Contact us today!
845-876-6561

Professional Computer Associates Blog

Professional Computer Associates has been serving the Red Hook area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Drag and Drop Between Android and Windows

Tip of the Week: Drag and Drop Between Android and Windows

Smartphones have proven to be excellent devices for enhancing an employee’s ability to be productive while mobile. However, this approach often means that company work is now on an employee’s mobile device, instead of on your network. This issue can be easily resolved if the mobile device in question runs the Android OS. We’ll go over how for this week’s tip.

Android-to-PC File Transfers
Due to the fact that an Android device allows you direct access to its file system, it can essentially serve the same purpose as your standard external hard drive. Just as you would plug an external hard drive into a computer to move data, you can most likely use the charging cable for your device to connect it to your workstation.

Once your smartphone is connected and unlocked, you should be able to find a notification informing you that the device is charging. Tapping the notification will bring up a menu of the USB connection capabilities, for which one option is “Transfer files.” With that enabled, open File Explorer on your workstation. Your Android device should be accessible through the File Explorer menu.

Accessing your device this way will allow you to browse through your files and copy them over to your PC.

Safely Leveraging BYOD
Of course, security should always be your first concern when implementing a new process. Even a process as small and simple as transferring files from a mobile device needs to be approached mindfully for the business’ safety. A Bring Your Own Device, or BYOD, strategy may be tempting to implement to help cut the costs of equipping your entire staff with company mobile devices. However, if you elect to enact BYOD practices, you need to be sure that you are properly prepared to deal with any risks associated with them. That’s where we come in.

Professional Computer Associates can help you to establish a BYOD strategy that meets the needs of your business--without exposing it to undue risk. Call 845-876-6561 to get started.

What Should You Know About Regulatory Compliance?
3 Reasons VoIP Is An Improvement Over Traditional ...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 21 January 2018

Captcha Image

QR-Code

Tag Cloud

Security Tip of the Week Best Practices Cloud Privacy Hackers Technology Backup Business Computing Network Security Hosted Solutions Managed IT Services Malware Disaster Recovery Microsoft VoIP Google Business Software Business Continuity Mobile Devices Productivity Outsourced IT Email Data Internet Smartphones Windows 10 IT Support communications Computer Hardware Innovation Efficiency Android Cybercrime Ransomware Office IT Services Browser Telephone Systems Data Backup Alert Server Business Management Saving Money Windows Computers Small Business Chrome Upgrade User Tips Quick Tips Mobile Device Management Social Engineering Managed IT Smartphone How To Cybersecurity Social Media Cloud Computing Data Recovery Miscellaneous Mobility Passwords Workplace Tips Work/Life Balance App Save Money Virtualization Avoiding Downtime Firewall Law Enforcement Network Recovery BDR BYOD Microsoft Office Hacking Collaboration Holiday Office Tips Managed Service Provider Office 365 Flexibility Wi-Fi Proactive IT Money HaaS Bandwidth Productivity Information Technology Health Private Cloud Facebook Two-factor Authentication Operating System Budget Communication Password Bring Your Own Device Google Drive Phishing User Error Marketing Spam SaaS Router Compliance Automation Managed IT Services Risk Management Data Breach Safety Employer-Employee Relationship Redundancy Remote Monitoring Windows 10 Gadgets Artificial Intelligence Data Management Black Market Gmail Value Internet of Things Save Time Downtime Cleaning History Data Security Entertainment Worker Automobile Spam Blocking Apps Best Practice Data storage Wearable Technology Shadow IT Government Battery End of Support Vulnerability Internet Exlporer Mobile Device VPN The Internet of Things Content Filtering Data Storage Applications Workers Charger DDoS Business Intelligence Public Cloud Identity Theft Solid State Drive Remote Computing Wireless Technology Credit Cards Hiring/Firing Meetings Computer Care IT Management Wireless Apple Samsung Word OneNote Computing Infrastructure Patch Management Business Owner Mobile Computing Keyboard Physical Security Unsupported Software Scam Settings Loyalty Experience Travel Techology Root Cause Analysis Running Cable Software Tips Streaming Media Transportation Comparison Online Shopping Password Manager Flash Music Going Green webinar SharePoint Benefits Specifications Evernote Sync Encryption Robot Tech Support Assessment USB Software as a Service Relocation Data loss HBO Laptop Conferencing Smart Technology Millennials People Rootkit Telephony Notifications Windows 10s Fax Server Television IaaS Troubleshooting Update Legal Screen Mirroring Wireless Charging Frequently Asked Questions Touchpad IT Support Workforce Mobile Office Training Content Skype Outlook YouTube IT solutions Public Computer Hosted Solution Google Docs Cast Education Fiber-Optic Internet exploMicrosoft Excel Two Factor Authentication Telecommuting Vendor Management Audiobook Start Menu Humor Audit Website iPhone Cables Advertising Tip of the week Remote Work Politics Mobile Hard Drives Monitor Computer Fan Antivirus Sports NarrowBand Knowledge Networking Big Data Voice over Internet Protocol Video Games Users Unified Communications Windows Server 2008 Electronic Medical Records Unified Threat Management Professional Services Reputation FENG Distributed Denial of Service Network Congestion WiFi IBM Books Multi-Factor Security Scalability Files Data Warehousing Virtual Reality Theft Hybrid Cloud Windows 7 Emails HIPAA Tools Customer Colocation Chromecast Supercomputer Emergency Trending Instant Messaging Fraud Worker Commute Cortana PDF Regulations Employer Employee Relationship IT Plan Mouse IT Consultant Current Events Lifestyle Search Amazon Google Apps eWaste Uninterrupted Power Supply Computer Accessories Botnet hacker Leadership Data Protection How to Amazon Web Services Document Management Infrastructure Servers Lithium-ion battery Netflix Environment Bluetooth Administration Business Mangement Recycling Thank You Webinar Congratulations IT solutions CrashOverride

Free Consultation

Free ConsultationSign up today for a
FREE Network Consultation
How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!