Computerware

Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Dynamic Lock Isn’t Perfect, But It’s A Start

Tip of the Week: Dynamic Lock Isn’t Perfect, But It’s A Start

You’ve been told that it’s a best practice to ensure that you never leave your workstation without locking it first. Yet, if you’re only stepping away for a few minutes, it might be tempting to just allow it to remain unlocked. But what happens when you step away for longer than expected? You leave your computer exposed to all manners of threats. Thankfully, a new solution allows for a fix with a device that most are never without: the smartphone.

This trick lies in your computer having the Windows 10 Creators Update installed, which lets you connect your phone to your PC through Bluetooth. This helps your PC automatically lock itself when the two are separated. Thanks to a piconet, a type of short-range radio wave network that keeps Bluetooth devices working properly, this security measure is possible. Of course, the strength of the piconet will determine how far from your PC the device can be before the computer locks.

This Creators Update can help you create a piconet between your desktop and phone, which keeps Dynamic Lock from activating. If you remove the phone from the piconet’s range, Dynamic Lock will lock your computer to keep unauthorized users from using it.

Just keep in mind that Dynamic Lock is far from instantaneous. The device needs to be out of range, and the computer needs time to register that the connection has been severed. Only then will Dynamic Lock activate. Keeping this in mind, it’s still more secure to implement Dynamic Lock than leaving your computer unlocked all the time.

How to Set Up Dynamic Lock
To pair your phone to your PC, you want to confirm with your IT department that it won’t be an issue. Just reach out to them before following this procedure.

First, enable Bluetooth on your mobile device that you want to pair with your PC. Open Settings and access Bluetooth & Other Devices. Next, click Add Bluetooth or Other Device, which will prompt the Add a device box.

Once you’ve done this, select Bluetooth. Windows may take a moment to find your device, but once it does, it will prompt you to confirm a code that displays on both of your devices. Once you’ve done so and click Done, you’ll be brought back to the Bluetooth & Other Devices page in your Settings, where you can see your connected device.

Select Home and navigate to Accounts, where you’ll want to select Sign-In Options. You’ll find Dynamic Lock, where you check the box called Allow Windows to Detect When You’re Away and Automatically Lock the Device. Restart your PC to make sure the settings have been changed, and you’ll be all set. The only thing left to do is try it out!

For more great tips and tricks, be sure to subscribe to Computerware’s blog.

Would You Rather Trust Something That Repeatedly B...
Do You Need Data Backup? The Answer: Absolutely
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 19 November 2017

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Management Microsoft Managed Service Provider Software Workplace Tips Business Computing Backup Hackers Productivity Data Saving Money Hardware Business Malware IT Support Email IT Services Hosted Solutions Google Efficiency Quick Tips Smartphones Small Business Gadgets Business Continuity Mobile Devices Mobile Office Disaster Recovery Computer User Tips Network Security Network Virtualization Microsoft Office Server VoIP Miscellaneous Windows 10 Upgrade Social Media Mobile Device Management Windows Unified Threat Management Smartphone Android Ransomware Innovation Passwords Operating System Remote Computing BYOD Communication Remote Monitoring WiFi Vendor Management Apps The Internet of Things Holiday Marketing Mobile Computing Collaboration Managed IT services Facebook Users History Firewall Data Management Analytics Apple Outsourced IT IT Consultant Alert Save Money IT Support Phishing Automation Big data Content Filtering Health Bring Your Own Device Managed IT Services Office Productivity Lithium-ion Battery Virus Hiring/Firing Hard Drives App Managed IT Browser Artificial Intelligence Windows 8 Best Practice BDR Spam Going Green Tech Support communications Budget Wireless Technology Search Outlook Maintenance Help Desk Phone System Gmail Antivirus Recovery Employer-Employee Relationship Data Backup Information Technology Printer IBM Cybersecurity Internet of Things Encryption Update Administration Save Time Money Proactive IT Running Cable Law Enforcement Computers Data storage Government Legal Humor Document Management Mobile Device SaaS It Management Customer Service Bandwidth Saving Time Travel Education Hacking Digital Payment Telephone Systems Training Office 365 Disaster Data Recovery User PowerPoint Securty Social Networking DDoS VPN Solid State Drive Twitter Flexibility Word Fax Server Risk Management Password iPhone Business Intelligence Cost Management Hacker Tablet Hosted Solution Avoiding Downtime Hard Drive Computer Repair Two-factor Authentication Wireless Mobility Current Events Website Intranet Black Market Windows 10 Networking Chrome Webcam Taxes Software as a Service Uninterrupted Power Supply YouTube Access Control Router Computer Accessories Settings Unified Communications Comparison Customer Relationship Management Augmented Reality End of Support Safety Google Maps Social Patch Management Politics Text Messaging Network Congestion Cloud Computing Co-managed IT Hack Cybercrime Google Docs Laptop Project Management Lifestyle Cortana Net Neutrality Office Tips Processors Downtime Paperless Office Public Cloud Sports USB Presentation Computing Trending Company Culture Robot Virtual Desktop IT service Documents Statistics Pain Points Programming Automobile Compliance Heating/Cooling Scam Excel User Error How To Streaming Media Retail Inbound Marketing Business Growth Experience Gaming Console Telephony Start Menu Monitors Troubleshooting Access Device Management Flash Best Practives Advertising Google Wallet Staffing Environment Samsung Microserver Displays G Suite Competition online Currency Business Owner Spyware Physical Security Drones Banking Tablets Data Security File Sharing Data Protection Turn Key Sync Application Specifications cache Mouse Language CCTV Trojan Permissions Organize Business Metrics Data Loss Digital Signature Corporate Profile Writing In Internet of Things GPS switches Entertainment Assessment Emails Scalability Redundancy Chromebook Data Breach Messenger VoIP Ebay 3D Consultation Recycling Analytic Work/Life Balance Meetings Cryptocurrency Cabling Private Cloud Download Audit Books Pirating Information Administrator Adminstration IT consulting Public Speaking Harddrive Supercomputer Cleaning Worker Machine Learning CIO Entrepreneur Emergency Microchip Computer Care Content Management HIPAA Reading External Harddrive Business Managemenet Regulations Distributed Denial of Service Windows XP Electronic Payment Google Drive Employer Employee Relationship Society Hacks Licensing Micrsooft Printing Relocation Electricity Video Surveillance Smart Phones Botnet Get More Done IP Address Human Resources LinkedIn Identity Theft Saving ZTime Printer Server Notifications Mobile Technology Business Technology Downloads Archive Reliable Computing WannaCry Debate Skype Computer Malfunction Music Time Management Virtual Reality Teamwork Social Engineering Upgrades Mobile Payment Point of Contact Google Calendar Storage Bluetooth Motion Sickness LiFi PDF Touchscreen Upselling Computing Infrastructure Tracking Thin CLient Webinar Best Available Rental Service Deep Learning Keyboard Knowledge Domains Technology Tips Digital Product Reviews Memory Web Server Visible Light Communication eWaste Websites Read Wi-Fi Workers Leadership Value Shortcut Tech Terms Capital 3D Printing Productuvuty Vulnerability CrashOverride Television

hp supplies medallionLarge2017