crn5000-inc2015 BPTW logo
Contact us today!
(918) 770-8738
 
 

Integrated Business Technologies Blog

Integrated Business Technologies has been serving the Broken Arrow area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Lock Your Computer By Simply Walking Away With Dynamic Lock

Security best practices demand that a workstation should never be left unlocked. However, it can be really tempting to leave it unlocked if you only plan on stepping away for a moment--but unfortunately, that moment can easily turn into many if you are distracted from your task. Fortunately, there is now a fix that relies on the one device most of us are never without: our phones.

If your computer has the Windows 10 Creators Update in place, you can connect your phone to your PC via Bluetooth so that the PC will automatically lock if the two devices are separated. This is accomplished with the help of a piconet, a short-range radio-wave network that Bluetooth devices use to function. Depending on the strength of the piconet, the devices can remain connected while further and further apart from each other.

The Creators Update allows you to create a piconet between your desktop and your phone, which keeps the Dynamic Lock from activating. However, if the phone is taken out of the piconet’s range, Dynamic Lock will lock the computer, protecting it from unauthorized users using it to access the network.

However, it must be said that Dynamic Lock is not instantaneous. First, your device has to be out of range, and secondly, the computer has to register the fact that the connection has been lost before Dynamic Lock will take affect. Regardless, activating Dynamic Lock is more secure than leaving a workstation unlocked indefinitely.

How to Set Dynamic Lock
Pairing your phone to your PC is a fairly simple process, but you should be sure to confirm the configuration with your IT department before activating Dynamic Lock.

If IT has approved the use of the Dynamic Lock feature, here is how it can be set up.

With Bluetooth enabled on the mobile device you want paired, open Settings and access Bluetooth & Other Devices. Make sure that Bluetooth is set to on. Click Add Bluetooth or Other Device, and a dialog box Add a device will open.

Once it does, select Bluetooth. Once you do, Windows will take a few moments to locate your device. Once it does, you will be prompted to confirm that the codes displayed on both your computer and your mobile device match. Once you click Done, you will be taken back to the Bluetooth & Other Devices page in Settings, where you should see your device displayed.

Now, select Home, navigate to Accounts, and select Sign-In Options. Find Dynamic Lock and make sure the box labelled Allow Windows To Detect When You're Away And Automatically Lock The Device is checked. Restart to ensure the settings are saved, and Dynamic Lock should be enabled and linked to your mobile device.

Your device should now automatically lock your workstation if brought too far out of range.

For more tips, be sure to subscribe to our blog!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 20 July 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      freeconsultation
       

      Tag Cloud

      Security Technology Tip of the Week Privacy Business Management Managed Service Provider Cloud Internet Microsoft Business Computing Best Practices Saving Money Productivity Workplace Tips IT Services Hosted Solutions Hackers Backup Email Malware Mobile Devices Software IT Support Business Small Business Hardware Network Data Communication Server Smartphones Upgrade VoIP Google Windows Computer Business Continuity Mobile Device Management Virtualization Efficiency Microsoft Office Disaster Recovery Innovation Mobile Office Vendor Management Miscellaneous Holiday Gadgets Social Media Outsourced IT BYOD Mobile Computing Android Smartphone Data Backup Quick Tips Passwords User Tips Managed IT services Network Security WiFi Bring Your Own Device Tech Term Windows 10 Browser Internet of Things The Internet of Things Best Practice Ransomware Spam Remote Monitoring Data Management Trending Operating System Apple Users Remote Computing Data Recovery Wireless Technology Alert Going Green Save Money Firewall Content Filtering Artificial Intelligence History Gmail IT Solutions Lithium-ion Battery Facebook Information Technology Current Events IT Consultant Encryption App Customer Relationship Management Unified Threat Management Managed IT Big Data Printer Tech Support Office Analytics Two-factor Authentication Saving Time Avoiding Downtime Antivirus Maintenance Document Management Cloud Computing Hard Drives Paperless Office Applications Employer-Employee Relationship Windows 8 Router Humor Collaboration Apps Compliance Automation Application Cybersecurity Virus Office Tips Retail Phishing Bandwidth Fax Server IT service Mobile Device Digital Payment Outlook Chrome Health Business Growth VPN Risk Management Productivity Marketing Website Customer Service Excel Hacking Computers Managed IT Services Phone System Government Administration Augmented Reality Presentation Project Management Budget Training Computer Repair Proactive IT Regulations Recovery Mouse Money Data Security Running Cable Social User Error Net Neutrality Licensing Co-Managed IT File Sharing PowerPoint Social Networking Wi-Fi Unified Communications Infrastructure Tablet Office 365 iPhone Password Inbound Marketing Redundancy BDR Search Virtual Desktop USB Piracy Business Owner Internet Exlporer Files Sports Smart Technology Hacker User Point of Sale Programming Mobile Security Twitter IoT Mobility Company Culture Analyitcs Education Help Desk Safety Specifications Hosted Solution IBM Tip of the week Settings Flexibility Cost Management Wireless Data storage Cybercrime Save Time Wearable Technology Robot Hiring/Firing Printing Display Alerts End of Support LiFi Computing Statistics IT Support Vulnerability Scam Intranet Competition Business Intelligence Blockchain Network Congestion HIPAA Recycling eWaste Downtime Data loss Unified Threat Management Identities IT Technicians Screen Reader Black Friday Backups Environment CIO Mobile Assessment Fraud Knowledge Telephony Access Control Solid State Drive Bluetooth Mirgation Samsung Smart Tech Identity Theft Cyber Monday Legal Online Currency Troubleshooting Debate Managing Stress IT Management Experience SharePoint Heating/Cooling Alt Codes Computer Accessories Business Technology Storage Crowdfunding Connectivity Macro Consumers YouTube Enterprise Content Management Network Management Machine Learning Downloads Typing Networking Migration Distributed Denial of Service IP Address Google Drive Vulnerabilities Windows 10 Hotspot How To Private Cloud Multi-Factor Security Refrigeration Cryptocurrency Disaster Gaming Console Touchscreen Chatbots Star Wars Managed IT Service Google Docs Geography Language Public Cloud Google Calendar Bitcoin Digital Signature Techology Identity Memory Utility Computing Software Tips Break Fix communications High-Speed Internet Server Management Computing Infrastructure Laptop Sync Legislation Hacks Conferencing Healthcare Dark Web Documents Disaster Resistance Entrepreneur Development Adminstration Cooperation Halloween Motherboard PC Care Mobile Device Managment Undo 3D Value People Hard Drive Data Warehousing 5G PDF Virtual Reality IT Consulting Cables eBay Patch Management Staff Scary Stories Modem Leadership Software as a Service Remote Support Streaming Media Cache New Additions Microsoft Excel Monitors Skype SaaS Data Breach Deep Learning Print Server Wires Text Messaging Operations Cookies G Suite Technology Tips Domains Google Wallet Work Station LinkedIn Management Scheduling Congratulations Fun Writing Chromebook Technology Laws Word Law Firm IT Video Surveillance Virtual Private Network Nanotechnology Travel Comparison Public Speaking Drones Windows 8.1 Update Best Available Buisness Enterprise Resource Planning Permissions Cortana Social Engineering

      Top Blog

      Basically, any machine that uses fans and vents to cool itself can overheat if airflow is restricted. If you have used a laptop on your lap for an extended session, then you know what we are talking about when the computer becomes hot to the touch. Every portable device is designed a little diffe...
      QR-Code