Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Easily Transfer Your Contacts From One Google Account to Another

b2ap3_thumbnail_email_migration_400.jpgGoogle Contacts is a useful tool that allows you to share your contacts with other users. In fact, it’s a great tool in general for any professional who is always on the move, and has to have access to a set of work contacts through an Android device. Today, we’ll help you import and export your Google Contacts to a different Google or Outlook account.

Exporting Google Contacts
First, you’ll want to be signed into the account from which you want to export your contacts. If you’re signed into Gmail, you can see your contacts by clicking on Gmail in the top-left corner, and selecting Contacts from the drop-down menu. This will display the Google Contacts interface. From here, look at the center menu and click More > Export.

Next, you’ll have to choose which contacts you want to export. You can select either specific groups or all of your contacts. You’ll be asked to choose the format you’ll want to use. If you’re transferring them to a Google account, you’ll want to use the Google CSV format. If you’re transferring to a Microsoft Outlook account, use the Outlook CSV format. If you’re using the Apple Address Book, use the vCard format. Then, all you have to do is click Export, and save the file.

Importing Your Contacts into another Google Account
Importing your contacts is as easy as selecting the CSV file that you just saved, and uploading it to your Gmail account. Here’s a quick step-by-step guide for uploading your CSV file.

  • Log into your Google account where you want your contacts to be.
  • Access Google Contacts.
  • Above the contacts list, click More > Import.
  • Choose the file you want to upload. In this case, it’ll be the CSV file that you just created.
  • Click Import.

You should then see your contacts appear in the app.

The cool thing to remember about this process is that you can do this on your Android device, too. You can use this if you want to change the Google account on your Android device, without wiping the data and all of its contacts along with it.

For more great tips and tricks, be sure to subscribe to Voyage Technology’s blog.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 21 September 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Business Productivity Software Innovation Hackers Cloud Network Security User Tips Hardware Efficiency Internet Malware IT Support Privacy Google Computer Email Workplace Tips Phishing IT Services Collaboration Hosted Solutions Users Ransomware Workplace Strategy Mobile Device Microsoft Quick Tips Small Business Passwords Backup Saving Money Cybersecurity Communication Data Backup Smartphone Managed Service Android Upgrade Business Management VoIP Smartphones Productivity Mobile Devices communications Data Recovery Disaster Recovery Windows Browser Social Media Microsoft Office Managed IT Services AI Current Events Network Tech Term Remote Internet of Things Artificial Intelligence Facebook Automation Cloud Computing Information Covid-19 Holiday Miscellaneous Gadgets Server Managed Service Provider Remote Work Training Outsourced IT Compliance Employee/Employer Relationship Encryption Spam Office Windows 10 IT Support Government Business Continuity Data Management Blockchain Bandwidth Windows 10 Virtualization Business Technology Wi-Fi Two-factor Authentication Mobile Office Data Security Vendor Apps Managed Services Voice over Internet Protocol Networking Chrome Mobile Device Management Budget Gmail BYOD Apple App Employer-Employee Relationship Tip of the week Conferencing Information Technology Hacker Avoiding Downtime Office 365 Marketing How To BDR HIPAA WiFi Applications Access Control Computing Computers Retail Risk Management Healthcare Website Managed IT Services Analytics Office Tips Augmented Reality Storage Password Bring Your Own Device Router Big Data Virtual Private Network Health 2FA Help Desk Operating System Remote Workers Telephone Scam Data loss Cooperation Free Resource Project Management Windows 7 Firewall Patch Management Save Money Microsoft 365 Remote Monitoring End of Support Vulnerability Vendor Management Solutions The Internet of Things Physical Security Display Social Printer Windows 11 Paperless Office Going Green Infrastructure Monitoring Excel Cybercrime Customer Service Document Management Presentation Cryptocurrency Managed IT Service Maintenance Wireless Technology Antivirus Downloads iPhone Virtual Desktop Data storage Licensing LiFi Vulnerabilities Entertainment Outlook Data Privacy Word Money Images 101 Humor Robot Mobility Telephone System Multi-Factor Authentication Cost Management Sports Mouse Safety IT Management VPN Employees Meetings Integration Administration User Tip Modem Computer Repair Mobile Security Processor Holidays Data Storage Settings Smart Technology Supply Chain Customer Relationship Management Wireless Printing Video Conferencing Content Filtering Machine Learning Managed Services Provider Professional Services YouTube Saving Time Virtual Machines Hacking Server Management Regulations Compliance Private Cloud Identity Evernote Paperless Co-managed IT 5G User Superfish Bookmark Identity Theft Smart Tech Memes Download Net Neutrality Google Docs Twitter Alerts SQL Server Technology Care Unified Communications Experience Running Cable Financial Data Error History Bitcoin Business Communications Google Wallet Social Engineering Break Fix Scams IP Address Browsers Smartwatch Connectivity IT Upload Procurement Remote Computing Azure Hybrid Work Laptop Social Network Telework Cyber security Windows 8 Multi-Factor Security Tech Human Resources Tablet IoT Communitications Drones Dark Web Cables Recovery CES Trends Supply Chain Management Alert Hard Drives Dark Data Google Calendar Term Google Apps Halloween Domains Managed IT Customer Resource management FinTech File Sharing Regulations Star Wars IT Assessment How To Microsoft Excel IT Maintenance Data Analysis Refrigeration Gamification Flexibility Notifications Staff Value Business Intelligence Legislation Shortcuts Scary Stories Public Speaking Organization Travel Social Networking Hacks Google Maps Smart Devices Ransmoware Lithium-ion battery Fun Techology Fileless Malware Digital Security Cameras Entrepreneur Content Remote Working Wearable Technology Memory Vendors Deep Learning Comparison Google Play Be Proactive Health IT Unified Threat Management Motherboard Data Breach Assessment Electronic Health Records Permissions Workforce Education Unified Threat Management Directions Videos Undo Wasting Time Threats Network Congestion Specifications Security Cameras Workplace Strategies Trend Micro Mobile Computing Internet Exlporer Software as a Service Fraud Meta Search User Error Microchip Username Managing Costs Amazon Best Practice Black Friday SSID Buisness Point of Sale eCommerce Database Surveillance Legal Virtual Assistant Outsource IT IT solutions Application Network Management Tech Support IT Technicians Virtual Machine Environment Business Growth Media Monitors Cyber Monday Medical IT IBM Proxy Server Reviews Cookies Tactics Development Hotspot Transportation Small Businesses Cortana Websites Mirgation Hypervisor Displays Alt Codes PowerPoint Downtime Shopping Nanotechnology Optimization Addiction Electronic Medical Records Language Employer/Employee Relationships Outsourcing Hosted Solution SharePoint Competition Management PCI DSS Chatbots Typing Navigation Writing Distributed Denial of Service Workplace Lenovo Gig Economy Screen Reader Service Level Agreement Internet Service Provider Google Drive Virtual Reality Computing Infrastructure Teamwork Hiring/Firing Knowledge

Blog Archive