Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Dynamic Lock Isn’t Perfect, But It’s A Start

Tip of the Week: Dynamic Lock Isn’t Perfect, But It’s A Start

You’ve been told that it’s a best practice to ensure that you never leave your workstation without locking it first. Yet, if you’re only stepping away for a few minutes, it might be tempting to just allow it to remain unlocked. But what happens when you step away for longer than expected? You leave your computer exposed to all manners of threats. Thankfully, a new solution allows for a fix with a device that most are never without: the smartphone.

This trick lies in your computer having the Windows 10 Creators Update installed, which lets you connect your phone to your PC through Bluetooth. This helps your PC automatically lock itself when the two are separated. Thanks to a piconet, a type of short-range radio wave network that keeps Bluetooth devices working properly, this security measure is possible. Of course, the strength of the piconet will determine how far from your PC the device can be before the computer locks.

This Creators Update can help you create a piconet between your desktop and phone, which keeps Dynamic Lock from activating. If you remove the phone from the piconet’s range, Dynamic Lock will lock your computer to keep unauthorized users from using it.

Just keep in mind that Dynamic Lock is far from instantaneous. The device needs to be out of range, and the computer needs time to register that the connection has been severed. Only then will Dynamic Lock activate. Keeping this in mind, it’s still more secure to implement Dynamic Lock than leaving your computer unlocked all the time.

How to Set Up Dynamic Lock
To pair your phone to your PC, you want to confirm with your IT department that it won’t be an issue. Just reach out to them before following this procedure.

First, enable Bluetooth on your mobile device that you want to pair with your PC. Open Settings and access Bluetooth & Other Devices. Next, click Add Bluetooth or Other Device, which will prompt the Add a device box.

Once you’ve done this, select Bluetooth. Windows may take a moment to find your device, but once it does, it will prompt you to confirm a code that displays on both of your devices. Once you’ve done so and click Done, you’ll be brought back to the Bluetooth & Other Devices page in your Settings, where you can see your connected device.

Select Home and navigate to Accounts, where you’ll want to select Sign-In Options. You’ll find Dynamic Lock, where you check the box called Allow Windows to Detect When You’re Away and Automatically Lock the Device. Restart your PC to make sure the settings have been changed, and you’ll be all set. The only thing left to do is try it out!

For more great tips and tricks, be sure to subscribe to Computerware’s blog.

Would You Rather Trust Something That Repeatedly B...
Do You Need Data Backup? The Answer: Absolutely


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, 20 January 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Management Microsoft Managed Service Provider Hackers Software Workplace Tips Business Computing Productivity Backup Data Hardware Saving Money Business Malware Email IT Support IT Services Hosted Solutions Google Efficiency Small Business Gadgets Quick Tips Smartphones Network Security Business Continuity User Tips Mobile Devices Mobile Office Disaster Recovery Computer Microsoft Office Network Virtualization Server VoIP Social Media Mobile Device Management Windows 10 Miscellaneous Upgrade Windows Android Unified Threat Management Ransomware Smartphone Innovation Passwords Holiday Operating System Remote Computing BYOD Communication Remote Monitoring WiFi Vendor Management Mobile Computing Apps Facebook The Internet of Things Marketing Collaboration Managed IT services Users Analytics History Firewall Alert IT Support Data Management Apple IT Consultant Save Money Cybersecurity Managed IT Services Phishing Outsourced IT Gmail App Big data Content Filtering Health Bring Your Own Device Office Productivity Automation Hard Drives Browser Managed IT Artificial Intelligence Windows 8 communications Budget Best Practice BDR Spam Going Green Tech Support Wireless Technology Search Outlook Hiring/Firing Lithium-ion Battery Virus Help Desk Recovery Employer-Employee Relationship Phone System Antivirus Cost Management Information Technology Printer IBM Data Backup Internet of Things Mobile Device Bandwidth Encryption Update Office 365 Money Maintenance Law Enforcement Proactive IT Government Computers Data storage Risk Management Legal Humor SaaS Customer Service Document Management Travel Education Saving Time It Management Hard Drive Networking Save Time Administration Running Cable Comparison DDoS Securty PowerPoint Social Networking Solid State Drive Data Recovery VPN Word Flexibility Twitter Cortana Password Hacker Fax Server iPhone Tablet Business Intelligence Project Management Two-factor Authentication Hosted Solution Wireless Robot Avoiding Downtime Computer Repair Website Black Market Current Events Intranet Excel Hacking Mobility Business Growth Telephone Systems Training Windows 10 User Digital Payment Disaster End of Support Taxes Customer Relationship Management Augmented Reality Network Congestion Software as a Service Access Control Politics Uninterrupted Power Supply Mouse Cybercrime Text Messaging Data Security Co-managed IT Cryptocurrency Google Maps Google Docs Laptop Patch Management Processors Cloud Computing Office Tips Downtime Lifestyle Net Neutrality Hack USB Presentation Paperless Office Sports Company Culture Computing Virtual Desktop Documents Programming IT service Trending Heating/Cooling Distributed Denial of Service Social Engineering Public Cloud Compliance Bitcoin Statistics Pain Points Retail Computing Infrastructure Experience eWaste User Error Streaming Media Scam Telephony Monitors Automobile Inbound Marketing Gaming Console Chrome How To YouTube Webcam Digital Settings Unified Communications Safety Specifications Router Start Menu Computer Accessories Social Digital Signature Hard Drive Disposal Access Language Permissions Samsung Entertainment Turn Key Business Metrics Trojan Windows Server 2008 Writing G Suite switches Organize Unified Threat Management Spyware Physical Security Tablets GPS Analytic Chromebook Windows 7 Messenger Data Protection Sync Fiber-Optic cache Work/Life Balance Public Speaking CCTV Ebay 3D Download Freedom of Information Data Loss Books Corporate Profile Recycling Entrepreneur In Internet of Things IT consulting HIPAA Business Managemenet Fraud Assessment Emails Cleaning Pirating Information Electronic Payment Scalability CIO Adminstration Redundancy Microchip News Data Breach Reading VoIP Regulations Windows XP Harddrive email scam Consultation IP Address Meetings Society Content Management Human Resources Cabling Micrsooft Private Cloud External Harddrive Hacks Fake News Audit Relocation Administrator Skype Vulnerabilities Identity Theft Supercomputer Notifications Worker Video Surveillance Machine Learning Smart Phones Get More Done Mobile Technology Emergency Printer Server Microsoft Excel Computer Care Reliable Computing LinkedIn Saving ZTime Teamwork Music Storage Business Cards Google Drive Virtual Reality Employer Employee Relationship Vulnerability Archive Licensing Upgrades Debate PDF Mobile Payment Printing Electricity Bluetooth Keyboard Botnet LiFi Best Available Product Reviews Point of Contact Domains Television Business Technology Rental Service Deep Learning Read Webinar Blockchain Downloads WannaCry Memory Shortcut Computer Malfunction Visible Light Communication Thin CLient Upselling Value Troubleshooting Time Management Wi-Fi SharePoint Staffing Environment Tip of the week Google Calendar Flash Competition Motion Sickness Advertising Leadership Tracking Google Wallet Business Owner Touchscreen Evernote Knowledge Displays Device Management Best Practives Virtual Assistant Technology Tips Application Web Server Workers Drones Microserver Websites Banking Data Warehousing Tech Terms File Sharing online Currency 3D Printing Capital Productuvuty Piracy Software License CrashOverride

hp supplies medallionLarge2017