KT Connections Blog

KT Connections has been serving the Rapid City area since 1997, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Dynamic Lock Isn’t Perfect, But It’s A Start

Tip of the Week: Dynamic Lock Isn’t Perfect, But It’s A Start

You’ve been told that it’s a best practice to ensure that you never leave your workstation without locking it first. Yet, if you’re only stepping away for a few minutes, it might be tempting to just allow it to remain unlocked. But what happens when you step away for longer than expected? You leave your computer exposed to all manners of threats. Thankfully, a new solution allows for a fix with a device that most are never without: the smartphone.

This trick lies in your computer having the Windows 10 Creators Update installed, which lets you connect your phone to your PC through Bluetooth. This helps your PC automatically lock itself when the two are separated. Thanks to a piconet, a type of short-range radio wave network that keeps Bluetooth devices working properly, this security measure is possible. Of course, the strength of the piconet will determine how far from your PC the device can be before the computer locks.

This Creators Update can help you create a piconet between your desktop and phone, which keeps Dynamic Lock from activating. If you remove the phone from the piconet’s range, Dynamic Lock will lock your computer to keep unauthorized users from using it.

Just keep in mind that Dynamic Lock is far from instantaneous. The device needs to be out of range, and the computer needs time to register that the connection has been severed. Only then will Dynamic Lock activate. Keeping this in mind, it’s still more secure to implement Dynamic Lock than leaving your computer unlocked all the time.

How to Set Up Dynamic Lock
To pair your phone to your PC, you want to confirm with your IT department that it won’t be an issue. Just reach out to them before following this procedure.

First, enable Bluetooth on your mobile device that you want to pair with your PC. Open Settings and access Bluetooth & Other Devices. Next, click Add Bluetooth or Other Device, which will prompt the Add a device box.

Once you’ve done this, select Bluetooth. Windows may take a moment to find your device, but once it does, it will prompt you to confirm a code that displays on both of your devices. Once you’ve done so and click Done, you’ll be brought back to the Bluetooth & Other Devices page in your Settings, where you can see your connected device.

Select Home and navigate to Accounts, where you’ll want to select Sign-In Options. You’ll find Dynamic Lock, where you check the box called Allow Windows to Detect When You’re Away and Automatically Lock the Device. Restart your PC to make sure the settings have been changed, and you’ll be all set. The only thing left to do is try it out!

For more great tips and tricks, be sure to subscribe to KT Connections’s blog.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, 16 December 2017
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices hackers Privacy Technology Email Internet malware Business Computing Cloud Google Network Security software Ransomware User Tips Efficiency Business Backup Data IT Support Microsoft Computer Mobile Device Management Network Gmail Managed IT Services Android Money cybersecurity Facebook Hardware Smartphone Small Business VoIP Windows Productivity Hosted Solutions IT Support Data Management IT Management Operating System Business Continuity Mobile Devices Cloud Computing Artificial Intelligence Phishing Microsoft Office communications Windows 10 Unified Communications Outsourced IT Social Media Internet of Things Data storage Passwords Upgrade Communication IT Services security cameras BDR Disaster Recovery Windows 10 Encryption Alert data breach End of Support Apple Nextiva Antivirus Business Management Update Bandwidth Smartphones Outlook Data Backup Politics WiFi Access Control Automation App Office 365 YouTube Patch Management Cost Management Collaboration Best Practice IoT Google Wallet Remote Monitoring Project Management Google Docs Analytics Legal Spam Customer Service Search IBM Browser Google Maps Server Hard Drive Drones Save Money security solutions Document Management SaaS Saving Money Start Menu Information Technology History Firewall Networking Productivity News vulnerability Events Scam Innovation Lunch and Learn Big Data Managed IT Services Data Recovery Law Enforcement Word The Internet of Things Apps Event Marketing Robot Local Buzz BYOD Gadgets South Dakota appointment Memory Digital Rapid City File Sharing Web Servers Applications communication solutions Business Mangement Sports Websites Business Growth Penetration Testing Virtual Machines Local Technology vulnerabilities Specifications Workers Virtualization Wireless Technology Physical Security identity theft Network Congestion Access IoT Devices Internet 101 Tips and Tricks LiFi Data Security Deep Learning Webcam Microsoft Office 365 Software as a Service Phishing Scams botnet attack Risk Creep camera Sales Tax Dell ’s Sonicwall Global Management System Television Samsung Society Microsoft Bookings media experience Streaming Media Redundancy Spyware Budget Remote Computing Internet Connected Devices Visible Light Communication Audit Office Google Drive Microsoft Office 365 features Virus IT Consultation botnet IT for Oil Companies macbook Password Mouse Tablets Windows 8 booking process information Windows XP Hack Laptop Website Maintenance Vendor Management Telephony Compliance Law IT IT Assessment DDoS attacks Risk Management Mobility SharePoint Tech Support Event Flash Managed Service Provider Cache Tablet Solid State Drive enterprise productivity software Advertising Fortinet Monitors VoIP IT Security Lawyers Hosted Solution IT Strategy Kaseya DDoS security precautions Printer Mixer Settings Virtual Desktop Emergency SOX Business Security Displays Freedom of Information IT Solutions Administration Kaseya Connect Information Security password manager LastPass Vendors Computer Care Business Technology Workplace Tips Communications Sarbanes-Oxley Act Time Management Proactive IT Fast food Printing Fake News Bluetooth Attorneys Quick Tips How To Conference Social Engineering Email Security user confidence Cryptocurrency Running Cable Community Involvement Chamber of Commerce Disaster Office Tips Phone System End User Testing Unified Threat Management Music Uninterrupted Power Supply face Downloads Microsoft Excel Safety Managed Services Cleaning Cabling Hacking Download Hardware as a Service Data Protection surveillance cameras Government Google Calendar Writing Content Filtering LastPass healthcare communication device Knowledge HaaS Business Comunications Black Market Corporate Profile Trend Micro Virtual Reality Social Business Communications VPN Press Release Managed IT Programming AtomBombing Worker tool Rebrand business owner Education Tech Terms Vendor Mangement Distributed Denial of Service Experience Touchscreen Cloud Backup Google Play Store Comparison Retail Banking Paperless Office Users G Suite Travel Processors Computer Malfunction 3D Printing Employer-Employee Relationship Sync Messenger Private Cloud Microchip CCTV In Internet of Things Books Work/Life Balance Motion Sickness Web Server IT service Reading Machine Learning Hiring/Firing Meetings Ordinary Computers collaboration capabilities Bring Your Own Device Wi-Fi Relocation Emails Marketing Administrator Hacker quantum computers Documents Tracking Phone Systen base infrastructure Hacks Supercomputer Text Messaging PDF Automobile Holiday Computing security solution Unified Threat Management Notifications IT Consultant Business Metrics network security professionals CrashOverride end-of-support date Language holiday season Training Chromebook Playbook Rental Service Flexibility Miscellaneous UTM holidays Employer Employee Relationship Cortana breach methods Digital Payment Reliable Computing Threat management scammers Twitter Taxes Public Cloud Telephone Systems Scalability scams Health