BNMC Blog

Tip of the Week: The Very Basics of Computer Cleaning

Tip of the Week: The Very Basics of Computer Cleaning

For your employees to succeed, their tools need to be in proper working order. While often overlooked, this means that their workstations need to be kept clean. Here, we’re reviewing the basics of cleaning your workstation to keep it running well.

Does a Clean Workstation Make that Much of a Difference?

Yes! A computer collects a surprising amount of junk and grime, not to mention germs. Maintaining it can help ensure it doesn’t overheat. Plus, it just looks better, anyway.

Therefore, you need to make a regular habit out of tidying up your workstation. Let’s touch on a few best practices for cleaning the major components.

How Often Do I Have to Clean My Computer?

That all depends on a few variables, but you should make sure that you’re cleaning your computer at least once a year. Other factors will render it necessary to tidy up more often.

Take, for instance, the computer’s location. Its environment may introduce specific kinds of debris that make more regular cleanings a prudent course of action.

So, if your computer spends its time…

  • In an industrial environment
  • In the presence of pets
  • Around carpeting

…it is probably best to clean it more frequently.

Who it is that typically uses the computer is also an important factor. Younger people  (especially children) are a leading cause of sticky fingers on a keyboard and a smudged monitor.

Either way, if your computer hasn’t been cleaned within the past 12 months, now is probably the time to do it.

How to Properly Clean Your Workstation’s Components

The different parts of your workstation need to be cleaned differently. Otherwise, they could become damaged in your attempt to keep them shipshape. Keep in mind, we’re focusing on desktop workstations here, as the process of cleaning a laptop is somewhat different.

For starters, here are a few general best practices:

  • Do not spray any liquid directly into the computer. Spray a cloth and wipe instead.
  • Do not use a vacuum, as it can create a damaging static charge. Use compressed air to blow away any debris.
  • Don’t allow fans to spin freely as you are cleaning them, as it could actually damage them.
  • Always turn off the computer before you attempt to clean it.

The Case

Cleaning the exterior of your workstation can help to improve its ventilation, as well as make it look more presentable. You can remove any dust built up with a few swipes of a lint-free cloth.

The Interior

Also helping to keep the device’s temperature in check, it pays off to clean the inside of any dust and debris. Use compressed air to do this so that you don’t risk damaging the internal components.

The Peripherals

Finally, it makes sense that things like the keyboard and mouse would get a little grimy over time. A bit of diluted rubbing alcohol or disinfectant and compressed air can remove this grime and any germs it may have housed. As for your monitor, dusting it off with a lint-free cloth will naturally improve the visibility of your display.

For more assistance in cleaning your computing infrastructure, or any other technology maintenance, give BNMC a call at 978-482-2020. Our expert technicians are ready to help.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, December 02 2020

Captcha Image

By accepting you will be accessing a service provided by a third-party external to https://www.bnmc.net/

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Productivity Business Computing User Tips Privacy Email Cloud Microsoft Network Security Software Hackers Efficiency Business Hosted Solutions Data Workplace Tips Computer Malware Hardware Communication IT Support Google IT Services Small Business Smartphone Mobile Devices Internet Android Cloud Computing Mobile Device Tech Term Managed IT Services Data Recovery Backup Smartphones Phishing Users Ransomware Innovation Windows VoIP Outsourced IT Saving Money Upgrade Information Windows 10 Disaster Recovery Miscellaneous Data Backup Facebook communications Network Cybersecurity Social Media Business Management Office 365 Server Microsoft Office Browser Business Continuity Passwords Productivity Managed IT Services Quick Tips Windows 10 Data Management Internet of Things Managed Service Save Money Apps Collaboration Vulnerability Remote Monitoring Gadgets Analytics Word COVID-19 Gmail App Mobile Office Encryption Infrastructure Chrome Government Managed Service Provider Conferencing Artificial Intelligence Remote Work Money Spam Applications Router WiFi Information Technology Tip of the week Google Drive Virtual Reality Company Culture Settings Networking Access Control VPN BYOD Employer-Employee Relationship Display Remote Workers Website IT Support Paperless Office Office Tips Robot Operating System Automation Unified Threat Management Avoiding Downtime End of Support Big Data Content Filtering Antivirus Bandwidth Maintenance Firewall Apple Education Document Management Storage Computers Development IT Management Data Security Employee-Employer Relationship YouTube Business Technology HIPAA Hacker Data storage Virtual Private Network BDR Risk Management Computing Monitors Windows 7 Outlook Vendor Management Chromebook Bring Your Own Device Software as a Service Laptop LiFi Compliance Business Intelligence Social The Internet of Things Hosted Solution Data loss Two-factor Authentication Humor Best Practice Telephone Systems Managed IT Service Administration Scam Mouse Regulations desktop Customer Relationship Management Remote Computing Downtime Going Green Augmented Reality Marketing iOS MSP Break Fix SaaS IT Managing Stress Search Wi-Fi Social Network Printing Virtualization Holiday Managed Services Wireless Password Solid State Drive Server Management Retail Alert Training Touchscreen Hard Disk Drive Managed IT OneNote Tablet Data Breach Mobile Security How To Tech Support Co-Managed IT WannaCry Work Downloads Buisness Alt Codes Cabling Smart Tech Mail Merge Blockchain Cooperation Service Level Agreement Remote VoIP Unified Threat Management Sports Managed Services Provider Google Maps Inventory Voice over Internet Protocol Shortcut Distributed Denial of Service Virtual Desktop Onboarding GDPR Print Toner Budget Myths Asset Management Bluetooth Comparison Social Engineering Slack Hard Disk Drives Hotspot Internet Exlporer Battery Firefox Superfish Websites Content Huawei IT Technicians Optimization Twitter Typing Messaging Connectivity Peripheral Address Permissions Data Warehouse Staff Leominster User Error Entertainment Vendor Modem Shadow IT FinTech Patch Management Digital Signage Current Events Shortcuts Mobile Management Digital Payment Memes Specifications Safety Monitoring Solid State Drives Language Value Files Cybercrime Streaming Processor Digital Mirgation Recycling Heating/Cooling Multi-Factor Security Cryptocurrency Employee-Employer Relationships Meetings Disaster IoT Management IT solutions Troubleshooting Business Analysis K-12 Schools Time Management Printer Network Congestion Google Docs Hybrid Cloud Cookies Gamification Professional Services RMM Security Cameras Profiles Social Networking Black Friday Spying Hacks National Security Computing Infrastructure Human Error Google Wallet Memory Spyware Chatbots eWaste Servers Google Calendar Writing Analysis Bitcoin Students Uninterrupted Power Supply Star Wars Policy Emergency Virus Computer Care IBM Wearable Technology Network upgrade Network Management Business Growth Scalability File Sharing Nanotechnology Dark Web Alerts USB Banking Dark Data Update Halloween Legal Utility Computing Motherboard Holidays Cables Cyber Monday Updates Unified Communications Device Drones Reducing Cost Identity Theft Identity Distribution Continuity Legislation Windows 8 Mixed Reality Fraud Cost Management Procedure LED Threats Corporate Profile Smart Office SharePoint Migration Consulting Screen Reader Charging Microsoft Excel Politics G Suite Licensing Dongle Reviews Techology Customer Service Scary Stories Deep Learning Laptops Automobile Payment Card Wires Smart Technology Work/Life Balance PowerPoint Mobile Device Management Health Private Cloud Running Cable Mobility Batteries Logistics Solar Statistics Office Samsung Dell Assessment PCI DSS Lenovo Financial Staffing Black Market Motion Sickness Regulation Taxes Administrator Law Enforcement Mobile Computing Electronic Medical Records IT Budget Notifications Web Server what was your? Physical Security GPS IT Consultant user treats Emoji Upgrades Gadget Crowdsourcing Cameras Personal Information Botnet Tracking Cleaning Cortana 3D Printing CCTV Machine Learning Processors Webcam Printers Unsupported Software Error Computer Repair Relocation Point of Sale Ben McDonald shares Travel Mobile Data Recovery How To Supercomputer CrashOverride

What Our Clients Say

  • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
  • 1
  • 2
  • 3