Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Lock Your Computer By Simply Walking Away With Dynamic Lock

Tip of the Week: Lock Your Computer By Simply Walking Away With Dynamic Lock

Security best practices demand that a workstation should never be left unlocked. However, it can be really tempting to leave it unlocked if you only plan on stepping away for a moment--but unfortunately, that moment can easily turn into many if you are distracted from your task. Fortunately, there is now a fix that relies on the one device most of us are never without: our phones.

If your computer has the Windows 10 Creators Update in place, you can connect your phone to your PC via Bluetooth so that the PC will automatically lock if the two devices are separated. This is accomplished with the help of a piconet, a short-range radio-wave network that Bluetooth devices use to function. Depending on the strength of the piconet, the devices can remain connected while further and further apart from each other.

The Creators Update allows you to create a piconet between your desktop and your phone, which keeps the Dynamic Lock from activating. However, if the phone is taken out of the piconet’s range, Dynamic Lock will lock the computer, protecting it from unauthorized users using it to access the network.

However, it must be said that Dynamic Lock is not instantaneous. First, your device has to be out of range, and secondly, the computer has to register the fact that the connection has been lost before Dynamic Lock will take affect. Regardless, activating Dynamic Lock is more secure than leaving a workstation unlocked indefinitely.

How to Set Dynamic Lock
Pairing your phone to your PC is a fairly simple process, but you should be sure to confirm the configuration with your IT department before activating Dynamic Lock.

If IT has approved the use of the Dynamic Lock feature, here is how it can be set up.

With Bluetooth enabled on the mobile device you want paired, open Settings and access Bluetooth & Other Devices. Make sure that Bluetooth is set to on. Click Add Bluetooth or Other Device, and a dialog box Add a device will open.

Once it does, select Bluetooth. Once you do, Windows will take a few moments to locate your device. Once it does, you will be prompted to confirm that the codes displayed on both your computer and your mobile device match. Once you click Done, you will be taken back to the Bluetooth & Other Devices page in Settings, where you should see your device displayed.

Now, select Home, navigate to Accounts, and select Sign-In Options. Find Dynamic Lock and make sure the box labelled Allow Windows To Detect When You're Away And Automatically Lock The Device is checked. Restart to ensure the settings are saved, and Dynamic Lock should be enabled and linked to your mobile device.

Your device should now automatically lock your workstation if brought too far out of range.

For more tips, be sure to subscribe to our blog!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 16 March 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware IT Support Privacy Workplace Tips Google Email Computer Phishing Workplace Strategy Collaboration Hosted Solutions Backup Small Business Users Ransomware Managed Service Mobile Device Productivity Microsoft Passwords Saving Money Quick Tips Communication AI Cybersecurity Smartphone Data Backup Disaster Recovery Data Recovery Android Upgrade VoIP Business Management Smartphones Mobile Devices communications Windows Browser Social Media Microsoft Office Managed IT Services Network Current Events Tech Term Internet of Things Remote Automation Artificial Intelligence Facebook Miscellaneous Information Holiday Compliance Gadgets Cloud Computing Covid-19 Training Server Managed Service Provider Outsourced IT Remote Work IT Support Encryption Spam Employee/Employer Relationship Windows 10 Office Business Continuity Data Management Government Business Technology Bandwidth Windows 10 Virtualization Blockchain Wi-Fi Mobile Office Data Security Apps Vendor Two-factor Authentication Tip of the week Chrome Mobile Device Management Managed Services Budget Voice over Internet Protocol Gmail Apple Networking WiFi App Employer-Employee Relationship BYOD Avoiding Downtime Office 365 Marketing Conferencing How To BDR HIPAA Computing Applications Information Technology Hacker Access Control Help Desk Analytics Website Office Tips Augmented Reality 2FA Retail Storage Healthcare Password Bring Your Own Device Managed IT Services Big Data Operating System Router Physical Security Virtual Private Network Risk Management Computers Health Monitoring Document Management Windows 11 Remote Workers Managed IT Service Firewall Excel Telephone Scam Data loss Cooperation Free Resource The Internet of Things Project Management Windows 7 Going Green Patch Management Social Save Money Microsoft 365 Remote Monitoring Vulnerability End of Support Vendor Management Solutions Cybercrime Customer Service Display Printer Paperless Office Infrastructure Data Storage Smart Technology Outlook Video Conferencing Machine Learning Managed Services Provider Money Saving Time Virtual Machines Professional Services Word Humor Supply Chain Maintenance Sports Downloads Antivirus Mouse iPhone Licensing Safety Entertainment Administration Vulnerabilities Images 101 Telephone System Multi-Factor Authentication Robot Mobility Cost Management Settings Data Privacy Printing Wireless Content Filtering IT Management Customer Relationship Management VPN Employees YouTube Meetings Integration Cryptocurrency User Tip Modem Hacking Processor Presentation Computer Repair Mobile Security Virtual Desktop Holidays Data storage LiFi Wireless Technology Laptop Websites Mirgation Hypervisor Windows 8 Amazon IP Address Drones Shopping Nanotechnology Optimization PowerPoint SharePoint Addiction Outsource IT Electronic Medical Records Language Employer/Employee Relationships Halloween Chatbots Media Recovery Navigation Management PCI DSS Environment Lenovo Gig Economy Screen Reader Hard Drives Writing Distributed Denial of Service Service Level Agreement Internet Service Provider Small Businesses Domains Virtual Reality Computing Infrastructure Teamwork Scary Stories Private Cloud Identity Evernote Hacks Server Management Regulations Compliance Displays Superfish Bookmark Identity Theft Smart Tech Memes Refrigeration Fun Deep Learning Download Net Neutrality Outsourcing Public Speaking Twitter Alerts SQL Server Lithium-ion battery Error History Financial Data Browsers Smartwatch Education Connectivity IT Workplace Social Engineering Break Fix Entrepreneur Upload Procurement Hiring/Firing Remote Computing Azure Mobile Computing Social Network Telework Cyber security Paperless Multi-Factor Security Tech CES Tablet IoT Communitications Co-managed IT Undo Search Dark Web Alert Best Practice Trends Supply Chain Management Technology Care Managed IT Customer Resource management FinTech Buisness File Sharing Regulations Business Communications Dark Data Google Calendar Term Legal Data Analysis IT solutions Star Wars IT Assessment Scams How To Microsoft Excel Notifications Staff Value Business Growth Gamification Flexibility Hybrid Work Organization Travel Social Networking Human Resources Application Legislation Techology Fileless Malware Digital Security Cameras Google Maps Smart Devices Cables Cortana Wearable Technology Memory Alt Codes Content Remote Working IBM Health IT Downtime Unified Threat Management Motherboard Data Breach Google Apps Comparison Google Play Unified Threat Management Directions Videos Hosted Solution Assessment Electronic Health Records IT Maintenance Permissions Wasting Time Typing Business Intelligence Trend Micro Shortcuts Network Congestion Specifications Security Cameras Google Drive User Error Microchip Internet Exlporer Software as a Service Ransmoware Competition Knowledge Fraud Managing Costs Username Vendors Point of Sale eCommerce Be Proactive 5G Black Friday SSID Google Docs Unified Communications Database Surveillance Workforce Experience Virtual Assistant Running Cable Tech Support IT Technicians Virtual Machine User Bitcoin Network Management Threats Google Wallet Proxy Server Reviews Cookies Workplace Strategies Monitors Cyber Monday Medical IT Tactics Development Meta Hotspot Transportation

Blog Archive