crn5000-inc2015 BPTW logo
Contact us today!
(918) 770-8738

Integrated Business Technologies Blog

Integrated Business Technologies has been serving the Broken Arrow area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Lock Your Computer By Simply Walking Away With Dynamic Lock

Security best practices demand that a workstation should never be left unlocked. However, it can be really tempting to leave it unlocked if you only plan on stepping away for a moment--but unfortunately, that moment can easily turn into many if you are distracted from your task. Fortunately, there is now a fix that relies on the one device most of us are never without: our phones.

If your computer has the Windows 10 Creators Update in place, you can connect your phone to your PC via Bluetooth so that the PC will automatically lock if the two devices are separated. This is accomplished with the help of a piconet, a short-range radio-wave network that Bluetooth devices use to function. Depending on the strength of the piconet, the devices can remain connected while further and further apart from each other.

The Creators Update allows you to create a piconet between your desktop and your phone, which keeps the Dynamic Lock from activating. However, if the phone is taken out of the piconet’s range, Dynamic Lock will lock the computer, protecting it from unauthorized users using it to access the network.

However, it must be said that Dynamic Lock is not instantaneous. First, your device has to be out of range, and secondly, the computer has to register the fact that the connection has been lost before Dynamic Lock will take affect. Regardless, activating Dynamic Lock is more secure than leaving a workstation unlocked indefinitely.

How to Set Dynamic Lock
Pairing your phone to your PC is a fairly simple process, but you should be sure to confirm the configuration with your IT department before activating Dynamic Lock.

If IT has approved the use of the Dynamic Lock feature, here is how it can be set up.

With Bluetooth enabled on the mobile device you want paired, open Settings and access Bluetooth & Other Devices. Make sure that Bluetooth is set to on. Click Add Bluetooth or Other Device, and a dialog box Add a device will open.

Once it does, select Bluetooth. Once you do, Windows will take a few moments to locate your device. Once it does, you will be prompted to confirm that the codes displayed on both your computer and your mobile device match. Once you click Done, you will be taken back to the Bluetooth & Other Devices page in Settings, where you should see your device displayed.

Now, select Home, navigate to Accounts, and select Sign-In Options. Find Dynamic Lock and make sure the box labelled Allow Windows To Detect When You're Away And Automatically Lock The Device is checked. Restart to ensure the settings are saved, and Dynamic Lock should be enabled and linked to your mobile device.

Your device should now automatically lock your workstation if brought too far out of range.

For more tips, be sure to subscribe to our blog!



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, 17 October 2017
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!


      Tag Cloud

      Security Technology Privacy Managed Service Provider Business Management Tip of the Week Internet Microsoft Saving Money Cloud Productivity Business Computing Workplace Tips Backup IT Services Best Practices Hackers Hosted Solutions IT Support Network Mobile Devices Business Hardware Email Malware Software Small Business Data Communication Smartphones Server Upgrade Windows Business Continuity Mobile Device Management Microsoft Office VoIP Virtualization Disaster Recovery Google Efficiency Computer Miscellaneous Mobile Office Vendor Management Gadgets Quick Tips Innovation Social Media Windows 10 Mobile Computing Holiday WiFi Passwords Smartphone BYOD User Tips Best Practice Bring Your Own Device Remote Monitoring Wireless Technology Trending Operating System Apple Users Spam Android History Alert Going Green The Internet of Things Internet of Things Content Filtering Remote Computing Unified Threat Management Browser IT Solutions Save Money Lithium-ion Battery Big Data Information Technology Office Current Events IT Consultant Managed IT services Firewall Network Security Ransomware Customer Relationship Management Windows 8 Gmail Printer Tech Support Humor Analytics Facebook Saving Time Data Management Avoiding Downtime App Hard Drives Artificial Intelligence Outlook Health Phishing IT service Managed IT Business Growth Marketing Data Backup Excel Customer Service Phone System Hacking Computers Outsourced IT Apps Application Collaboration Virus Antivirus Maintenance Fax Server Office Tips Retail VPN PowerPoint Risk Management Running Cable Router Inbound Marketing iPhone Employer-Employee Relationship Administration Password Proactive IT Training Presentation Computer Repair Budget Automation Social Recovery Digital Payment Co-Managed IT Mobile Device Analyitcs Money Education File Sharing Mobility Safety Social Networking Licensing Settings Hosted Solution Display Tablet Wireless Data storage Chrome Save Time Cybercrime Robot Hiring/Firing Intranet Printing End of Support Business Intelligence LiFi Website Statistics Files Augmented Reality Competition Piracy Network Congestion Data Recovery Downtime Sports Two-factor Authentication Search Point of Sale Virtual Desktop Mouse USB Business Owner Help Desk Encryption Document Management Project Management Net Neutrality Hacker User Error Programming User IBM Cybersecurity Networking IP Address Google Drive How To Bandwidth Refrigeration Cryptocurrency Disaster Wearable Technology Data Security Google Docs Conferencing Specifications Flexibility Adminstration Cost Management 3D Bitcoin Alerts Digital Signature PC Care Software Tips Techology Value Memory Laptop communications eBay Hacks Remote Support Leadership Disaster Resistance Skype Wi-Fi Streaming Media Documents New Additions Scam Halloween SaaS Print Server Entrepreneur Unified Communications Text Messaging Managed IT Services Undo Work Station IT Consulting LinkedIn 5G PDF Scheduling Congratulations People Video Surveillance Scary Stories Telephony Law Firm IT Data loss Windows 8.1 Update Computing Recycling Data Breach Best Available Office 365 Monitors Deep Learning Tip of the week Domains Google Wallet Technology Laws Fun Writing Word Private Cloud Bluetooth Online Currency Public Speaking Drones Unified Threat Management Cortana Social Engineering eWaste Buisness Identities Computer Accessories Public Cloud Virtual Private Network Backups Macro Knowledge Environment CIO Solid State Drive Sync Redundancy Company Culture Legal Twitter Samsung Debate Experience Compliance Troubleshooting Heating/Cooling Gaming Console Alt Codes Touchscreen Mobile Device Managment Consumers Crowdfunding Regulations YouTube Typing

      Top Blog

      Basically, any machine that uses fans and vents to cool itself can overheat if airflow is restricted. If you have used a laptop on your lap for an extended session, then you know what we are talking about when the computer becomes hot to the touch. Every portable device is designed a little diffe...