(703) 288-9767    NTC Store
NTConnections Blog

NTConnections has been serving the Reston area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Drag and Drop Between Android and Windows

Tip of the Week: Drag and Drop Between Android and Windows

Smartphones have proven to be excellent devices for enhancing an employee’s ability to be productive while mobile. However, this approach often means that company work is now on an employee’s mobile device, instead of on your network. This issue can be easily resolved if the mobile device in question runs the Android OS. We’ll go over how for this week’s tip.

Android-to-PC File Transfers
Due to the fact that an Android device allows you direct access to its file system, it can essentially serve the same purpose as your standard external hard drive. Just as you would plug an external hard drive into a computer to move data, you can most likely use the charging cable for your device to connect it to your workstation.

Once your smartphone is connected and unlocked, you should be able to find a notification informing you that the device is charging. Tapping the notification will bring up a menu of the USB connection capabilities, for which one option is “Transfer files.” With that enabled, open File Explorer on your workstation. Your Android device should be accessible through the File Explorer menu.

Accessing your device this way will allow you to browse through your files and copy them over to your PC.

Safely Leveraging BYOD
Of course, security should always be your first concern when implementing a new process. Even a process as small and simple as transferring files from a mobile device needs to be approached mindfully for the business’ safety. A Bring Your Own Device, or BYOD, strategy may be tempting to implement to help cut the costs of equipping your entire staff with company mobile devices. However, if you elect to enact BYOD practices, you need to be sure that you are properly prepared to deal with any risks associated with them. That’s where we come in.

NTConnections can help you to establish a BYOD strategy that meets the needs of your business--without exposing it to undue risk. Call (703) 288-9767 to get started.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, 25 May 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Cloud Privacy Best Practices Hackers Business Computing Hosted Solutions Productivity Microsoft Internet Malware Backup Google Mobile Devices Efficiency VoIP Business IT Support Email IT Services Network Security Miscellaneous Managed Service Provider Innovation Server Data Workplace Tips Network Disaster Recovery Business Continuity Business Management Software Windows Upgrade Communication Saving Money Hardware Browser Smartphone Mobile Device Management Managed IT Services Virtualization Computer Android Save Money communications Smartphones Data Backup User Tips Microsoft Office Cybercrime Holiday BYOD Computers WiFi Windows 10 Outsourced IT Small Business Cloud Computing Social Media Remote Monitoring Hacking Chrome Big Data Operating System Ransomware Mobile Computing Data Recovery Alert Apple Collaboration Proactive IT VPN Managed IT Services Internet of Things Avoiding Downtime Application IT Solutions Automation Employer-Employee Relationship Quick Tips Office Budget Information Technology Passwords Marketing Social Engineering The Internet of Things BDR Bandwidth Gadgets Managed IT Health Mobility Bring Your Own Device Recovery Tech Term Going Green Remote Computing spam Cybersecurity Telephone Systems Vendor Management Private Cloud Compliance How To Vulnerability iPhone Data Security Redundancy Wireless Technology Router IT Support User Error Two-factor Authentication Data Protection Artificial Intelligence Business Intelligence Website Save Time Firewall App Gmail Retail Memory Search Phishing Antivirus Identity Theft Networking Mouse Analytics Office 365 Law Enforcement Data Management Productivity PowerPoint Windows 10 Excel Phone System Office Tips Content Filtering Money Downtime Apps History Tablet Lithium-ion battery Document Management Value Risk Management Online Currency Update Google Drive Public Cloud Mobile Office Environment Customer Relationship Management Printer Human Resources SaaS Training Best Available People Safety HIPAA Current Events Programming Government Cleaning Network Congestion Credit Cards Trending Maintenance Meetings HaaS Fax Server Black Market Solid State Drive Applications Humor Statistics Infrastructure Intranet Data Storage Streaming Media Internet Exlporer Workers Word Data storage Biometrics Comparison Encryption Business Owner Outlook eWaste OneNote Flexibility Hard Drives IT Consultant IT Management Mobile Device Work/Life Balance Facebook Administration Entertainment Smart Tech IT Plan Saving Time Running Cable CES Physical Security DDoS Unified Threat Management Robot Data loss Skype Unsupported Software Sync Laptop Managing Stress Settings Cables Content Management Scam Distributed Denial of Service Virus Virtual Desktop Practices Remote Work Storage LinkedIn Charger Software Tips Telephony Touchpad IT service Unified Communications Virtual Reality Blockchain Debate Google Docs Relocation Hybrid Cloud Uninterrupted Power Supply Computer Accessories Hosted Computing Addiction Computer Care Start Menu Print Server Domains Theft Bloatware Staff Spam Blocking Voice over Internet Protocol Audit IaaS PDF Cameras Customer Service Inventory Cache Video Surveillance HBO Mobile Keyboard Consultant Cortana Entrepreneur Digital Signature Net Neutrality Education Multi-Factor Security Computer Repair Screen Mirroring Tech Support Printer Server Access Control Fraud Wireless Internet Frequently Asked Questions Professional Services Hacker Google Apps Worker Commute Cost Management Strategy Piracy Computer Fan Lifestyle Cast Shadow IT Authentication Amazon Tip of the week Tools User Wireless Files Science Instant Messaging Analysis Touchscreen Licensing FENG Password Wi-Fi Shortcut Nanotechnology Amazon Web Services Samsung Windows Server 2008 SharePoint Colocation Twitter Windows 8 Password Manager Accountants Electronic Medical Records Sports Connectivity Bluetooth Online Shopping Crowdfunding Windows 7 Botnet Monitor Hosted Solution Computing Infrastructure Tablets Business Mangement Specifications Data Warehousing Notifications Legal YouTube Devices USB Evernote Regulations Travel Reputation Wearable Technology End of Support Recycling Windows Media Player Social IoT Millennials NarrowBand Wireless Charging Servers Criminal Customers Internet exploMicrosoft Social Networking Hiring/Firing Root Cause Analysis Workforce Thought Leadership Best Practice Flash Chromecast WIndows 7 Fiber-Optic Company Culture Software as a Service Patch Management Advertising Analyitcs Insurance Telecommuting Content Filter Windows 8.1 Update Knowledge Audiobook Netflix Scalability Politics Transportation How to webinar Benefits Loyalty Conferencing Windows 10s Smart Technology Users Battery Experience Two Factor Authentication Wire Assessment Music Television Troubleshooting Techology Public Computer Employer Employee Relationship Automobile Data Breach Emails Books CrashOverride IBM Webinar Emergency Worker Content Supercomputer IT solutions Rootkit Video Games