Contact us today!
845-876-6561

Professional Computer Associates Blog

Professional Computer Associates has been serving the Red Hook area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Drag and Drop Between Android and Windows

Tip of the Week: Drag and Drop Between Android and Windows

Smartphones have proven to be excellent devices for enhancing an employee’s ability to be productive while mobile. However, this approach often means that company work is now on an employee’s mobile device, instead of on your network. This issue can be easily resolved if the mobile device in question runs the Android OS. We’ll go over how for this week’s tip.

Android-to-PC File Transfers
Due to the fact that an Android device allows you direct access to its file system, it can essentially serve the same purpose as your standard external hard drive. Just as you would plug an external hard drive into a computer to move data, you can most likely use the charging cable for your device to connect it to your workstation.

Once your smartphone is connected and unlocked, you should be able to find a notification informing you that the device is charging. Tapping the notification will bring up a menu of the USB connection capabilities, for which one option is “Transfer files.” With that enabled, open File Explorer on your workstation. Your Android device should be accessible through the File Explorer menu.

Accessing your device this way will allow you to browse through your files and copy them over to your PC.

Safely Leveraging BYOD
Of course, security should always be your first concern when implementing a new process. Even a process as small and simple as transferring files from a mobile device needs to be approached mindfully for the business’ safety. A Bring Your Own Device, or BYOD, strategy may be tempting to implement to help cut the costs of equipping your entire staff with company mobile devices. However, if you elect to enact BYOD practices, you need to be sure that you are properly prepared to deal with any risks associated with them. That’s where we come in.

Professional Computer Associates can help you to establish a BYOD strategy that meets the needs of your business--without exposing it to undue risk. Call 845-876-6561 to get started.

What Should You Know About Regulatory Compliance?
3 Reasons VoIP Is An Improvement Over Traditional ...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, July 21 2018

Captcha Image

QR-Code

Tag Cloud

Security Tip of the Week Best Practices Technology Cloud Privacy Hackers Network Security Business Computing Backup Hosted Solutions Malware Managed IT Services Google VoIP Mobile Devices Disaster Recovery Microsoft Software Productivity Business Business Continuity Internet Email Data Innovation Outsourced IT Data Backup Efficiency Cybercrime communications Computer Smartphones Ransomware Windows 10 IT Support Hardware Android Data Recovery Cloud Computing IT Services Browser BDR Office Internet of Things Alert Telephone Systems Tech Term Windows Computers Server Business Management Saving Money Virtualization Network Upgrade Cybersecurity User Tips Mobile Device Management Small Business Smartphone Chrome Save Money Workplace Tips Law Enforcement Managed IT Quick Tips BYOD Microsoft Office Social Engineering Collaboration Miscellaneous Money Passwords App Artificial Intelligence Communication Firewall Password Recovery How To Bandwidth Private Cloud Facebook Mobility Work/Life Balance Hacking Router Avoiding Downtime Office Tips Managed Service Provider Holiday Productivity Office 365 Social Media Proactive IT Remote Monitoring Two-factor Authentication HaaS Budget Automation Data Protection VPN Phishing Information Technology Health Redundancy Data Security Flexibility Wi-Fi Operating System Data Management Bring Your Own Device Gmail Applications Business Intelligence Entertainment SaaS Windows 10 Word Value Safety Risk Management Document Management Connectivity Spam Employer-Employee Relationship Apps Gadgets Vulnerability Compliance Black Market Managed IT Services Mobile Device Blockchain Google Drive Data Breach Cleaning Identity Theft User Error Big Data Marketing Credit Cards Solid State Drive Windows 7 Encryption Best Practice Hiring/Firing Access Control Data storage IT Management Shadow IT Computer Care HIPAA Government Infrastructure End of Support OneNote Wearable Technology IT Plan Internet Exlporer YouTube Samsung Analysis Patch Management Business Owner Unsupported Software Servers The Internet of Things Keyboard Scam Comparison Sports Paperless Office Public Cloud DDoS Save Time Remote Computing Wireless Technology Spam Blocking Data loss Worker Automobile CES USB Meetings PDF Update Smart Tech IT Support Wireless Legal Content Management Apple Computing Infrastructure Battery Training Physical Security Mobile Computing eWaste Education Website Data Storage Workers Content Filtering Settings Downtime Streaming Media Charger History Networking Electronic Medical Records Emails Unified Threat Management SharePoint Cache Relocation Google Apps Scalability Tools Digital Signature Laptop IBM Books HVAC Virtual Reality Trending IaaS Fraud Wireless Internet Regulations People Instant Messaging Strategy Touchpad Notifications Supercomputer Emergency Enterprise Content Management Employer Employee Relationship Fax Server Worker Commute Lifestyle Authentication Outlook IT Consultant Amazon Wire Password Manager Password Management Mobile Office Internet exploMicrosoft Search Botnet Current Events Computer Accessories IT solutions Nanotechnology Humor Leadership Business Mangement Netflix Amazon Web Services Smart Office iPhone NIST Advertising How to Travel Accountants Root Cause Analysis Bluetooth Monitor Software Tips Flash Recycling NarrowBand Loyalty Experience Online Shopping Techology Cryptocurrency Antivirus Transportation webinar Specifications Devices Reputation Wireless Charging Sync Criminal Music Evernote Students Files Safe Mode Hybrid Cloud Software as a Service IoT Benefits Conferencing Distributed Denial of Service WiFi Millennials Thought Leadership Customer HBO Fiber-Optic Telephony Chromecast Windows 10s Assessment Healthcare Colocation Smart Technology File Sharing Screen Mirroring Rootkit Workforce Content Filter Frequently Asked Questions Cables Skype Television Troubleshooting Electronic Health Records Business Technology Google Docs Insurance Cast Uninterrupted Power Supply Mouse Content Telecommuting Storage Excel Unified Communications hacker Start Menu Audit Public Computer Hosted Solution Machine Learning Two Factor Authentication Virtual Assistant Practices Vendor Management Audiobook Remote Work Tip of the week Theft Mobile Human Resources Computer Fan Lithium-ion battery Environment Telephone System Voice over Internet Protocol Hosted Computing Knowledge Running Cable Politics Addiction Hard Drives Windows Server 2008 Cortana Video Games Professional Services Staff Going Green FENG Users Multi-Factor Security Inventory Robot Data Warehousing Tech Support Network Congestion Webinar IT solutions CrashOverride Thank You Congratulations Twitter Administration Company Culture Managing Stress

Free Consultation

Free ConsultationSign up today for a
FREE Network Consultation
How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!