Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Easily Transfer Your Contacts From One Google Account to Another

b2ap3_thumbnail_email_migration_400.jpgGoogle Contacts is a useful tool that allows you to share your contacts with other users. In fact, it’s a great tool in general for any professional who is always on the move, and has to have access to a set of work contacts through an Android device. Today, we’ll help you import and export your Google Contacts to a different Google or Outlook account.

Exporting Google Contacts
First, you’ll want to be signed into the account from which you want to export your contacts. If you’re signed into Gmail, you can see your contacts by clicking on Gmail in the top-left corner, and selecting Contacts from the drop-down menu. This will display the Google Contacts interface. From here, look at the center menu and click More > Export.

Next, you’ll have to choose which contacts you want to export. You can select either specific groups or all of your contacts. You’ll be asked to choose the format you’ll want to use. If you’re transferring them to a Google account, you’ll want to use the Google CSV format. If you’re transferring to a Microsoft Outlook account, use the Outlook CSV format. If you’re using the Apple Address Book, use the vCard format. Then, all you have to do is click Export, and save the file.

Importing Your Contacts into another Google Account
Importing your contacts is as easy as selecting the CSV file that you just saved, and uploading it to your Gmail account. Here’s a quick step-by-step guide for uploading your CSV file.

  • Log into your Google account where you want your contacts to be.
  • Access Google Contacts.
  • Above the contacts list, click More > Import.
  • Choose the file you want to upload. In this case, it’ll be the CSV file that you just created.
  • Click Import.

You should then see your contacts appear in the app.

The cool thing to remember about this process is that you can do this on your Android device, too. You can use this if you want to change the Google account on your Android device, without wiping the data and all of its contacts along with it.

For more great tips and tricks, be sure to subscribe to Voyage Technology’s blog.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 11 June 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud Network Security User Tips Hardware Internet Efficiency IT Support Privacy Malware Google Email Computer Phishing Workplace Tips IT Services Users Collaboration Hosted Solutions Mobile Device Workplace Strategy Ransomware Quick Tips Cybersecurity Small Business Microsoft Communication Passwords Data Backup Saving Money Smartphone Backup Managed Service Android Business Management Smartphones VoIP Upgrade Mobile Devices communications Disaster Recovery Browser Data Recovery Windows Managed IT Services Social Media Microsoft Office Remote Tech Term Current Events Network Internet of Things Productivity Facebook Artificial Intelligence Automation Cloud Computing Covid-19 Gadgets AI Managed Service Provider Remote Work Miscellaneous Server Information Holiday Outsourced IT Training Employee/Employer Relationship Spam Compliance Encryption Windows 10 Office Data Management Business Continuity Government Windows 10 Business Technology Virtualization Bandwidth Blockchain Wi-Fi Vendor Two-factor Authentication IT Support Apps Data Security Mobile Office BYOD Mobile Device Management Gmail Chrome Budget Managed Services Voice over Internet Protocol Employer-Employee Relationship Apple App Networking Information Technology HIPAA Applications Office 365 Access Control WiFi Tip of the week Conferencing How To Hacker BDR Avoiding Downtime Computing Marketing Risk Management Router Virtual Private Network Analytics Office Tips Health Augmented Reality Help Desk Big Data Storage Password Bring Your Own Device Retail Healthcare Managed IT Services Computers Operating System Website Solutions Vendor Management Physical Security Firewall Display Printer Paperless Office Windows 11 Infrastructure Monitoring 2FA The Internet of Things Excel Social Document Management Remote Workers Telephone Scam Data loss Customer Service Going Green Cooperation Free Resource Project Management Windows 7 Patch Management Microsoft 365 Save Money Cybercrime Remote Monitoring Vulnerability End of Support Cryptocurrency IT Management Word Employees VPN Meetings Integration Virtual Desktop User Tip Data storage Modem LiFi Mobile Security Computer Repair Processor Safety Outlook Holidays Data Storage Money Humor Supply Chain Smart Technology Video Conferencing Managed Services Provider Machine Learning Saving Time Virtual Machines Professional Services Sports Mouse Managed IT Service Maintenance Antivirus Administration Downloads Customer Relationship Management iPhone Licensing Vulnerabilities Hacking Entertainment Data Privacy Presentation Settings Images 101 Printing Wireless Wireless Technology Telephone System Multi-Factor Authentication Mobility Robot Content Filtering Cost Management YouTube Permissions Workforce Hard Drives Directions Videos Unified Threat Management Assessment Electronic Health Records Wasting Time Threats 5G Domains Google Docs Trend Micro Unified Communications Security Cameras Workplace Strategies Network Congestion Specifications Experience Fraud Meta Running Cable Refrigeration Microchip User Error Internet Exlporer Software as a Service Bitcoin Username Google Wallet Managing Costs Amazon Public Speaking Lithium-ion battery eCommerce Point of Sale SSID Black Friday Virtual Assistant Outsource IT Laptop Entrepreneur Database Surveillance Windows 8 Network Management Drones IT Technicians Virtual Machine Environment Tech Support Media Proxy Server Reviews Cookies Medical IT Monitors Cyber Monday Hotspot Transportation Small Businesses Halloween Undo Tactics Development Mirgation Hypervisor Displays Websites Shopping Nanotechnology Optimization PowerPoint Language Employer/Employee Relationships Outsourcing Electronic Medical Records Scary Stories SharePoint Addiction Hacks Management PCI DSS Chatbots Navigation Fun Application Gig Economy Lenovo Screen Reader Deep Learning Workplace Writing Distributed Denial of Service Computing Infrastructure Teamwork Hiring/Firing Virtual Reality Service Level Agreement Internet Service Provider Regulations Compliance Server Management Identity Private Cloud Education Evernote Paperless IBM Bookmark Superfish Smart Tech Memes Identity Theft Co-managed IT Mobile Computing Alerts SQL Server Technology Care Twitter Download Net Neutrality Financial Data History Error Business Communications Search Browsers Smartwatch Connectivity IT Best Practice Scams Social Engineering Break Fix Upload Procurement Azure Hybrid Work Remote Computing Buisness Competition Social Network Telework Legal Cyber security IT solutions Tech Human Resources Multi-Factor Security Dark Web Cables CES IoT Communitications Tablet Business Growth Trends Supply Chain Management Alert User Customer Resource management FinTech Managed IT Regulations File Sharing Term Google Apps Dark Data Google Calendar Cortana Microsoft Excel IT Maintenance How To Data Analysis Star Wars IT Assessment Alt Codes Gamification Flexibility Staff Value Business Intelligence Notifications Downtime Organization Social Networking Travel Hosted Solution Shortcuts Legislation IP Address Ransmoware Fileless Malware Digital Security Cameras Techology Smart Devices Google Maps Typing Content Remote Working Wearable Technology Memory Vendors Recovery Health IT Google Drive Motherboard Data Breach Unified Threat Management Google Play Be Proactive Comparison Knowledge

Blog Archive