Tip of the Week: Dynamic Lock Isn’t Perfect, But It’s A Start

Tip of the Week: Dynamic Lock Isn’t Perfect, But It’s A Start

You’ve been told that it’s a best practice to ensure that you never leave your workstation without locking it first. Yet, if you’re only stepping away for a few minutes, it might be tempting to just allow it to remain unlocked. But what happens when you step away for longer than expected? You leave your computer exposed to all manners of threats. Thankfully, a new solution allows for a fix with a device that most are never without: the smartphone.

This trick lies in your computer having the Windows 10 Creators Update installed, which lets you connect your phone to your PC through Bluetooth. This helps your PC automatically lock itself when the two are separated. Thanks to a piconet, a type of short-range radio wave network that keeps Bluetooth devices working properly, this security measure is possible. Of course, the strength of the piconet will determine how far from your PC the device can be before the computer locks.

This Creators Update can help you create a piconet between your desktop and phone, which keeps Dynamic Lock from activating. If you remove the phone from the piconet’s range, Dynamic Lock will lock your computer to keep unauthorized users from using it.

Just keep in mind that Dynamic Lock is far from instantaneous. The device needs to be out of range, and the computer needs time to register that the connection has been severed. Only then will Dynamic Lock activate. Keeping this in mind, it’s still more secure to implement Dynamic Lock than leaving your computer unlocked all the time.

How to Set Up Dynamic Lock
To pair your phone to your PC, you want to confirm with your IT department that it won’t be an issue. Just reach out to them before following this procedure.

First, enable Bluetooth on your mobile device that you want to pair with your PC. Open Settings and access Bluetooth & Other Devices. Next, click Add Bluetooth or Other Device, which will prompt the Add a device box.

Once you’ve done this, select Bluetooth. Windows may take a moment to find your device, but once it does, it will prompt you to confirm a code that displays on both of your devices. Once you’ve done so and click Done, you’ll be brought back to the Bluetooth & Other Devices page in your Settings, where you can see your connected device.

Select Home and navigate to Accounts, where you’ll want to select Sign-In Options. You’ll find Dynamic Lock, where you check the box called Allow Windows to Detect When You’re Away and Automatically Lock the Device. Restart your PC to make sure the settings have been changed, and you’ll be all set. The only thing left to do is try it out!

For more great tips and tricks, be sure to subscribe to Computerware’s blog.

Would You Rather Trust Something That Repeatedly B...
Do You Need Data Backup? The Answer: Absolutely


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, 25 May 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Management Microsoft Hackers Software Business Computing Managed Service Provider Backup Productivity Workplace Tips Data Business Saving Money Hardware Malware Email IT Support Hosted Solutions IT Services Network Security Google Small Business Smartphones Efficiency Quick Tips Gadgets Mobile Devices Business Continuity User Tips Computer Disaster Recovery Mobile Office Virtualization Network Microsoft Office Android Server VoIP Social Media Smartphone Mobile Device Management Innovation Upgrade Windows 10 Miscellaneous Unified Threat Management Ransomware Windows Operating System Remote Monitoring Holiday Passwords Mobile Computing Remote Computing Communication Vendor Management BYOD Apps Collaboration WiFi Cybersecurity Marketing Facebook The Internet of Things History Firewall Managed IT services Apple Users Analytics Alert Data Management communications IT Support Productivity IT Consultant Outsourced IT Phishing Internet of Things Automation App Managed IT Services Data Backup Save Money Data Recovery Office Bandwidth Big data Gmail Spam BDR Content Filtering Mobile Device Health Bring Your Own Device Wireless Technology Antivirus Artificial Intelligence Search Budget Outlook Managed IT Windows 8 Best Practice Information Technology Hiring/Firing Browser Maintenance Lithium-ion Battery Hard Drives Printer Going Green Cybercrime Virus Tech Support Tech Term Phone System Office 365 Update Money Encryption Recovery Employer-Employee Relationship IBM Computers Cost Management Hacking Help Desk SaaS Education Administration Training Law Enforcement Risk Management Hard Drive Customer Service Two-factor Authentication Compliance Save Time Data storage Government Website Humor Document Management Cloud Computing Running Cable Legal Proactive IT Networking Saving Time VPN It Management Intranet Travel Disaster Telephone Systems Blockchain Hosted Solution Current Events End of Support Data Loss Robot User Securty Solid State Drive Data Breach Avoiding Downtime Business Intelligence Fax Server Windows 10 Digital Payment Wireless Downtime Mobility Project Management Black Market iPhone DDoS Flexibility Social Engineering Laptop Comparison Tablet Company Culture Business Growth Excel Computer Repair Word Access Control Social Networking Regulations Augmented Reality Password Cortana Paperless Office PowerPoint Hacker Data Security Twitter Computing Text Messaging Business Technology Webcam Distributed Denial of Service Processors Streaming Media USB Patch Management User Error Public Cloud Presentation Co-managed IT IT service Scam Virtual Desktop Redundancy Identity Theft Net Neutrality Specifications Safety Social Inbound Marketing Chrome Lifestyle Bluetooth Google Maps Documents Router Politics Heating/Cooling Virtual Reality Digital Emails Websites Cryptocurrency Computer Accessories Automobile Storage Pain Points Start Menu Tech Terms Google Docs Chromebook Mobile Technology Vulnerabilities Experience Trending Computing Infrastructure Hack Software as a Service Cleaning Mouse How To Retail Monitors Private Cloud Uninterrupted Power Supply Office Tips Customer Relationship Management eWaste Programming Value Statistics Telephony Network Congestion Bitcoin YouTube Gaming Console Unified Communications Settings Applications Data Protection Sports Taxes cache Television GPS Reading Samsung Piracy Competition Drones Electronic Payment Smart Tech Analytic Employer Employee Relationship Fiber-Optic Database External Harddrive Recycling G Suite Business Owner HTML WannaCry Downloads Conferencing Time Management Freedom of Information Permissions Language Licensing Mobile Security IP Address Corporate Profile Hacks Product Reviews Physical Security Assessment SharePoint 3D Ebay Relocation Read Tablets Software License Application Webinar Thin CLient Banking Botnet Multi-Factor Security Human Resources File Sharing Fraud Tactics Tip of the week Music Smart Phones Sync Devices Google Calendar switches Writing Monitoring Touchscreen News Device Management UTM VoIP Upgrades Notifications CCTV Consultation Evernote LiFi Adminstration Pirating Information Content Management Reliable Computing Digital Signature IT Plan Knowledge Leadership Business Metrics Business Managemenet Computer Malfunction Legislation Teamwork email scam Addiction Virtual Assistant In Internet of Things Entertainment Accountants Technology Tips Management Best Practives Fake News Work/Life Balance online Currency Multi-factor Authentication Audit Deep Learning Data Warehousing Visible Light Communication Memory Scalability Migration Motion Sickness PDF Wireless Headphones IT consulting Messenger Tracking Best Available Keyboard Emergency Hard Drive Disposal LinkedIn Equifax Microserver Access Rental Service Meetings Healthcare Microsoft Excel Device security Domains Computer Care Upselling Get More Done Google Drive Windows Server 2008 Advertising Flash Video Surveillance Archive Cabling Desktop Public Speaking CIO Download Skype Web Server Nanotechnology Spyware Mobile Payment Windows XP Books Workers Business Cards Shortcut Printer Server Vulnerability Staffing Google Wallet Saving ZTime Wi-Fi Administrator Startup Turn Key Point of Contact Supercomputer Unified Threat Management Entrepreneur Backup and Disaster Recovery Trojan Society Troubleshooting Electricity Printing Displays Windows 7 Debate Machine Learning Worker HIPAA Organize Micrsooft Harddrive Microchip Environment Screen Reader CrashOverride Capital 3D Printing Productuvuty