Tip of the Week: Everything You Need to Know to Create a Windows Shortcut

Creating Your Shortcut

First, you should right-click anywhere on the desktop that isn?t already filled up by an icon or application. You can then select New from the menu that appears. Next, select Shortcut.

You?ll see a new dialog box that asks you to provide a program, file, or folder that you?d like to make a shortcut for. You can use the Browse button to find the file locally. If you have found the file, folder, or program you want to open, hit the OK button. You?ll see the file path populate in the dialog box. Click the Next button, and you?ll be asked to give your shortcut a name. Once you?re ready, click Finish. That?s all there is to it!

Of course, the option to move the folder or file to your desktop also exists, but we urge you to consider who else might require access to that file or folder. For example, if you have a file stored on your network, the last thing you want is to move it from your network to your desktop, thus preventing anyone else from accessing it in their time of need.

Plus, depending on your role within your organization, you might not have permissions to do such a thing in the first place. It?s better to just make a shortcut on your desktop and use that to access the file or folder. It?s cleaner and more effective.

There are many benefits to keeping your files and folders stored in a centralized location, including the ability to back up said data in the event of a disaster.

If you?re interested in doing so, you can also pin a specific file, folder, or program to the taskbar at the bottom of your screen, also allowing easy access. To do this, just click and drag the specified file, folder, or program to the taskbar. You can then click on it to access it whenever you need to.

We hope you find some value in this tip! Be sure to keep an eye on our blog for more just like this.

Related Posts

Cyberthreats Threaten Your Entire Business

How Cyberattacks Imperil Your Business Cyberattacks manifest differently from other threats and yield a diverse array of consequences. They often involve attempts to infiltrate an organization's technology infrastructure with the intent to steal data, extract monetary gain, or extort business proprietors. As a result, business owners and managers are confronted with a host of distressing scenario...

You Need to Have a Business Continuity Plan for Your SMB

Business technology is known to be remarkably finicky, particularly if you do not have the requisite knowledge to manage and maintain it. After all, there is a reason why you hire an IT department or a managed service provider to handle this role. What happens if your technology fails, though? Do you have a plan in place? What does a plan like this even look like, anyway? Let’s dig into the detail...

Smishing: A Variety of Phishing Attacks Utilizing SMS

The Dangers of SMS Phishing, or ?Smishing? Ultimately, any plot carried out by a scammer that is trying to either pose as someone else or urge the user to do something particularly dangerous could be considered a phishing attack. This kind of definition goes beyond simple email scams, where you get a message in your inbox urging you to click on links or download infected attachments. There are ot...

FTC Safeguards Gets a Crucial Update

What is the FTC Safeguards Rule? The FTC Safeguards Rule is a regulation that compels financial institutions under the FTC's jurisdiction to implement comprehensive measures to protect consumer data. The rule applies to a wide range of entities, including banks, mortgage lenders, credit unions, and other financial service providers. Its primary objective is to ensure that businesses establish and...