Tip of the Week: Lock Your Computer By Simply Walking Away With Dynamic Lock

Tip of the Week: Lock Your Computer By Simply Walking Away With Dynamic Lock

Security best practices demand that a workstation should never be left unlocked. However, it can be really tempting to leave it unlocked if you only plan on stepping away for a moment--but unfortunately, that moment can easily turn into many if you are distracted from your task. Fortunately, there is now a fix that relies on the one device most of us are never without: our phones.

If your computer has the Windows 10 Creators Update in place, you can connect your phone to your PC via Bluetooth so that the PC will automatically lock if the two devices are separated. This is accomplished with the help of a piconet, a short-range radio-wave network that Bluetooth devices use to function. Depending on the strength of the piconet, the devices can remain connected while further and further apart from each other.

The Creators Update allows you to create a piconet between your desktop and your phone, which keeps the Dynamic Lock from activating. However, if the phone is taken out of the piconet’s range, Dynamic Lock will lock the computer, protecting it from unauthorized users using it to access the network.

However, it must be said that Dynamic Lock is not instantaneous. First, your device has to be out of range, and secondly, the computer has to register the fact that the connection has been lost before Dynamic Lock will take affect. Regardless, activating Dynamic Lock is more secure than leaving a workstation unlocked indefinitely.

How to Set Dynamic Lock
Pairing your phone to your PC is a fairly simple process, but you should be sure to confirm the configuration with your IT department before activating Dynamic Lock.

If IT has approved the use of the Dynamic Lock feature, here is how it can be set up.

With Bluetooth enabled on the mobile device you want paired, open Settings and access Bluetooth & Other Devices. Make sure that Bluetooth is set to on. Click Add Bluetooth or Other Device, and a dialog box Add a device will open.

Once it does, select Bluetooth. Once you do, Windows will take a few moments to locate your device. Once it does, you will be prompted to confirm that the codes displayed on both your computer and your mobile device match. Once you click Done, you will be taken back to the Bluetooth & Other Devices page in Settings, where you should see your device displayed.

Now, select Home, navigate to Accounts, and select Sign-In Options. Find Dynamic Lock and make sure the box labelled Allow Windows To Detect When You're Away And Automatically Lock The Device is checked. Restart to ensure the settings are saved, and Dynamic Lock should be enabled and linked to your mobile device.

Your device should now automatically lock your workstation if brought too far out of range.

For more tips, be sure to subscribe to our blog!

Your Computer's Infected... What Do You Do Next?
What We Can Learn From IT Statistics
 

Comments

Already Registered? Login Here
No comments made yet. Be the first to submit a comment

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Technology Cloud Email Hackers Privacy Malware Business Internet Business Computing Hosted Solutions Computer Microsoft Software Ransomware Google Backup Windows 10 Network Security Android Mobile Devices Smartphone User Tips IT Services Data Management Small Business Hardware Managed IT Services Tech Term Browser Gmail Productivity Windows Facebook Server Business Continuity Saving Money Cloud Computing Internet of Things App Data Business Management Data Recovery Encryption IT Support Remote Monitoring Office 365 Upgrade Phishing Disaster Recovery Smartphones Word Managed Service Provider Efficiency Cybersecurity Artificial Intelligence Office Tips Government Chrome Infrastructure Microsoft Office Outsourced IT Innovation Spam Big Data Productivity Windows 10 Social Media Workplace Tips Tip of the week Data Backup IT Support Money Robot WiFi Avoiding Downtime Settings The Internet of Things Applications Two-factor Authentication Content Filtering Managed IT Services Communication Bandwidth YouTube IT Management communications Miscellaneous Apple Risk Management Analytics Data storage VoIP Vulnerability Employer-Employee Relationship Antivirus Firewall Passwords Customer Service HIPAA Presentation Data Security Safety Data loss Business Technology Printing Network Office Hacker Virtual Private Network Automation Wireless Technology End of Support BYOD Server Management Recovery Computing Hosted Solution Google Drive Password Mobile Security Mouse Vendor Management Website Telephone Systems Save Money Mobile Device LiFi Maintenance Search IBM Virtual Reality Apps Storage Wireless Scam Tablet Paperless Office Administration Hacking Customer Relationship Management SaaS Wi-Fi Outlook Unified Threat Management VPN Monitors Augmented Reality Holiday Access Control Cabling Typing 5G FCC Smart Tech Firefox Service Level Agreement Digital Payment eWaste BDR Servers Deep Learning Undo Humor Halloween Distributed Denial of Service Router Cortana Alerts Network Management Marketing Operating System Comparison Chromebook Hacks Fun Fraud Internet Exlporer Politics Gadgets Application Budget SharePoint Collaboration Cables Managed IT Cryptocurrency Downtime Title II Connectivity Techology Licensing Continuity Google Maps Bring Your Own Device Virtualization sip Scary Stories Managed IT Service Modem Digital Lenovo How To Smart Office Touchscreen IP Address Cybercrime Specifications Compliance Mail Merge Value Tech Support Document Management Unified Threat Management Users Downloads IT Technicians File Sharing Wires Disaster Shortcut Bitcoin Network Congestion Online IoT Computer Care Cooperation Solar Statistics Best Practice telephony Sports Break Fix Cookies Samsung Spyware Superfish Information Technology Knowledge Work Hard Drives Google Docs Mobile Office Black Friday Regulations Address Writing Education Hotspot Professional Services Websites Identity Theft Quick Tips User Error Multi-Factor Security Mirgation Voice over Internet Protocol Uninterrupted Power Supply Patch Management Windows 8 Computers Microsoft Excel Star Wars Training Experience Unified Communications Staff Automobile Business Intelligence Bluetooth Business Growth Dark Web Nanotechnology Google Wallet Optimization Refrigeration Mobile Device Management Running Cable Cyber Monday Social Networking Corporate Profile User Current Events Retail Language USB VoIP Legal Google Calendar Chatbots Solid State Drive Public Speaking Display Virtual Desktop Blockchain Cost Management Printer Wearable Technology Alt Codes Competition Dark Data Buisness Net Neutrality Screen Reader How To Networking Drones Recycling IT service Heating/Cooling Lithium-ion battery Laptop Smart Technology Motherboard Remote Computing WannaCry Going Green Social Engineering IT solutions Computing Infrastructure Dongle Time Management Legislation Identity Hard Disk Drive Social Permissions Assessment Unsupported Software Computer Repair Managing Stress IT Consultant Relocation Processors Cameras Meetings Tracking Mobile Data Health Cleaning Private Cloud Alert CCTV Emoji Webcam Electronic Medical Records Work/Life Balance Error Black Market Point of Sale Mobile Computing Physical Security Travel Domains Law Enforcement Notifications G Suite CrashOverride Upgrades Supercomputer Twitter Botnet Motion Sickness FinTech Gadget Staffing Personal Information Administrator Company Culture Crowdsourcing Taxes 3D Printing Machine Learning IT Budget Web Server Emergency Update GPS