice Marketing Digital Payment Blockchain Mail Merge Firefox Unified Threat Management VoIP Disaster Augmented Reality Safety Comparison Google Docs Bluetooth Permissions Network Congestion Address Hacks User Error IT solutions Google Wallet Avoiding Downtime Uninterrupted Power Supply Wearable Technology Wi-Fi Specifications Business Growth IBM Computer Care Wireless Fraud Computers Password Printer Drones Time Management Running Cable Training Black Friday Search Buisness Hacker Corporate Profile Automobile Display Emergency Virtual Desktop Access Control Network Management Laptop Dell Paperless Office Applications Cyber Monday Deep Learning Alt Codes WannaCry Google Maps Hotspot SharePoint Spam Budget Touchscreen IT Technicians Smart Technology Bring Your Own Device Humor Managed IT Downtime Typing Current Events Language Lenovo Downloads desktop Gadgets Mirgation Politics Distributed Denial of Service Shortcut Cryptocurrency Digital Going Green Collaboration Remote Computing Computing Infrastructure Superfish Samsung Apps Halloween Users Chatbots Document Management Tech Support Managed IT Service Patch Management Bitcoin Spyware Education Printing Customer Relationship Management File Sharing Alerts Writing Multi-Factor Security Legal Heating/Cooling Scary Stories Solid State Drive Identity Identity Theft Websites Break Fix Dark Data Website Windows 8 Licensing Retail Networking Google Calendar Unified Communications Servers Sports Hard Disk Drive Tech Term Dark Web Customer Service The Internet of Things Cabling Cooperation Office Compliance Vendor Management Legislation Operating System VoIP Microsoft Excel Social How To Techology WiFi Information Technology Quick Tips Cybercrime Staff Social Engineering Physical Security IT Consultant Relocation Emoji Meetings Work/Life Balance Personal Information Cleaning Private Cloud Cortana Webcam Law Enforcement Error Virtualization Ben McDonald shares Point of Sale Gadget Computer Repair Mobile Device Management How To Staffing Health Mobile Computing Administrator Black Market Processors what was your? Web Server GPS Electronic Medical Records Twitter Upgrades Cameras Tracking 3D Printing CCTV Notifications Unsupported Software Update Travel Crowdsourcing Mobile Data G Suite Supercomputer Botnet Recovery CrashOverride Motion Sickness Taxes IT Budget Machine Learning Chromebook

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *

      What Our Clients Say

      • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
      • 1
      • 2
      • 3