Our Blog: Stuff we think you should know

Tip of the Week: This Is What Should You Do When Your Smartphone Gets Wet

Tip of the Week: This Is What Should You Do When Your Smartphone Gets Wet

Mistakes happen, especially with smartphones. Whether you’re dropping it on the floor, in the toilet, or in a puddle, there’s no shame in making this mistake. Granted, when this does occur, you need to act fast. Any water in, on, or around your device isn’t recommended, but let’s talk about what happens when you’re thrown into a worst-case scenario.

One thing to keep in mind is that many manufacturers are making devices that are, at the very least, water resistant. These devices are given an International Protection (IP) score, which is based on the International Electrotechnical Commission (IEC). This rating is given to any consumer device, and it designates how much protection a consumer can expect from it. For example, a device classified as IP67 is resistant to dust and can be submerged in water no more than one meter deep for up to half an hour. The only difference between this and an IP68 device is that the IP68 guarantees protection in 1.5 meters of water for up to half an hour.

Of course, you didn’t come here to learn about the semantics related to device protection classification--you want to know what to do if your device falls in water. Here are some decent catch-all steps you can take to potentially save your device.

  1. Turn Off Your Device: Be sure to turn off your device as soon as possible. Don’t try to plug it in or shake it. Don’t blow in it or use a blow dryer to try to save it. Just follow the steps below and don’t stray from them.
  2. Remove your SIM card and any other expandable storage.
  3. Remove the battery if possible: Some phones don’t have the removable battery, so if it doesn’t, don’t just pry it open. Have a professional do it for you. You can always check out YouTube for tutorials as well.
  4. Use an absorbent rag to dab your phone dry: Try not to wipe it around, as this could spread the liquid too much.
  5. Place the phone in a plastic bag filled with uncooked rice: The rice will absorb the liquid.
  6. Let your phone dry for a day or two before trying to turn it on.
  7. Turn it on: If this doesn’t work, try charging it. If the device doesn’t charge, the battery could be damaged. You will want to work with a professional to do this, if you haven’t already done so.
  8. If it seems to work right, make sure everything does: Make sure you test the screen for responsiveness, as well as the speakers and microphone.

By following these eight steps, you’ll maximize your chances of getting away from a phone-meets-liquid incident unscathed. If you found this blog helpful, be sure to share it with anyone else who might benefit from it.

Security Is a Big Component of Windows 10
Are the Messaging Apps You Use Secure?
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, June 17 2019

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Cloud Email Hackers Privacy Business User Tips Malware Microsoft Computer Business Computing Google Hosted Solutions Network Security Productivity Software Internet Tech Term Data Ransomware Small Business Mobile Devices Backup Efficiency Communication IT Services Workplace Tips Hardware Smartphone Windows 10 Cloud Computing Android Data Recovery Microsoft Office IT Support Saving Money Productivity Gmail Browser Data Management Business Continuity Facebook Managed IT Services Upgrade Social Media Data Backup Office 365 Server Internet of Things Information Users Phishing Managed IT Services Innovation Word Windows Mobile Device Passwords Smartphones Disaster Recovery Outsourced IT App Windows 10 Chrome Vulnerability Cybersecurity Miscellaneous communications Artificial Intelligence Business Management Managed Service Provider Remote Monitoring VoIP Encryption Employer-Employee Relationship Network Apple Virtual Reality Hacker Content Filtering Tip of the week Analytics IT Support Big Data Managed Service Gadgets Government Money Spam Website Infrastructure BYOD Applications Apps Save Money Office Tips Firewall Settings Two-factor Authentication Paperless Office Tablet Data storage Display Bandwidth WiFi YouTube Employee-Employer Relationship Avoiding Downtime Antivirus The Internet of Things VPN Education Unified Threat Management Robot Virtualization Risk Management Access Control Router Wireless Printing Automation Augmented Reality IT Management Customer Service Maintenance Computers Quick Tips Storage Downtime Scam Business Intelligence Retail Hosted Solution Solid State Drive Presentation SaaS Networking Company Culture Office Outlook Hard Disk Drive Monitors Wireless Technology Holiday Search Data Security HIPAA Recovery IBM Data loss Business Technology Mobile Device Management Development Virtual Private Network Administration Operating System Chromebook End of Support Customer Relationship Management Wi-Fi Computing Server Management Bring Your Own Device Laptop Password Mobile Security Document Management Touchscreen Google Drive Mouse Vendor Management Telephone Systems Safety LiFi Hacking Voice over Internet Protocol Entertainment Uninterrupted Power Supply Patch Management Windows 8 Microsoft Excel Star Wars Competition Training Fun Desktop User Error Multi-Factor Security Mirgation Dark Web Nanotechnology G Suite Spying Solid State Drives Google Wallet Staff Automobile Shortcuts Bluetooth Business Growth Social Networking Scary Stories Analysis Employee-Employer Relationships Corporate Profile Current Events Language USB Optimization Streaming Cyber Monday FinTech iOS Blockchain Cost Management Troubleshooting VoIP Legal Google Calendar Chatbots IP Address Cybercrime Alt Codes Dark Data Net Neutrality Screen Reader Undo National Security How To Drones Printer Wearable Technology Security Cameras Smart Technology Marketing Motherboard Remote Computing Sports Students WannaCry Going Green Social Engineering Computing Infrastructure Dongle Knowledge Recycling Human Error IT service Heating/Cooling Mobile Office MSP Scalability Social Permissions Assessment Time Management Legislation Identity Application Update Typing FCC Smart Tech PowerPoint Firefox Managing Stress Managed Services Cabling Distributed Denial of Service Mixed Reality Alerts Service Level Agreement Digital Payment Experience Unified Communications eWaste Device BDR Servers Deep Learning Humor Running Cable Migration Hacks Fraud Internet Exlporer Politics LED Network Management Comparison Managed IT Cryptocurrency Title II Connectivity Virtual Desktop Onboarding Techology Budget SharePoint Collaboration Cables Laptops Managed IT Service Modem Hard Drives Buisness Slack Data Breach Digital Lenovo How To Licensing Private Cloud Continuity Mobility Google Maps sip Lithium-ion battery Charging Mail Merge Value Tech Support IT solutions Smart Office Co-Managed IT Specifications Compliance Software as a Service Disaster Shortcut Bitcoin Network Congestion Online IoT Computer Care Digital Signage Unified Threat Management Downloads IT Technicians File Sharing Wires Break Fix Cookies Refrigeration Samsung 5G Monitoring Hard Disk Drives Spyware Superfish Information Technology Cooperation User Solar Print Toner Statistics Best Practice telephony Halloween Messaging Address Writing Hotspot Professional Services Public Speaking Websites Identity Theft Cortana Work Content Google Docs Black Friday Regulations Law Enforcement Physical Security Travel Notifications CrashOverride Upgrades Twitter Botnet Supercomputer Gadget Staffing Motion Sickness Crowdsourcing Taxes 3D Printing Personal Information Administrator Web Server Emergency Machine Learning IT Budget GPS Printers IT Consultant Updates Unsupported Software Computer Repair Processors Cameras Relocation Tracking Meetings Cleaning Mobile Data Health Alert CCTV Webcam Windows 7 Domains Emoji Work/Life Balance Electronic Medical Records Error Black Market Point of Sale Regulation Mobile Computing