Our Blog: Stuff we think you should know

Tip of the Week: This Is What Should You Do When Your Smartphone Gets Wet

Tip of the Week: This Is What Should You Do When Your Smartphone Gets Wet

Mistakes happen, especially with smartphones. Whether you’re dropping it on the floor, in the toilet, or in a puddle, there’s no shame in making this mistake. Granted, when this does occur, you need to act fast. Any water in, on, or around your device isn’t recommended, but let’s talk about what happens when you’re thrown into a worst-case scenario.

One thing to keep in mind is that many manufacturers are making devices that are, at the very least, water resistant. These devices are given an International Protection (IP) score, which is based on the International Electrotechnical Commission (IEC). This rating is given to any consumer device, and it designates how much protection a consumer can expect from it. For example, a device classified as IP67 is resistant to dust and can be submerged in water no more than one meter deep for up to half an hour. The only difference between this and an IP68 device is that the IP68 guarantees protection in 1.5 meters of water for up to half an hour.

Of course, you didn’t come here to learn about the semantics related to device protection classification--you want to know what to do if your device falls in water. Here are some decent catch-all steps you can take to potentially save your device.

  1. Turn Off Your Device: Be sure to turn off your device as soon as possible. Don’t try to plug it in or shake it. Don’t blow in it or use a blow dryer to try to save it. Just follow the steps below and don’t stray from them.
  2. Remove your SIM card and any other expandable storage.
  3. Remove the battery if possible: Some phones don’t have the removable battery, so if it doesn’t, don’t just pry it open. Have a professional do it for you. You can always check out YouTube for tutorials as well.
  4. Use an absorbent rag to dab your phone dry: Try not to wipe it around, as this could spread the liquid too much.
  5. Place the phone in a plastic bag filled with uncooked rice: The rice will absorb the liquid.
  6. Let your phone dry for a day or two before trying to turn it on.
  7. Turn it on: If this doesn’t work, try charging it. If the device doesn’t charge, the battery could be damaged. You will want to work with a professional to do this, if you haven’t already done so.
  8. If it seems to work right, make sure everything does: Make sure you test the screen for responsiveness, as well as the speakers and microphone.

By following these eight steps, you’ll maximize your chances of getting away from a phone-meets-liquid incident unscathed. If you found this blog helpful, be sure to share it with anyone else who might benefit from it.

Security Is a Big Component of Windows 10
Are the Messaging Apps You Use Secure?
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, April 25 2019

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Cloud Privacy Business Email Hackers Malware User Tips Computer Business Computing Microsoft Internet Network Security Google Hosted Solutions Productivity Tech Term Software Communication Mobile Devices Efficiency IT Services Backup Hardware Data Small Business Workplace Tips Windows 10 Smartphone Ransomware IT Support Android Saving Money Productivity Microsoft Office Cloud Computing Browser Data Management Business Continuity Managed IT Services Data Recovery Innovation Internet of Things Server Users Upgrade Managed IT Services Word Windows Gmail Data Backup Office 365 Facebook Phishing Outsourced IT Social Media App Windows 10 Passwords Disaster Recovery Smartphones Managed Service Provider VoIP Remote Monitoring Business Management Encryption Mobile Device Employer-Employee Relationship Network Chrome Artificial Intelligence Vulnerability Cybersecurity communications Spam Website Save Money Infrastructure Apple Office Tips Analytics Government IT Support Hacker BYOD Tip of the week Content Filtering Money Big Data Managed Service Miscellaneous Applications Information Wireless Paperless Office Customer Service IT Management Data storage Maintenance Display Firewall Settings Two-factor Authentication Tablet Access Control Router Employee-Employer Relationship WiFi Bandwidth Robot Printing Antivirus Avoiding Downtime YouTube Automation The Internet of Things Education Virtualization Virtual Reality Risk Management Password Development Google Drive Data loss Business Technology Mobile Device Management Mouse Vendor Management Virtual Private Network Administration Customer Relationship Management SaaS Server Management Wi-Fi LiFi Touchscreen Laptop Computers Apps Unified Threat Management Augmented Reality Storage Holiday Retail Telephone Systems Safety Hacking Business Intelligence Chromebook Quick Tips Downtime Outlook Scam Hosted Solution Monitors HIPAA Company Culture Document Management Presentation Solid State Drive Networking Operating System Office Wireless Technology Hard Disk Drive VPN Gadgets Search End of Support IBM Computing Mobile Security Recovery Data Security Experience Unified Communications BDR Servers Automobile Migration Online IoT G Suite LED Downloads IT Technicians Network Management Cables Laptops Break Fix Cookies Running Cable Onboarding Cooperation Bitcoin Network Congestion Black Friday Regulations Information Technology Managed IT Slack Hotspot Professional Services Best Practice Virtual Desktop telephony Techology Continuity Mobility Writing Google Maps Charging Microsoft Excel Star Wars Buisness Google Docs Digital Lenovo Smart Office Co-Managed IT Multi-Factor Security Mirgation Hard Drives Wires Software as a Service Dark Web Nanotechnology Lithium-ion battery Mail Merge Remote Computing Digital Signage Staff Windows 8 IT solutions Print Toner Cyber Monday Social Networking Google Wallet Disaster Shortcut Update Monitoring Language USB Business Growth Unified Threat Management Solar Refrigeration Current Events Statistics Messaging Blockchain Cost Management User 5G Spyware Superfish Work Content Google Calendar Chatbots Voice over Internet Protocol Digital Payment Entertainment Net Neutrality Screen Reader Public Speaking Halloween Legal Address Desktop Printer Wearable Technology Cortana Shortcuts Smart Technology Motherboard Competition Drones Uninterrupted Power Supply Patch Management Spying Computing Infrastructure Dongle Fun Alt Codes Dark Data User Error Politics Identity Going Green Social Engineering Bluetooth Collaboration Analysis Employee-Employer Relationships Permissions Assessment Optimization Streaming Legislation FinTech iOS FCC Smart Tech Scary Stories Corporate Profile Troubleshooting Social Tech Support Security Cameras Distributed Denial of Service IP Address Cybercrime Alerts Service Level Agreement Typing VoIP Comparison Undo File Sharing Students Fraud Internet Exlporer Deep Learning Humor How To Recycling Computer Care Human Error Knowledge Hacks IT service Heating/Cooling MSP Scalability Title II Connectivity Sports WannaCry Samsung SharePoint Marketing Websites Managing Stress Identity Theft Managed Services Managed IT Service Modem Mobile Office Budget PowerPoint Licensing Application Cryptocurrency Time Management Specifications Compliance How To Cabling Value Bring Your Own Device sip Firefox eWaste Training Device Notifications Botnet Supercomputer Twitter Motion Sickness Gadget Staffing Mobile Computing Personal Information Administrator Windows 7 Crowdsourcing Taxes Machine Learning IT Budget Domains Physical Security Web Server Upgrades GPS Computer Repair Regulation IT Consultant Relocation Processors Cameras Tracking 3D Printing Meetings Health CrashOverride Cleaning Private Cloud Alert CCTV Unsupported Software Emoji Webcam Electronic Medical Records Work/Life Balance Error Emergency Printers Mobile Data Black Market Point of Sale Travel Law Enforcement