(703) 288-9767    NTC Store
NTConnections Blog

NTConnections has been serving the Reston area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Drag and Drop Between Android and Windows

Smartphones have proven to be excellent devices for enhancing an employee’s ability to be productive while mobile. However, this approach often means that company work is now on an employee’s mobile device, instead of on your network. This issue can be easily resolved if the mobile device in question runs the Android OS. We’ll go over how for this week’s tip.

Android-to-PC File Transfers
Due to the fact that an Android device allows you direct access to its file system, it can essentially serve the same purpose as your standard external hard drive. Just as you would plug an external hard drive into a computer to move data, you can most likely use the charging cable for your device to connect it to your workstation.

Once your smartphone is connected and unlocked, you should be able to find a notification informing you that the device is charging. Tapping the notification will bring up a menu of the USB connection capabilities, for which one option is “Transfer files.” With that enabled, open File Explorer on your workstation. Your Android device should be accessible through the File Explorer menu.

Accessing your device this way will allow you to browse through your files and copy them over to your PC.

Safely Leveraging BYOD
Of course, security should always be your first concern when implementing a new process. Even a process as small and simple as transferring files from a mobile device needs to be approached mindfully for the business’ safety. A Bring Your Own Device, or BYOD, strategy may be tempting to implement to help cut the costs of equipping your entire staff with company mobile devices. However, if you elect to enact BYOD practices, you need to be sure that you are properly prepared to deal with any risks associated with them. That’s where we come in.

NTConnections can help you to establish a BYOD strategy that meets the needs of your business--without exposing it to undue risk. Call (703) 288-9767 to get started.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 19 November 2017

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Cloud Privacy Best Practices Hackers Business Computing Productivity Microsoft Backup Malware Hosted Solutions Internet Google Efficiency Mobile Devices IT Support Business VoIP IT Services Managed Service Provider Miscellaneous Server Workplace Tips Business Continuity Innovation Data Upgrade Disaster Recovery Network Software Hardware Email Windows Save Money Saving Money Business Management Communication Computer Mobile Device Management Smartphones User Tips Microsoft Office Virtualization Network Security Browser Holiday Managed IT Services Android Windows 10 WiFi Smartphone Operating System Mobile Computing communications Hacking BYOD Social Media Computers IT Solutions Cybercrime Chrome Application Small Business Apple Proactive IT Remote Monitoring Avoiding Downtime Outsourced IT Passwords Office Marketing Budget Collaboration The Internet of Things Big Data Alert Quick Tips Ransomware Data Backup Automation Information Technology Employer-Employee Relationship Going Green Remote Computing Mobility Health Bring Your Own Device VPN Managed IT Services spam Recovery Social Engineering Wireless Technology User Error Managed IT Vendor Management iPhone Save Time Gadgets Firewall Cybersecurity Telephone Systems App Compliance Networking Private Cloud Mouse Redundancy Office 365 IT Support PowerPoint Website Excel Antivirus Phone System Content Filtering Downtime History Tablet Analytics Router Office Tips Retail Memory Search Bandwidth Lithium-ion battery Gmail DDoS Physical Security Data Recovery Artificial Intelligence Best Available BDR Robot People Public Cloud Environment Programming Google Drive Network Congestion Phishing Unsupported Software Trending SaaS How To Apps IT Consultant Safety Government Vulnerability Humor Meetings Data Security Saving Time Statistics Document Management HaaS Risk Management Cloud Computing Fax Server Law Enforcement Online Currency Black Market Data Management Solid State Drive Outlook Two-factor Authentication Internet of Things Printer Flexibility Money Internet Exlporer Data storage Current Events Biometrics Windows 10 Administration Data Storage Business Owner Maintenance Word Entertainment Running Cable Hard Drives Value Skype Unified Threat Management Facebook Mobile Office Customer Relationship Management Intranet Advertising Analyitcs Servers Debate Patch Management Data loss Computer Accessories IT Plan Laptop Settings Scam Distributed Denial of Service Flash Software as a Service Video Surveillance Virtual Desktop Cameras Consultant Human Resources Touchpad IT service Relocation Hybrid Cloud Virtual Reality Sync Education Update Computer Care Uninterrupted Power Supply Training Printer Server Domains Software Tips HIPAA IaaS Bloatware Worker Commute Spam Blocking Telephony Piracy Google Docs Cleaning Customer Service User Entrepreneur Start Menu Company Culture Licensing Voice over Internet Protocol Audit Windows 8.1 Update Samsung Tech Support Hacker Twitter HBO Cost Management Computer Fan Mobile Multi-Factor Security Screen Mirroring Crowdfunding Shadow IT Applications Wireless Files Science Frequently Asked Questions Professional Services Productivity Streaming Media Instant Messaging FENG Lifestyle Cast Wi-Fi Shortcut Print Server SharePoint Colocation Windows 8 Workers Tip of the week Tools Encryption Windows Media Player Bluetooth Data Protection Sports eWaste Computing Infrastructure Tablets Windows Server 2008 Monitor Hosted Solution Net Neutrality Hiring/Firing Computer Repair Notifications OneNote WIndows 7 USB Business Intelligence YouTube Wearable Technology End of Support Windows 7 Reputation Botnet Social Managing Stress Data Warehousing NarrowBand Work/Life Balance Internet exploMicrosoft Regulations Customers Travel Touchscreen LinkedIn Best Practice Social Networking Virus Root Cause Analysis IT Management Chromecast IT solutions Rootkit Video Games Knowledge Audiobook Netflix Charger Scalability Politics Transportation How to webinar Benefits PDF Loyalty Conferencing Keyboard Smart Technology Windows 10s Battery Experience Two Factor Authentication Assessment Music Password Television Troubleshooting Electronic Medical Records Techology Public Computer Employer Employee Relationship Legal Users Comparison Data Breach Automobile Emails Books Mobile Device CrashOverride Specifications IBM Webinar Emergency Worker Supercomputer Content