Watch Out for Hidden Malware on Your Phone

Malware Smartphone

What You Need to Know About Android Malware

Hackers are devising new ways to infect phones with malware. Learn about the latest attack on Android phones and how to minimize your risk of getting malware. 

Malware Smartphone

Since the first computer operating systems hit the market, malware has been a serious security concern. Today, malware can infect not only desktop and laptop computers, but devices that are connected to nearly everything we do: our phones. In July 2019, cybersecurity experts found that up to 25 million Android phones were infected with malware masquerading as trusted apps like WhatsApp. Here’s what you need to know.

Imposter Apps

The latest malware threat was able to breach Google’s Android OS and replace legitimate apps with “zombified” versions that bombard users with unwanted ads. The outbreak affected approximately 15 million phones in India, 300,000 in the U.S., and nearly 140,000 in the U.K., making it one of the most devastating cyberattacks of the decade.

The malware was traced back to 9apps.com, a third-party app store owned by Chinese company Alibaba. Hackers that plant malware on these sites usually target users in developing nations, though this particular attack hit a significant number of phones in the states and the U.K.

Research thus far into the imposter apps found no threat apart from malicious ads. However, hackers that employ this type of attack can potentially do much more evil such as stealing user data, tracking user locations, and even accessing private messages.

How Does the Malware Work?

The malware is programed into a variety of apps such as photo editors, games, and messaging apps and made available for download. Once downloaded, the app runs the malware, which is often disguised as a harmless app update. The malware then corrupts popular apps such as WhatsApp, turning them into zombie apps that launch unwanted ads. In this case, the hacker’s end goal appears to be to trick users into tapping the ads and generating revenue via a pay-per-click scheme. Fortunately, the malware does not appear to affect other data stored on the phone.

Who’s Behind the Malware?

Experts have linked the malware to a Guangzhou company involved in developing and marketing apps for Android phones. While most of the carrier apps were made available on third-party storefronts, the hackers may have considered sneaking the apps onto Google Play. Researchers at Check Point are working closely with Google to identify and take down potential malware installers.

How to Protect Your Android Phone from Malware

A good first step in minimizing your risk of malware is to update your phone to the latest version of Android OS. Be wary of downloading apps on third-party stores, which typically have fewer security measures in place than the official Google Play store. Even after taking these precautions, you should still be proactive in recognizing red flags. For example, if an app suddenly starts displaying ads or behaving differently than before, it’s likely infected. To fix this, navigate to your phone’s app info list and uninstall ones you don’t recognize.

No matter how many security updates Google releases, hackers will find and exploit loopholes. You can help stop hackers by being aware and reporting suspicious activity on your Android phone to Google.

Secrets to Searching Tabs on Chrome (It’s Time to Get Organized!)

Searching Browser Tabs

Save Time and Headaches by Searching Your Open Tabs Instantly

It is easy to lose track of which open tab contains the information you need when you are researching.

Use this Chrome tool to instantly find the right tab.  

Searching Browser Tabs

Do you do a lot of research online for work or school? Then you know that It isn’t uncommon to have 6, 7, or even more tabs open on your internet browser at the same when you are working on a large project. But with that many tabs open, you can easily forget which tab contains the information now. But don’t worry, Google Chrome has your back.

With Google Chrome, you will never again have to feel frustrated or waste your time clicking randomly on multiple tabs trying to find the one you want. You can just use the URL box, or what Google Chrome calls it’s Omnibox, to search your open tabs for the one you need. You may already be aware of some of the most useful tasks you can access directly from Chrome’s Omnibox such as solving mathematical calculations, checking the local weather or even finding files on your Google Drive, but did you know you can use it to search through your open tabs?

How to Use the Omnibox to Search Open Tabs

  1. Enable the Omnibox search mode. The ability to search your open tabs is disabled by default. Before you can use it, you will need to enable the capability. You can do this by opening a new tab in your Chrome browser. Then in the Omnibox at the top of the page, type or paste Chrome://flags/#omnibox-tab-switch-suggestions. Hit enter on your keyboard. This will take you to a long list of options with Omnibox tab switch suggestions highlighted in yellowSelect Enabled from the dropdown menu just to the right.
  2. Restart your browser. You will need to restart your browser to complete the process. If you are in the middle of a project, you may want to use the Relaunch Now button to remember your open tabs after restarting. Otherwise, close and restart your browser in the normal way.
  3. Conduct your first search. After Chrome restarts, and you have at least two tabs open, it is time for a quick test. Enter text from the title of any of your open tabs into the Omnibox. As you type, you will see several suggestions popup under the Omnibox. If you want to jump to one of the open tabs, click on the Switch to this tab button next to the suggestion. This will open the tab immediately in the browser.

Everyone is looking for ways to streamline their workflow. This small tip will definitely save you a few seconds several times throughout your day, and significantly add to your productivity.

Intuitive Scheduling: The Missing Link for a Happy Office

Doctors Office Scheduling

Finding the right scheduling software can make everyone happier, and thereby make everything run a bit easier and a bit more smoothly. Here is what you need to find in the optimal scheduling software program, and where to find it.

Doctors Office Scheduling

The medical field has always been an industry in which accuracy is key. From the moment a referral is processed to the moment that a patient leaves the office after visiting with their physician, accuracy, privacy, and efficiency are all fundamental components of what drives the medical experience. Even in a small doctor’s office, it is common for a single physician to have several hundred patients that they care for regularly. Therefore, the task of managing the caretaking of patients and their private information largely falls to the support staff. While scheduling appointments may at first sound like the least complex task to manage within a physician’s office, efficiency and accuracy in scheduling are pivotal in ensuring the success of the entire office. Taking advantage of a quality scheduling software can help to streamline the scheduling process, thereby helping to ensure that patients are scheduled when they ought to be, with the doctor they need to see, and all pertinent information is managed accordingly.

Shifting to automated online scheduling makes it easier to:

  • Provide patients with easy access to schedule appointments
  • Simplify the job of office staff workers
  • Streamline the functionality of a medical office, regardless of size

There are a few things that every medical office needs if it wants to run smoothly. A strong office manager, highly skilled nurses, and a caring physician are all important factors—but you can’t overlook something that has grown to become even more fundamental to the medical field, the right technology. Without the right technology, you could find yourself losing information, or even worse, making information too easily available to malicious eyes, and spending hours that should be reserved for better caring for patients instead of trying to deal with complications and redundancies in software.

Shifting to an intuitive scheduling platform can help to drastically streamline the appointment process and lead to improved morale among patients, office workers, and medical staff.

What is self-scheduling?

Self-scheduling is quickly becoming one of the biggest technology trends in the medical industry. This sort of software allows patients to use any digital platform, such as their home computer or mobile device, to schedule, reschedule, or cancel appointments at any time. This takes a huge burden off of office staffers, who are typically fielding calls throughout the day to manage appointments, while also providing a level of comfort and support to patients who are now able to schedule their medical appointments more inconspicuously, and without the need to wait on hold until an office staffer is available.

Patients appreciate the 24/7 around-the-clock nature of online scheduling, and office workers appreciate the reduction in time spent on the phone managing those appointments. Instead of speaking directly to all patients, office workers can instead focus on ensuring that incoming patients have ample time to complete their intake paperwork, processing necessary prescriptions, or any other number of tasks that are the responsibility of the medical officer manager, like dealing with the needs of patients with more complex issues.

Automated Waiting List

Putting it in the patient’s hands to schedule their own appointment at their convenience means giving the patient peace of mind to consider their personal commitments as they make an appointment, thereby making it less likely that they will have to cancel or reschedule. However, it also provides the patient with the opportunity to see the next available dates for appointments, and even to sign up for a waiting list for an earlier appointment, should one become available.

Online Scheduling: The Organized Option

The biggest benefit to shifting to an automated schedule is the organizational bliss that comes from putting all incoming information in one place. By utilizing an intuitive scheduling platform it is possible to cut down on wasted hours in the office, to reduce errors in scheduling by limiting overbookings and canceled appointments, and to ensure that all booked appointments are properly prepared for and the medical files necessary for each appointment are processed accurately. Office staff can easily work with the scheduling platform to match patients with the necessary provider, process insurance information, and fill in a provider’s schedule—all in one sitting. For a large medical facility, shifting to an automated scheduling system is a must-do to keep the office above water. For a small medical facility, this simple decision can make a world of difference in the level of functionality and productivity in the office.

Are You Tired of Google’s Background?

Google Chrome Background

Google Chrome Background

Change Your Background Image on Chrome

Do you want to add a little bit of your personality to your web surfing and internet searches? It is easy with the Chrome browser and this simple guide.  

Google’s is far and away the most popular search engine online. Besides returning helpful and fast search results, the website is streamlined and utilitarian in nature, letting visitors find the information they want without needing to deal with all the distractions of other search engines out there. And while the search bar on the home screen of Google’s Chrome browser is fine, some businesses and individuals may prefer a more customized experience such as adding a favorite photo or a company logo. Lucky, that is not a problem. Google, and the Chrome browser gives you the ability to choose any background image you want. And the best part is that’s it easy to set up!

How to Set Up a Personalized Google Background

  1. Load your Chrome browser. Chrome is a fast, secure, and easy-to-use browser, so, if you don’t already have it, download it now.
  2. Decide whether you want to use a pre-made Google theme or if you prefer to use one of your own photos. You can find a wide selection of pre-made themes to suit a wide variety of different styles and interests in the Google Store.
  3. Choose the pre-made theme you want. You can access the Google Store by launching the Chrome browser. Once the browser loads, look for the icon with the three dots in a vertical row. It is located to the far right of the address bar. Click on the icon and choose the Settings option near the bottom of the drop-down menu. From the menu on the left side of the Settings page, select Appearances. A new menu will open in the middle of your screen. Click on Themes from the new menu, and you will have access to dozens of themes from landscape photos to Zodiac symbols. Once you find a theme you want, choose Add to Chrome. Now when you open a new tab, your new theme will appear.
  4. Choose your own background image. Do you want to personalize your background even more? Then you can opt for using your own background image. You can do this by opening a new tab in the Chrome browser. On the bottom right of the screen is a button which says Customize. Older versions of Chrome may display a gear icon in the same place. Clicking on either will bring you to a Customize this page menu. Select Upload an image, and you can navigate to the file you want to upload. Once completed, open a new tab to make sure it worked.
  5. You can always reset. Do you prefer the official Google page? No problem, you can easily reset. Click on the Customize or gear icon at the lower right of the screen and select Restore default background.

Now that you know how to change the backgroud image, go ahead and experiment. You will be amazed how making one small change can have such a significant impact on a tool you use every day.

How to Leverage iOS12 Enhancements to Boost Productivity

IOS 12 Quick Tips

How to Use iOS12 to Instantly Share Information With Colleagues

Want an easier way to communicate with your colleagues? Save time and reduce errors by learning how to instantly exchange information using iOS12’s share feature. 

Beginning with Apple’s release of iOS8, it has been easier to share information, files and apps with others, including colleagues. The feature continues to be available in iOS12 as either an icon or a share link within apps. Individuals can share information within a message, an email, or by using AirDrop. The share feature also integrates with social media apps, such as Twitter and LinkedIn. iOS users can also share information with themselves through apps such as Notes and Reminders. The ability to seamlessly and instantaneously share information with others can boost productivity regardless of whether everyone is in the same office. By learning how to share files, images and media, employees can keep exchanging important and relevant content when urgency is a factor.

Using the Share Icon

With built-in iOS apps such as Photos or Safari, the share feature is available through the share icon, which is usually located at the bottom. In iOS12, the share icon resembles a single document or piece of paper with an arrow extending from the top. To share an image, a web page or link, or information within the News app, tap the share icon. In some of the built-in apps, the share icon will be located at the top instead of the bottom.

Besides news stories, articles, useful internet links, and images, location information from the Maps app can be shared with others. Venue information for meetings, conferences, and events that occur outside of the office can be exchanged without having to type all of the information within a separate email. Likewise, if one individual has written notes from an interview or something similar, the share icon is available within the Notes app to send it to the person that needs it. The act of retyping the information in an email or trying to describe it in a voicemail is no longer necessary.

Using the Share Feature

Some of the apps within iOS12 allow sharing, but do not display the share icon. The Contacts app is one of them. Employees can still share contact information, including name, phone number and email address using the “Share Contact” link.

Apple’s iOS12 also displays its share feature with three dots within apps that contain music and videos. The three dots represent a menu that brings up a series of options, including the ability to share. Depending on the app and the media, one could see a “Share Song,” “Share Album,” or “Share Episode” link. Podcasts with useful tips and information related to one’s industry, discipline, and particular role can be shared this way.

The need to share information with colleagues is not new, but the ability to instantly share pertinent information and files in digital form is. Learning how to leverage built-in mobile tools can make the process easier, more efficient, and more accurate. Apple’s iOS12 share feature is one of those tools that can become critical to productivity while traveling or working remotely. With modern smartphone capabilities, waiting to share information or taking extra steps to ensure colleagues are kept in the loop no longer have to be part of employees’ normal routines.

IOS 12 Quick Tips

Get More Out Of The Clipboard In Windows 10

Windows 10 Tips

Get More Out Of The Clipboard In Windows 10

You may have been using Windows 10 for some time now, but it’s likely that you haven’t mastered all of its features just yet.

Copy/Paste was a revolutionary feature when it came out years ago. However, operating systems have been slow to adopt the next logical step in its evolution – the clipboard.

Did you know that you can save 10 or more items to your clipboard on a long-term basis?

It’s simple – hit the Windows key + V to bring up your clipboard history. It’ll show you the many things you’ve Copy/Pasted, any of which you can choose to delete (for security purposes, if it were, say, a password) or pin for later use.

That way, you don’t have to always go back and Copy/Paste that same info from the same note or .doc file – you can have it ready for use on your clipboard for as long as you need it.

Enjoying our Windows 10 Tips and Tricks emails over the past few weeks?

How to Use Your Computer to Install Apps on Your Android Device

Installing Android Phone

Downloading Apps on Your Android Device: How to Use Your Computer

Installing apps to your Android phone via your desktop computer (or other “unofficial sources”) is fast and easy. Learn the simple process right here.  

Installing Android Phone

One of the best things about Android devices is the fact that you can access and execute unique commands on your Android from other devices, such as your computer. Of course, if you own and use an iOS (Apple) device, you know that there are certain commands you perform from your computer as well. But Androids allow for even more flexibility, and in particular, the ability to bypass the official “Google Play Store” for downloading apps.

Instead of being forced to use “Google Play Store,” you can instead opt to retrieve apps for your Android device from nearly any source. Without restrictions, you can download and install these apps onto your Android with just a few clicks.

Here’s how to do it.

Steps to Installing Android Apps From Your Desktop

Before diving into the specific steps, let’s talk about the utility you’ll need to use for this procedure. It’s called Android Debug Bridge or ADB, and it can be used on any operating system, from Windows to Linux and Mac.

This utility is what will allow you to transfer the installation of any app from your computer to your Android device. You can even remove apps that already exist on your Android device — all with Android Debug Bridge and all from your computer.

Ready to download some Android apps? Let’s get started!

Step 1: Download Android Debug Bridge.

Naturally, the first step in this process is to download Android Debug Bridge to your desktop computer. You can do this by going here. You’ll see the package called “SDK Platform-Tools.” Download the package for your appropriate operating system. Do not do anything with the download just yet.

Step 2: Enable your Android device to be recognized on your computer.

  • Head to the “Settings” app on your Android.
  • Navigate to “About phone,” and from them, tap on “Build number.” Do this approximately seven or eight times until it states you are a developer.
  • Go back to the “Settings” app.
  • Now, you’ll see an option labeled “Developer options.” Tap here.
  • Tap “USB debugging” to turn it on.

You’re all set to try installing an app!

Step 3: Get set up to download an Android app from your desktop.

Grab a USB cable, and use it to attach your desktop and Android. At this point, you may be asked to select your mode of connection. In this case, you should select “data transfer.”

Mac users:

1. Open Terminal

2. Enter: cd

3. Press “Spacebar”

4. Drag the folder labeled ADB from your “Downloads” folder (or wherever you receive downloads) and drop it into Terminal

5. Press “Enter”

PC users:

1. Open the downloaded ADB folder

2. Hold “Shift” down and right-click (doesn’t matter where)

3. From the pop-up menu, select “Open a command window here”

Step 4: Start the download process.

In the Terminal window at your disposal, type in the following: ./adb devices. Press “Enter.”

From here, you’ll see your Android phone listed (along with any other attached devices).

Keep in mind that at this point, you should already have the Android app APK file at-the-ready for installation. Keeping Terminal open, type in the following: ./adb install. Please “Spacebar.”

Now, navigate to the Android app APK file you’ve chosen as your first installation, and click and drag it into Terminal. Drop it into Terminal, and finally, press “Enter” to begin the installation process.

Head to your Android device and double-check that your new app has been downloaded.

And there you have it!

Not Interested in Downloading Apps This Way? ADB Can Still Be Highly Useful

Advanced Debug Bridge is a popular utility, most notably because of its ability to let you download apps to your Android device from basically any sources.

But even if you don’t plan on downloading and installing apps to your Android device with Android Debug Bridge, it’s a great utility to have on your computer. That’s because it allows you to perform numerous other useful tasks.

The most notable benefits you may receive from downloading and using ADB include the ability to create complete backups of your Android devices, the ability to reboot your device in recovery mode, and the ability to record your screen.

Whether you’re a professional developer or an average Android user, Advanced Debug Bridge is an excellent utility to consider. Again, you can find it here for immediate download.

Microsoft Ending Support On Key Products

CEO Fraud

Microsoft End of Support 2020

Six Essential Steps For CEOs To Take For Microsoft EOS 2020

What steps should I take if my Microsoft operating system support is ending in January 2020? Windows 7 support is ending January 2020 essential steps to take.

Microsoft is ending support for a number of operating systems and software packages starting January 2020. What does end of support (EOS) mean? Your computers and network will no longer receive software patches or security updates. You won’t be able to access paid telephone or online support for bugs or problems. The biggest threat with Microsoft EOS is security. Without security updates, your system will be much more vulnerable to hackers.

What Microsoft programs are ending support in January 2020?

You can access a complete list of programs on Microsoft’s EOS site. A partial list of programs ending support in January 2020 include:

  • Windows 7
  • Windows Server 2008, Windows Server 2008 R2
  • Windows 10, version 1709 and 1809
  • Windows 10, version 1803
  • System Center (5 programs), version 1807
  • Exchange Server 2010 (all editions)

Will EOS just affect these programs or can it affect others?

Microsoft’s January 2020 EOS will affect operating systems and server programs as well as programs that use the operating system. Your business could be using essential programs that run on the operating system. These are LOB (Line of Business) programs.

Your LOB programs could include:

  • Business databases
  • Customer relationship management (CRM) software
  • Invoicing and billing software
  • Accounting programs
  • Programs for your industry: CAD, ERP, graphic design, word processing

Could your LOB programs stop working if you don’t upgrade your Microsoft OS or server suite of programs? Yes: you could experience significant downtime due to bugs, glitches, and security problems.

What steps should we take to make sure we’re covered for Microsoft’s January 2020 EOS?

  • Start planning as soon as possible — don’t wait until December 2019
  • Assess your inventory of essential LOB programs and apps.
  • Identify who uses the programs and how essential they are
  • Find out if the programs will run on upgraded Microsoft operating systems
  • Select the appropriate Microsoft OS or Server suite for an upgrade
  • Update and/or upgrade your essential LOB programs to run on the new Microsoft OS or Server programs

What can a managed services provider (MSP) do to help with Microsoft’s EOS in January 2020?

If you already have an MSP and they haven’t talked to you about Microsoft’s EOS in January 2020, you might have a newer OS or server that won’t be part of this EOS. Microsoft is currently providing five years of standard support and 10 years of extended support for its products.

If you don’t have an MSP, Microsoft’s EOS offers you an opportunity to contact one. MSP’s have already handled many upgrades and migrations based on Microsoft’s EOS process. You should interview several MSP’s to find out which one is most qualified to help your business. Look for an MSP who’s got experience with your business’s software needs. Look for an MSP who can communicate clearly. Another plus? A provider with good people skills who’s experienced in working with people who’ll need to start using upgraded software. The security risks involved with failing to upgrade older Microsoft operating and server systems are too great to put off upgrades or allow people to continue to use old, outdated software that’s out of support.

Once you’ve selected the MSP that’s right for you, sit down with them and establish a plan for your options for upgrading your OS and essential LOB software and apps. More Microsoft programs are set for EOS later in 2020. Begin the process now to ensure a smooth transition.

3 Stories of Healthcare Business Associate Data Breaches Will Shock You

Healthcare

Healthcare Business Associate Data Breaches

3 Shocking Healthcare Business Associate Data Breaches Stories

What the worst that could happen? 3 healthcare data breach stories aren’t for the faint of heart. Find out how to protect your company from similar outcomes  

Breaking news. July 25th, 2019. Northwood, a medical equipment benefits administrator in Michigan had to notify their many healthcare partners that their patient data had been compromised after a hacker bypassed security to access and employee’s email. As a result, over 15 thousand patient records were affected. After spotting seemingly nefarious activity on the email, security was alerted. But they determined that the entity had had access for three days, an eternity to steal patient data. Diagnoses, social security numbers and more were among the causalities.

Alert! Nearly four thousand patient records compromised when Cancer Treatment Centers of America experienced an email hack. If only this were an isolated situation. But unfortunately, it’s the third within a short time as those seeking to do harm deploy email phishing attacks at the company on a regular basis just waiting for someone to take the bait. This time the hacker had access for 11 days.

Not again. American Medical Collection Agency (AMCA) experienced an eight-month hack of patient data that exposed over 25 million patients’ information. Over 20 of their partners were affected, including names you know like Quest Diagnostics and LabCorp. Laboratory Medicine Consultants claims that their business associate, AMCA “downplayed” the incident, leading them to believe that the breach was much less impactful than it was and causing the need for more extensive investigation.

These breaches are recent and investigations ongoing so at this time we can’t quantify the personal casualties, HIPAA penalties or lawsuits that will likely result for both the business associates and the hospitals, labs and other medical providers that trusted them to protect their patients from third-party data breaches.

Stories like these remind us of the impact of healthcare business associate data breaches and the importance of putting systems in place to protect patients and our healthcare company’s financial interests. Let’s explore the solutions that these companies and their partners, unfortunately, implemented too late to prevent the data breaches but you can proactively employ to prevent a similar fate.

1. Get the Business Associate Agreement Updated

As a healthcare organization, you work with several third parties who have access to varying levels of patient data. And we couldn’t function without them.

You need business associates to:

  • Access to expertise you don’t have in-house
  • Keep costs low and standards high
  • Collaborate with other healthcare professionals

While a BAA won’t completely protect you when business associate data breaches occur, it does outline what your partner is doing to keep patient data safe. This allows you to evaluate their standards and make the best decisions for your organization.

2. Re-evaluate What You Share with a Business Associate

Patient information should always be on a need-to-know basis. For example, a collection agency doesn’t need diagnosis information to collect on a debt. But you could be unwittingly sending this if you simply send over un-redacted patient records. You’ll find many examples of similar cases, so evaluate your exposure and limit the risk.

3. Invest in Your People

You can have the highest level encryption, firewalls and anti-virus, but a phishing email can help a hacker bypass all of it. Typically, an employee receives an email asking them to click a link. That link may lead somewhere that looks familiar, encouraging them to enter a password. Or the link may cause the download of a file that compromises security. Stay informed about the risks and continually update your teams about the types of tricks hackers use to access patient data.

4. Vet Third-Party Software

We all know that there’s an app for that. Apps make our lives easier and can do almost anything. And in a business where time is money, we’re always looking for ways to increase productivity, patient satisfaction, inventory management and more. But any third-party software, even if it’s a trusted name like Microsoft or Google, is an opportunity for those trying to access patient data to do so.

Know who your partners are and what security measures they employ. Some software companies have varying levels of security on their software. And we can assure you that if someone in your company is using the “free version” of a service like Dropbox or Google Drive, it doesn’t have the security you need.

Work with IT security experts to evaluate their security measures. And know that software companies also need to sign a BAA if you will be giving them access to patient data. If they won’t sign it, choose another application.

5. Take Stock of Your Current Security Technologies

Are these technologies high-caliber enough for healthcare? Are they able to reduce the risk of today’s modern security threats, which are often clever and highly convincing?

Once again, if you don’t have the high-level security expertise in-house, consult with experts who can evaluate your risks and recommend solutions.

Consult with Managed IT Security Specialists

The average IT director or manager may be very good at his or her job. But today’s security risks extend beyond the training and knowledge of even the best IT professionals. You need to work with security specialists who understand the risks because they manage and eliminate those risks for healthcare companies every single day.

Working with business associates is essential to the function of any healthcare organization, but you don’t have to take on that additional risk when you work with professionals who can help you evaluate those partnerships and keep patients safe.

Auto-Lock Your Computer In Windows 10

Windows 10 Tech Tips

Windows 10 Tech Tips

Auto-Lock Your Computer In Windows 10

You may have been using Windows 10 for some time now, but it’s likely that you haven’t mastered all of its features just yet.

Do you know how to get your computer to automatically lock while you’re away from it?

It’s a feature included with Windows Hello. While you may already be using Windows Hello to unlock your computer with face recognition, you may not know about Dynamic Lock.

Here’s how it works – you configure Dynamic Lock to recognize a Bluetooth enabled device you keep on your person, such as your phone. After starting up, if that device goes out of range for longer than 30 seconds, your computer will automatically lock itself.

This feature allows you to get up and leave your computer unattended for short periods without having to worry about someone else snooping around your data.

Liking our weekly Windows 10 tips?  Let us know by replying to this email.