Bredy Network Management Corporation Blogs

BNMC has been serving the Andover area since 1988, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Lock Your Computer By Simply Walking Away With Dynamic Lock

Tip of the Week: Lock Your Computer By Simply Walking Away With Dynamic Lock

Security best practices demand that a workstation should never be left unlocked. However, it can be really tempting to leave it unlocked if you only plan on stepping away for a moment--but unfortunately, that moment can easily turn into many if you are distracted from your task. Fortunately, there is now a fix that relies on the one device most of us are never without: our phones.

If your computer has the Windows 10 Creators Update in place, you can connect your phone to your PC via Bluetooth so that the PC will automatically lock if the two devices are separated. This is accomplished with the help of a piconet, a short-range radio-wave network that Bluetooth devices use to function. Depending on the strength of the piconet, the devices can remain connected while further and further apart from each other.

The Creators Update allows you to create a piconet between your desktop and your phone, which keeps the Dynamic Lock from activating. However, if the phone is taken out of the piconet’s range, Dynamic Lock will lock the computer, protecting it from unauthorized users using it to access the network.

However, it must be said that Dynamic Lock is not instantaneous. First, your device has to be out of range, and secondly, the computer has to register the fact that the connection has been lost before Dynamic Lock will take affect. Regardless, activating Dynamic Lock is more secure than leaving a workstation unlocked indefinitely.

How to Set Dynamic Lock
Pairing your phone to your PC is a fairly simple process, but you should be sure to confirm the configuration with your IT department before activating Dynamic Lock.

If IT has approved the use of the Dynamic Lock feature, here is how it can be set up.

With Bluetooth enabled on the mobile device you want paired, open Settings and access Bluetooth & Other Devices. Make sure that Bluetooth is set to on. Click Add Bluetooth or Other Device, and a dialog box Add a device will open.

Once it does, select Bluetooth. Once you do, Windows will take a few moments to locate your device. Once it does, you will be prompted to confirm that the codes displayed on both your computer and your mobile device match. Once you click Done, you will be taken back to the Bluetooth & Other Devices page in Settings, where you should see your device displayed.

Now, select Home, navigate to Accounts, and select Sign-In Options. Find Dynamic Lock and make sure the box labelled Allow Windows To Detect When You're Away And Automatically Lock The Device is checked. Restart to ensure the settings are saved, and Dynamic Lock should be enabled and linked to your mobile device.

Your device should now automatically lock your workstation if brought too far out of range.

For more tips, be sure to subscribe to our blog!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 17 December 2017
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Technology Cloud Privacy Email Malware Hackers Business Computing Hosted Solutions Internet Microsoft IT Services Business Ransomware Software Network Security Computer Windows Google Backup Smartphone Small Business Windows 10 Android App Hardware Data Management Data Business Continuity Browser Innovation Tip of the week Cloud Computing IT Support Saving Money Remote Monitoring Artificial Intelligence Managed IT Services Productivity Outsourced IT Phishing User Tips Office 365 Data Recovery Smartphones Internet of Things Mobile Devices Productivity Efficiency Cybersecurity Robot Risk Management Google Drive IT Support Upgrade Settings Data storage Money Gmail Office Tips Big Data Word Facebook Managed Service Provider Administration Content Filtering Computing Employer-Employee Relationship Analytics Vulnerability End of Support Government IT Management Unified Threat Management Network Managed IT Services Encryption Virtual Private Network Maintenance Microsoft Office Chrome Server Hosted Solution Workplace Tips Outlook Antivirus Data Backup YouTube Monitors Save Money Mobile Device Social Media communications Mouse Miscellaneous Disaster Recovery Apple Telephone Systems SaaS Passwords Alert Windows 10 Firewall LiFi File Sharing Two-factor Authentication Solid State Drive Managed IT Service Customer Service Patch Management Scam Customer Relationship Management Office Websites Vendor Management Multi-Factor Security Operating System Heating/Cooling IT solutions Hard Disk Drive Break Fix Social Networking Information Technology Social Engineering Cabling Running Cable Google Calendar Servers Best Practice Buisness Dark Web VPN Data Security How To Virtual Desktop Safety Infrastructure Laptop Legislation Google Docs Server Management Deep Learning Microsoft Excel Network Congestion BYOD Hacks Techology Google Wallet Quick Tips Firefox Digital Payment Disaster Tablet Statistics Business Growth Spam Bring Your Own Device Downtime Computers Mail Merge Password Unified Threat Management Drones VoIP Uninterrupted Power Supply Gadgets Comparison Bluetooth Hacker IBM Computer Care Display Address User Error Avoiding Downtime Bandwidth Wireless Halloween Users Specifications Alt Codes Apps Corporate Profile Training Automobile Printer Budget Time Management Education Dell Scary Stories Black Friday Humor Search Typing Emergency Current Events WannaCry Website Automation Access Control Network Management Google Maps Sports Virtual Reality Cyber Monday Cryptocurrency Unified Communications Business Technology Going Green Data loss Communication Business Management SharePoint Touchscreen The Internet of Things desktop Smart Technology Storage Managed IT Bitcoin Lenovo Printing Digital VoIP Writing Politics Collaboration Downloads Legal WiFi Cybercrime Marketing Distributed Denial of Service Dark Data Samsung Shortcut Windows 8 Superfish Spyware Retail Mobile Data Recovery Notifications Identity Theft Travel Chromebook G Suite Crowdsourcing CrashOverride Supercomputer Botnet Physical Security Motion Sickness Emoji Taxes Machine Learning IT Budget Personal Information Cortana IT Consultant Relocation Wi-Fi Meetings Virtualization Cleaning Work/Life Balance Private Cloud Computer Repair Webcam Mobile Device Management Law Enforcement How To Error Ben McDonald shares Health Point of Sale Mobile Computing Black Market Gadget Electronic Medical Records Paperless Office Twitter Staffing Upgrades Administrator what was your? Web Server Processors Remote Computing GPS Holiday 3D Printing Cameras Tracking Unsupported Software Update CCTV Document Management Tech Support

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *

      What Our Clients Say

      • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
      • 1
      • 2
      • 3