crn5000-inc2015 BPTW logo
Contact us today!
(918) 770-8738

Integrated Business Technologies Blog

Integrated Business Technologies has been serving the Broken Arrow area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Lock Your Computer By Simply Walking Away With Dynamic Lock

Security best practices demand that a workstation should never be left unlocked. However, it can be really tempting to leave it unlocked if you only plan on stepping away for a moment--but unfortunately, that moment can easily turn into many if you are distracted from your task. Fortunately, there is now a fix that relies on the one device most of us are never without: our phones.

If your computer has the Windows 10 Creators Update in place, you can connect your phone to your PC via Bluetooth so that the PC will automatically lock if the two devices are separated. This is accomplished with the help of a piconet, a short-range radio-wave network that Bluetooth devices use to function. Depending on the strength of the piconet, the devices can remain connected while further and further apart from each other.

The Creators Update allows you to create a piconet between your desktop and your phone, which keeps the Dynamic Lock from activating. However, if the phone is taken out of the piconet’s range, Dynamic Lock will lock the computer, protecting it from unauthorized users using it to access the network.

However, it must be said that Dynamic Lock is not instantaneous. First, your device has to be out of range, and secondly, the computer has to register the fact that the connection has been lost before Dynamic Lock will take affect. Regardless, activating Dynamic Lock is more secure than leaving a workstation unlocked indefinitely.

How to Set Dynamic Lock
Pairing your phone to your PC is a fairly simple process, but you should be sure to confirm the configuration with your IT department before activating Dynamic Lock.

If IT has approved the use of the Dynamic Lock feature, here is how it can be set up.

With Bluetooth enabled on the mobile device you want paired, open Settings and access Bluetooth & Other Devices. Make sure that Bluetooth is set to on. Click Add Bluetooth or Other Device, and a dialog box Add a device will open.

Once it does, select Bluetooth. Once you do, Windows will take a few moments to locate your device. Once it does, you will be prompted to confirm that the codes displayed on both your computer and your mobile device match. Once you click Done, you will be taken back to the Bluetooth & Other Devices page in Settings, where you should see your device displayed.

Now, select Home, navigate to Accounts, and select Sign-In Options. Find Dynamic Lock and make sure the box labelled Allow Windows To Detect When You're Away And Automatically Lock The Device is checked. Restart to ensure the settings are saved, and Dynamic Lock should be enabled and linked to your mobile device.

Your device should now automatically lock your workstation if brought too far out of range.

For more tips, be sure to subscribe to our blog!



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, 22 February 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!


      Tag Cloud

      Security Technology Tip of the Week Business Management Privacy Managed Service Provider Internet Microsoft Cloud Saving Money Productivity Business Computing Workplace Tips IT Services Best Practices Backup Hackers Hosted Solutions Business Mobile Devices Malware Email Small Business IT Support Software Network Hardware Smartphones Data Server Communication Windows Upgrade Business Continuity Mobile Device Management VoIP Efficiency Microsoft Office Google Virtualization Disaster Recovery Computer Vendor Management Miscellaneous Mobile Office Gadgets Holiday Innovation Social Media Quick Tips Android Outsourced IT User Tips Mobile Computing WiFi BYOD Smartphone Windows 10 Best Practice Passwords Remote Monitoring Browser Bring Your Own Device Users Internet of Things The Internet of Things Trending Wireless Technology Operating System Network Security Apple Spam Firewall Alert Managed IT services Content Filtering Remote Computing Going Green History Big Data Office Analytics Data Management IT Solutions Unified Threat Management Lithium-ion Battery Save Money IT Consultant Data Backup Ransomware Printer Tech Support Current Events Gmail Information Technology Managed IT Avoiding Downtime Maintenance Hard Drives App Customer Relationship Management Facebook Encryption Windows 8 Antivirus Humor Artificial Intelligence Saving Time Virus Employer-Employee Relationship Customer Service Hacking Computers Fax Server Data Recovery Phone System Outlook Health Collaboration Two-factor Authentication Marketing Automation Excel Office Tips Retail Phishing Document Management IT service Digital Payment Business Growth Risk Management Apps Application Tablet Cybersecurity Office 365 Applications iPhone User Error Password Co-Managed IT Administration Augmented Reality Presentation Budget Computer Repair Proactive IT Router Project Management Recovery Inbound Marketing Mouse Money Net Neutrality Running Cable Social Licensing Mobile Device Chrome Data Security VPN PowerPoint Training Tip of the week End of Support LiFi Website Computing Statistics Help Desk Mobility Intranet Competition Business Intelligence Government Network Congestion Downtime Search HIPAA Files Virtual Desktop USB Piracy Business Owner Redundancy Sports Hacker User Point of Sale Programming Scam Analyitcs Bandwidth Education Specifications Managed IT Services Mobile Security Safety Settings Flexibility Hosted Solution IBM Wireless Data storage Paperless Office Cybercrime File Sharing Save Time Wearable Technology Social Networking Wi-Fi Robot Unified Communications Hiring/Firing Alerts Printing Display PDF Value People Computing Infrastructure 5G Scary Stories Virtual Reality Legislation eBay Disaster Resistance Remote Support Leadership Dark Web Skype Streaming Media New Additions Server Management Cooperation Monitors SaaS Deep Learning Print Server Gaming Console Text Messaging IT Consulting Work Station Data Warehousing Domains Google Wallet LinkedIn Congratulations Staff Fun Writing Software as a Service Word Law Firm IT Video Surveillance Data Breach Recycling Cloud Computing Microsoft Excel Public Speaking Drones Windows 8.1 Update Best Available eWaste Buisness Vulnerability Operations Cortana Social Engineering Telephony Technology Tips Identities Technology Laws Software Tips Blockchain Backups Environment CIO Adminstration Virtual Private Network Knowledge Unified Threat Management Comparison Solid State Drive Bluetooth 3D Samsung Permissions Legal Online Currency Compliance Troubleshooting Debate IT Technicians Experience Access Control Private Cloud Black Friday Heating/Cooling Alt Codes Computer Accessories Crowdfunding Infrastructure Fraud Consumers Regulations YouTube Mirgation SharePoint Public Cloud Cyber Monday Typing Company Culture Twitter Scheduling IT Support Internet Exlporer IP Address Google Drive How To Business Technology Touchscreen Downloads Sync Smart Technology Refrigeration Cryptocurrency Disaster Google Docs Networking Multi-Factor Security Mobile Device Managment Distributed Denial of Service Cost Management Bitcoin Digital Signature Memory Data loss Hotspot Laptop communications Productivity Managed IT Service Hacks Documents Conferencing Windows 10 Language Halloween Google Calendar Entrepreneur Techology Macro PC Care Travel Break Fix Undo

      Top Blog

      Basically, any machine that uses fans and vents to cool itself can overheat if airflow is restricted. If you have used a laptop on your lap for an extended session, then you know what we are talking about when the computer becomes hot to the touch. Every portable device is designed a little diffe...