Our Blog: Stuff we think you should know

Haber Group has been serving the New York area since 2000, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Lock Your Computer By Simply Walking Away With Dynamic Lock

Tip of the Week: Lock Your Computer By Simply Walking Away With Dynamic Lock

Security best practices demand that a workstation should never be left unlocked. However, it can be really tempting to leave it unlocked if you only plan on stepping away for a moment--but unfortunately, that moment can easily turn into many if you are distracted from your task. Fortunately, there is now a fix that relies on the one device most of us are never without: our phones.

If your computer has the Windows 10 Creators Update in place, you can connect your phone to your PC via Bluetooth so that the PC will automatically lock if the two devices are separated. This is accomplished with the help of a piconet, a short-range radio-wave network that Bluetooth devices use to function. Depending on the strength of the piconet, the devices can remain connected while further and further apart from each other.

The Creators Update allows you to create a piconet between your desktop and your phone, which keeps the Dynamic Lock from activating. However, if the phone is taken out of the piconet’s range, Dynamic Lock will lock the computer, protecting it from unauthorized users using it to access the network.

However, it must be said that Dynamic Lock is not instantaneous. First, your device has to be out of range, and secondly, the computer has to register the fact that the connection has been lost before Dynamic Lock will take affect. Regardless, activating Dynamic Lock is more secure than leaving a workstation unlocked indefinitely.

How to Set Dynamic Lock
Pairing your phone to your PC is a fairly simple process, but you should be sure to confirm the configuration with your IT department before activating Dynamic Lock.

If IT has approved the use of the Dynamic Lock feature, here is how it can be set up.

With Bluetooth enabled on the mobile device you want paired, open Settings and access Bluetooth & Other Devices. Make sure that Bluetooth is set to on. Click Add Bluetooth or Other Device, and a dialog box Add a device will open.

Once it does, select Bluetooth. Once you do, Windows will take a few moments to locate your device. Once it does, you will be prompted to confirm that the codes displayed on both your computer and your mobile device match. Once you click Done, you will be taken back to the Bluetooth & Other Devices page in Settings, where you should see your device displayed.

Now, select Home, navigate to Accounts, and select Sign-In Options. Find Dynamic Lock and make sure the box labelled Allow Windows To Detect When You're Away And Automatically Lock The Device is checked. Restart to ensure the settings are saved, and Dynamic Lock should be enabled and linked to your mobile device.

Your device should now automatically lock your workstation if brought too far out of range.

For more tips, be sure to subscribe to our blog!



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, 18 February 2018

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Cloud Hackers Technology Privacy Email Malware Business Internet Hosted Solutions Business Computing Microsoft Computer Software Windows 10 Ransomware IT Services Backup Android Smartphone Small Business Google Network Security Windows User Tips Productivity Mobile Devices Hardware Gmail Data Browser Data Management Efficiency Business Continuity Phishing Internet of Things App Encryption Facebook Office 365 Upgrade Smartphones Saving Money Innovation Outsourced IT Office Tips Microsoft Office Big Data IT Support Tip of the week Artificial Intelligence Word Managed Service Provider Managed IT Services Remote Monitoring Cloud Computing Workplace Tips Data Recovery Employer-Employee Relationship WiFi Chrome Windows 10 Data storage Spam Miscellaneous Money Social Media Disaster Recovery Business Management Firewall IT Support Customer Service Productivity Apple Two-factor Authentication Settings Server Content Filtering Antivirus Cybersecurity Robot Risk Management Government Business Technology HIPAA Computing Automation Google Drive Augmented Reality Infrastructure Safety Communication LiFi Mobile Device Mobile Security The Internet of Things Analytics Scam Bandwidth Tablet Outlook Vulnerability IBM Wireless Search Holiday Apps Customer Relationship Management Data Security Wi-Fi Administration Hacking Virtual Private Network VoIP End of Support Password Mouse Passwords Presentation Managed IT Services Hacker IT Management Avoiding Downtime Network Office Telephone Systems Save Money Virtual Reality Wireless Technology Maintenance Recovery Hosted Solution SaaS Data Backup YouTube communications Unified Threat Management Monitors Printing Data loss Cryptocurrency Public Speaking Running Cable SharePoint Lithium-ion battery Virtual Desktop Network Management BYOD Managed IT Service Managed IT Fraud Laptop Digital Bitcoin Lenovo Applications Information Technology Downloads Computer Care Touchscreen Vendor Management Google Docs Break Fix Fun Shortcut Undo Disaster Halloween Spyware Windows 8 Superfish IT Technicians Google Wallet Multi-Factor Security Training Application Gadgets Writing Dark Web Patch Management Hotspot Virtualization Automobile Uninterrupted Power Supply Scary Stories Paperless Office Drones Google Calendar Users Retail Net Neutrality Language Solid State Drive Sports How To Social Networking Legislation Education Heating/Cooling IT service Social Engineering Humor FCC Deep Learning VPN Computing Infrastructure Hard Disk Drive Firefox User Hacks Budget Comparison Servers Politics BDR sip Title II Bring Your Own Device Alerts Competition Collaboration Buisness Techology Specifications 5G IT solutions Document Management Server Management Tech Support Google Maps How To telephony Online Best Practice Mail Merge Licensing File Sharing Samsung Network Congestion Unified Threat Management Black Friday Statistics Cortana Websites Marketing Storage Microsoft Excel Business Growth Address Cooperation IP Address Downtime Quick Tips Computers Current Events User Error Legal Cyber Monday Bluetooth Dark Data Blockchain Alt Codes Staff Website Cybercrime Corporate Profile Mobile Office VoIP Display Going Green Printer Smart Technology Hard Drives Knowledge Permissions Typing Wearable Technology WannaCry Access Control Mobile Device Management Time Management Operating System Distributed Denial of Service Unified Communications Digital Payment Refrigeration Experience Cabling Chromebook Meetings Cleaning Private Cloud Mobile Data Webcam Emoji Work/Life Balance Error Point of Sale Black Market Law Enforcement Physical Security CrashOverride Twitter Mirgation Staffing Gadget Personal Information Administrator Web Server Remote Computing GPS Computer Repair Cameras Processors Tracking Health CCTV Alert Electronic Medical Records Mobile Computing Identity Theft Travel G Suite Notifications Supercomputer Botnet Upgrades Motion Sickness Taxes Crowdsourcing IT Budget Machine Learning 3D Printing Update Emergency Domains IT Consultant Relocation Unsupported Software