ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Dynamic Lock Isn’t Perfect, But It’s A Start

Tip of the Week: Dynamic Lock Isn’t Perfect, But It’s A Start

You’ve been told that it’s a best practice to ensure that you never leave your workstation without locking it first. Yet, if you’re only stepping away for a few minutes, it might be tempting to just allow it to remain unlocked. But what happens when you step away for longer than expected? You leave your computer exposed to all manners of threats. Thankfully, a new solution allows for a fix with a device that most are never without: the smartphone.

This trick lies in your computer having the Windows 10 Creators Update installed, which lets you connect your phone to your PC through Bluetooth. This helps your PC automatically lock itself when the two are separated. Thanks to a piconet, a type of short-range radio wave network that keeps Bluetooth devices working properly, this security measure is possible. Of course, the strength of the piconet will determine how far from your PC the device can be before the computer locks.

This Creators Update can help you create a piconet between your desktop and phone, which keeps Dynamic Lock from activating. If you remove the phone from the piconet’s range, Dynamic Lock will lock your computer to keep unauthorized users from using it.

Just keep in mind that Dynamic Lock is far from instantaneous. The device needs to be out of range, and the computer needs time to register that the connection has been severed. Only then will Dynamic Lock activate. Keeping this in mind, it’s still more secure to implement Dynamic Lock than leaving your computer unlocked all the time.

How to Set Up Dynamic Lock
To pair your phone to your PC, you want to confirm with your IT department that it won’t be an issue. Just reach out to them before following this procedure.

First, enable Bluetooth on your mobile device that you want to pair with your PC. Open Settings and access Bluetooth & Other Devices. Next, click Add Bluetooth or Other Device, which will prompt the Add a device box.

Once you’ve done this, select Bluetooth. Windows may take a moment to find your device, but once it does, it will prompt you to confirm a code that displays on both of your devices. Once you’ve done so and click Done, you’ll be brought back to the Bluetooth & Other Devices page in your Settings, where you can see your connected device.

Select Home and navigate to Accounts, where you’ll want to select Sign-In Options. You’ll find Dynamic Lock, where you check the box called Allow Windows to Detect When You’re Away and Automatically Lock the Device. Restart your PC to make sure the settings have been changed, and you’ll be all set. The only thing left to do is try it out!

For more great tips and tricks, be sure to subscribe to ClearView IT’s blog.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 05 July 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Privacy Network Security Data Cloud Business User Tips IT Support Internet Hardware Innovation Email Hosted Solutions Malware Efficiency Workplace Tips Computer Google Microsoft Collaboration Android Cybersecurity Business Management Phishing IT Services Backup Ransomware Data Backup communications Smartphone Microsoft Office Upgrade Small Business Smartphones Network Mobile Devices Data Recovery Communication Managed IT Services Productivity Quick Tips Social Media Users VoIP Mobile Device Tech Term Automation Business Continuity Facebook Windows 10 Covid-19 Passwords Holiday Disaster Recovery IT Support Browser Apps Managed Service Windows 10 Cloud Computing Outsourced IT Miscellaneous Data Management Remote Work Managed Service Provider Internet of Things Saving Money Operating System Government Networking Windows Workplace Strategy Artificial Intelligence Managed IT services Gadgets Encryption Mobile Device Management Business Technology App Blockchain Virtualization Remote Spam WiFi Server Information Bandwidth History Gmail Apple Office Two-factor Authentication Information Technology Office 365 Employee/Employer Relationship Budget BDR Health Big Data Analytics Conferencing Access Control Data Security Wi-Fi Cybercrime Employer-Employee Relationship Help Desk Cost Management IT Management Hacking Training Remote Computing Document Management Hacker Save Money Patch Management Voice over Internet Protocol Vendor Compliance Remote Monitoring Search... IBM Computing Best Practice Vendor Management Website Hard Drive Retail Alert Data loss Hiring/Firing Outlook Legal Password Data storage Money Customer Service Unified Threat Management Applications Firewall Mobile Office Project Management Augmented Reality Managed Services Word BYOD Vulnerabilities Monitoring Content Filtering How To Healthcare Storage Websites Mobility Router Meetings Google Maps The Internet of Things Twitter Scam YouTube Law Enforcement User End of Support Printer Laptop VPN Update Chrome Windows 11 Travel Virtual Reality Data Breach Social Engineering Social Sports DDoS Cryptocurrency Paperless Office SaaS Black Market Mobile Computing Antivirus Remote Workers Maintenance Cleaning Marketing Windows 7 iPhone Robot Free Resource Cortana Running Cable Education Multi-factor Authentication Co-Managed IT Lithium-ion battery Start Menu Entertainment Current Events Solid State Drive Downloads Computer Care Solutions Vulnerability Saving Time Processors Images 101 Drones Integration Chromebook Software as a Service Data Protection Computers Bitcoin Display Automobile Telephone HIPAA How To Employees Avoiding Downtime Microchip Flexibility Excel Holidays Wireless Technology eWaste Tech Terms Cooperation Hack Identity Theft Video Conferencing Downtime Notifications Managed IT Safety Digital Unified Communications Virtual Assistant Virtual Machines Google Docs Computer Repair Bluetooth Taxes Virtual Desktop PowerPoint Experience Professional Services Distributed Denial of Service Office Tips Administration Private Cloud Processor Memory Presentation Specifications Physical Security IT Consultant Managed Services Provider Disaster Politics Virtual Private Network Customer Relationship Management Machine Learning Settings Smartwatch Google Wallet Communitications Recovery Microsoft 365 Cables Competition Banking Touchscreen Messenger Emergency Proxy Server Deep Learning Emails Procurement Computer Malfunction Fake News Computer Accessories Entrepreneur Vendor Mangement Service Level Agreement FinTech Computing Infrastructure LiFi CES Hosted Solution Samsung Device security IT Assessment Documents Point of Sale Application Business Metrics Management Books Business Intelligence Uninterrupted Power Supply Wireless Headphones Supply Chain Management Webcam Microsoft Excel Value Cyber security Shortcuts Tech Language Business Mangement Going Green Organization Society Business Cards Tablets Smart Devices Securty Error Reading Bookmark Monitors Remote Working Visible Light Communication Domains Trend Micro Be Proactive Google Calendar Term Download AI Windows 8 Supercomputer Piracy Digital Security Cameras HTML Electronic Health Records Troubleshooting Transportation Virus Relocation Browsers Displays Nanotechnology Advertising Motion Sickness Wasting Time eCommerce Modem Workplace Strategies Comparison Google Play Work/Life Balance Google Drive Upload Tech Support Software License Videos Surveillance Public Speaking Social Network Knowledge Data Analysis Corporate Profile Screen Reader Streaming Media Managing Costs SSID In Internet of Things Television Security Cameras Keyboard Telephony Trends Employer Employee Relationship Mobile Technology Media Network Congestion Cabling Devices Development Business Owner Employer/Employee Relationships Hard Drives Hacks Customer Resource management Reliable Computing Fileless Malware intranet Writing Tablet G Suite Tip of the week Virtual Machine Optimization Wireless Smart Technology Mouse Shortcut VoIP Gamification Reviews Tracking Company Culture Environment 2FA Regulations Teamwork Heating/Cooling Telephone System Scalability Directions Social Networking Backup and Disaster Recovery Data Storage Web Server Windows XP Hypervisor Medical IT Administrator SharePoint Text Messaging Content Shopping Proactive IT Digital Payment Desktop Paperless Worker Accountants Inbound Marketing SQL Server Bring Your Own Device Electronic Medical Records Access Database PCI DSS Licensing Humor Supply Chain Time Management Gig Economy Music Public Cloud Health IT Business Communications Equifax Internet Service Provider Azure Audit Spyware Tactics Regulations Compliance Hard Drive Disposal Electronic Payment Managed IT Service File Sharing Memes Staffing Workplace Botnet Username Rental Service Redundancy Human Resources Micrsooft Startup Net Neutrality Freedom of Information IP Address Phone System Navigation Flash Cache Addiction Financial Data email scam Risk Management Business Growth Workers Mobile Security IT Scams Telephone Systems Unified Threat Management User Tip Google Apps Legislation News Printing Evernote Network Management Telework CCTV

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?