Contact us today!
845-876-6561

Professional Computer Associates Blog

Professional Computer Associates has been serving the Red Hook area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Drag and Drop Between Android and Windows

Tip of the Week: Drag and Drop Between Android and Windows

Smartphones have proven to be excellent devices for enhancing an employee’s ability to be productive while mobile. However, this approach often means that company work is now on an employee’s mobile device, instead of on your network. This issue can be easily resolved if the mobile device in question runs the Android OS. We’ll go over how for this week’s tip.

Android-to-PC File Transfers
Due to the fact that an Android device allows you direct access to its file system, it can essentially serve the same purpose as your standard external hard drive. Just as you would plug an external hard drive into a computer to move data, you can most likely use the charging cable for your device to connect it to your workstation.

Once your smartphone is connected and unlocked, you should be able to find a notification informing you that the device is charging. Tapping the notification will bring up a menu of the USB connection capabilities, for which one option is “Transfer files.” With that enabled, open File Explorer on your workstation. Your Android device should be accessible through the File Explorer menu.

Accessing your device this way will allow you to browse through your files and copy them over to your PC.

Safely Leveraging BYOD
Of course, security should always be your first concern when implementing a new process. Even a process as small and simple as transferring files from a mobile device needs to be approached mindfully for the business’ safety. A Bring Your Own Device, or BYOD, strategy may be tempting to implement to help cut the costs of equipping your entire staff with company mobile devices. However, if you elect to enact BYOD practices, you need to be sure that you are properly prepared to deal with any risks associated with them. That’s where we come in.

Professional Computer Associates can help you to establish a BYOD strategy that meets the needs of your business--without exposing it to undue risk. Call 845-876-6561 to get started.

What Should You Know About Regulatory Compliance?
3 Reasons VoIP Is An Improvement Over Traditional ...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 19 April 2018

Captcha Image

QR-Code

Tag Cloud

Security Tip of the Week Best Practices Privacy Cloud Technology Hackers Network Security Business Computing Backup Malware Managed IT Services Hosted Solutions Google Disaster Recovery Microsoft Software VoIP Business Continuity Business Mobile Devices Email Internet Outsourced IT Productivity Data Innovation Smartphones Cybercrime Efficiency Windows 10 Ransomware IT Support Android Data Backup communications Computer Hardware Browser Office Cloud Computing IT Services Alert Computers Server Telephone Systems Virtualization User Tips Mobile Device Management Windows Small Business Saving Money Smartphone Business Management Data Recovery Network BDR Quick Tips BYOD Cybersecurity Social Engineering Chrome Internet of Things Upgrade Law Enforcement Recovery Microsoft Office Holiday Private Cloud Collaboration Managed IT Hacking Social Media Mobility Miscellaneous Work/Life Balance Workplace Tips Office Tips Passwords Avoiding Downtime App Firewall Productivity How To Save Money Remote Monitoring HaaS Facebook Budget Operating System Information Technology Health Redundancy Password Gmail Business Intelligence Office 365 Flexibility Wi-Fi Data Management Two-factor Authentication Bring Your Own Device Managed Service Provider Communication Data Protection Phishing Proactive IT VPN Money Data Security Bandwidth Employer-Employee Relationship Automation Tech Term Vulnerability Safety Artificial Intelligence Managed IT Services Value Identity Theft Gadgets User Error Marketing Windows 10 Black Market Apps Router Compliance Google Drive Cleaning Data Breach SaaS Spam Risk Management Big Data End of Support Solid State Drive DDoS Data loss Internet Exlporer Hiring/Firing HIPAA Update Computer Care The Internet of Things Meetings Wireless Samsung Apple Patch Management CES Business Owner Data Storage Public Cloud Keyboard eWaste Scam Workers Remote Computing Document Management Wireless Technology Settings Save Time PDF Credit Cards Computing Infrastructure Automobile Worker IT Management Entertainment Mobile Computing Encryption Physical Security Word OneNote IT Plan Legal Wearable Technology Battery Training Unsupported Software Downtime Mobile Device History Content Filtering Comparison Applications Best Practice Charger Data storage Shadow IT Electronic Medical Records Spam Blocking Government Touchpad Software as a Service Accountants Unified Threat Management IBM HBO Books Conferencing Outlook Scalability Millennials YouTube Telephony Recycling Windows 10s Virtual Reality WiFi Internet exploMicrosoft Distributed Denial of Service Screen Mirroring Supercomputer Frequently Asked Questions Wireless Charging Emergency IT Support Humor Instant Messaging Workforce Skype Criminal Employer Employee Relationship iPhone Worker Commute Advertising Google Docs IoT Cast Telecommuting Current Events Excel Fiber-Optic Monitor Search Sports NarrowBand Start Menu Computer Accessories Audit Website Smart Tech Mouse Remote Work Tip of the week Cables Reputation How to Files Mobile Content Management Bluetooth Computer Fan Loyalty Hybrid Cloud Experience Knowledge Techology Voice over Internet Protocol Insurance Lithium-ion battery Windows Server 2008 Unified Communications Environment Transportation Customer Colocation Chromecast Professional Services Blockchain Running Cable FENG Data Warehousing Music Network Congestion Multi-Factor Security Practices Streaming Media Windows 7 Theft Benefits Emails Tools Human Resources Assessment SharePoint USB Uninterrupted Power Supply Trending Hosted Computing Fraud Regulations Cortana Smart Technology hacker Staff Rootkit Television Troubleshooting IT Consultant Lifestyle Inventory Amazon Notifications Google Apps People Content Botnet Digital Signature Fax Server Public Computer Hosted Solution Leadership Amazon Web Services Servers Infrastructure Two Factor Authentication Netflix Mobile Office Education Audiobook Going Green Travel Strategy Vendor Management Root Cause Analysis IT solutions Software Tips Robot Tech Support Online Shopping Flash Password Manager Relocation Politics Laptop Hard Drives Analysis Networking webinar Video Games Specifications Evernote IaaS Sync Business Mangement Antivirus Users Thank You Congratulations Webinar IT solutions Administration CrashOverride Access Control Authentication

Free Consultation

Free ConsultationSign up today for a
FREE Network Consultation
How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!