Let us be your IT department!
Call us Today! (703) 821-8200


Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Dynamic Lock Isn’t Perfect, But It’s A Start

Tip of the Week: Dynamic Lock Isn’t Perfect, But It’s A Start

You’ve been told that it’s a best practice to ensure that you never leave your workstation without locking it first. Yet, if you’re only stepping away for a few minutes, it might be tempting to just allow it to remain unlocked. But what happens when you step away for longer than expected? You leave your computer exposed to all manners of threats. Thankfully, a new solution allows for a fix with a device that most are never without: the smartphone.

This trick lies in your computer having the Windows 10 Creators Update installed, which lets you connect your phone to your PC through Bluetooth. This helps your PC automatically lock itself when the two are separated. Thanks to a piconet, a type of short-range radio wave network that keeps Bluetooth devices working properly, this security measure is possible. Of course, the strength of the piconet will determine how far from your PC the device can be before the computer locks.

This Creators Update can help you create a piconet between your desktop and phone, which keeps Dynamic Lock from activating. If you remove the phone from the piconet’s range, Dynamic Lock will lock your computer to keep unauthorized users from using it.

Just keep in mind that Dynamic Lock is far from instantaneous. The device needs to be out of range, and the computer needs time to register that the connection has been severed. Only then will Dynamic Lock activate. Keeping this in mind, it’s still more secure to implement Dynamic Lock than leaving your computer unlocked all the time.

How to Set Up Dynamic Lock
To pair your phone to your PC, you want to confirm with your IT department that it won’t be an issue. Just reach out to them before following this procedure.

First, enable Bluetooth on your mobile device that you want to pair with your PC. Open Settings and access Bluetooth & Other Devices. Next, click Add Bluetooth or Other Device, which will prompt the Add a device box.

Once you’ve done this, select Bluetooth. Windows may take a moment to find your device, but once it does, it will prompt you to confirm a code that displays on both of your devices. Once you’ve done so and click Done, you’ll be brought back to the Bluetooth & Other Devices page in your Settings, where you can see your connected device.

Select Home and navigate to Accounts, where you’ll want to select Sign-In Options. You’ll find Dynamic Lock, where you check the box called Allow Windows to Detect When You’re Away and Automatically Lock the Device. Restart your PC to make sure the settings have been changed, and you’ll be all set. The only thing left to do is try it out!

For more great tips and tricks, be sure to subscribe to Computerware’s blog.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, 23 September 2017
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Management Microsoft Managed Service Provider Workplace Tips Software Productivity Backup Business Computing Hackers Data Saving Money Hardware Business Malware Email IT Support IT Services Hosted Solutions Google Quick Tips Efficiency Smartphones Gadgets Business Continuity Small Business Mobile Devices Mobile Office Disaster Recovery Virtualization Computer User Tips Server Network Microsoft Office Network Security Windows 10 Miscellaneous Upgrade VoIP Social Media Unified Threat Management Windows Mobile Device Management Innovation Smartphone Operating System WiFi Android Ransomware Vendor Management Passwords BYOD Remote Computing Communication The Internet of Things Marketing Mobile Computing Apps Remote Monitoring Firewall History Holiday Managed IT services Facebook Users Data Management Analytics Apple Collaboration IT Consultant Save Money Alert Health Content Filtering Bring Your Own Device Outsourced IT Automation Office Managed IT Services Big data Best Practice Spam Going Green BDR Outlook Phishing Hiring/Firing Wireless Technology Virus Search App Lithium-ion Battery Windows 8 Productivity Hard Drives Tech Support Encryption Information Technology IBM Data Backup Gmail IT Support Managed IT Recovery Browser Employer-Employee Relationship Phone System Budget Help Desk Printer Antivirus Internet of Things Artificial Intelligence Education Save Time Money Maintenance Administration Running Cable Saving Time Data storage communications Proactive IT Humor SaaS Computers Customer Service Bandwidth Travel Website Current Events iPhone Black Market Business Intelligence Hacking Networking Mobile Device Document Management Telephone Systems Office 365 Computer Repair Training User Intranet It Management DDoS Securty Hard Drive Government Solid State Drive Update Word Flexibility Risk Management Password Digital Payment Windows 10 Legal Hacker Fax Server Tablet PowerPoint Social Networking VPN Two-factor Authentication Hosted Solution Twitter Data Recovery Wireless Avoiding Downtime Compliance Pain Points Net Neutrality Retail Excel Cloud Computing User Error Experience Hack Business Growth Telephony Monitors Gaming Console Trending YouTube Webcam Settings Statistics Safety Disaster Public Cloud Social End of Support Network Congestion Cybersecurity Law Enforcement Streaming Media Politics Inbound Marketing Mobility Cybercrime Automobile Co-managed IT Chrome Laptop Cortana How To Router Cost Management Computer Accessories Comparison Downtime Customer Relationship Management Lifestyle Processors Office Tips USB Augmented Reality Start Menu Paperless Office Taxes Presentation Sports Company Culture Computing Virtual Desktop Text Messaging Uninterrupted Power Supply Documents Programming Robot IT service Heating/Cooling Recycling cache Virtual Reality CCTV Music Storage PDF Patch Management Social Engineering Google Maps Upgrades Adminstration Bluetooth In Internet of Things Keyboard LiFi Best Available Pirating Information Corporate Profile Product Reviews Assessment Computing Infrastructure Emails Domains eWaste Read Redundancy Rental Service Deep Learning Scalability Webinar Memory Shortcut Visible Light Communication Content Management Value Upselling VoIP Consultation Wi-Fi Meetings Troubleshooting Environment Project Management Cabling Staffing Private Cloud Flash Administrator Competition Advertising Video Surveillance Saving ZTime Supercomputer Google Wallet LinkedIn Business Owner Emergency Worker Best Practives Displays Machine Learning Distributed Denial of Service Application Unified Communications Archive Debate Google Drive Microserver Banking Employer Employee Relationship Drones Specifications Point of Contact File Sharing Licensing Electricity Language Botnet Permissions Digital Signature Turn Key Thin CLient Business Metrics Entertainment Writing switches Business Technology Trojan WannaCry Organize Computer Malfunction Analytic Time Management Leadership Chromebook Scam Messenger Device Management Work/Life Balance Motion Sickness Public Speaking Cryptocurrency Touchscreen Download Tracking Google Docs Entrepreneur IT consulting Knowledge Books Business Managemenet Digital Web Server Cleaning online Currency HIPAA Electronic Payment CIO Websites Microchip Workers Regulations Windows XP Tech Terms Harddrive Reading Mouse Access IP Address Society Software as a Service External Harddrive Hacks Samsung Human Resources Micrsooft GPS G Suite Relocation Skype Spyware Identity Theft Physical Security Smart Phones Notifications Tablets Get More Done Printer Server 3D Sync Teamwork Ebay Reliable Computing Data Protection Capital Productuvuty Vulnerability CrashOverride 3D Printing

hp supplies medallionLarge2017