Tip of the Week: This Is What Should You Do When Your Smartphone Gets Wet

Tip of the Week: This Is What Should You Do When Your Smartphone Gets Wet

Mistakes happen, especially with smartphones. Whether you’re dropping it on the floor, in the toilet, or in a puddle, there’s no shame in making this mistake. Granted, when this does occur, you need to act fast. Any water in, on, or around your device isn’t recommended, but let’s talk about what happens when you’re thrown into a worst-case scenario.

One thing to keep in mind is that many manufacturers are making devices that are, at the very least, water resistant. These devices are given an International Protection (IP) score, which is based on the International Electrotechnical Commission (IEC). This rating is given to any consumer device, and it designates how much protection a consumer can expect from it. For example, a device classified as IP67 is resistant to dust and can be submerged in water no more than one meter deep for up to half an hour. The only difference between this and an IP68 device is that the IP68 guarantees protection in 1.5 meters of water for up to half an hour.

Of course, you didn’t come here to learn about the semantics related to device protection classification--you want to know what to do if your device falls in water. Here are some decent catch-all steps you can take to potentially save your device.

  1. Turn Off Your Device: Be sure to turn off your device as soon as possible. Don’t try to plug it in or shake it. Don’t blow in it or use a blow dryer to try to save it. Just follow the steps below and don’t stray from them.
  2. Remove your SIM card and any other expandable storage.
  3. Remove the battery if possible: Some phones don’t have the removable battery, so if it doesn’t, don’t just pry it open. Have a professional do it for you. You can always check out YouTube for tutorials as well.
  4. Use an absorbent rag to dab your phone dry: Try not to wipe it around, as this could spread the liquid too much.
  5. Place the phone in a plastic bag filled with uncooked rice: The rice will absorb the liquid.
  6. Let your phone dry for a day or two before trying to turn it on.
  7. Turn it on: If this doesn’t work, try charging it. If the device doesn’t charge, the battery could be damaged. You will want to work with a professional to do this, if you haven’t already done so.
  8. If it seems to work right, make sure everything does: Make sure you test the screen for responsiveness, as well as the speakers and microphone.

By following these eight steps, you’ll maximize your chances of getting away from a phone-meets-liquid incident unscathed. If you found this blog helpful, be sure to share it with anyone else who might benefit from it.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, April 20 2019

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Cloud Email Privacy Business Computing Malware Hackers Business User Tips Productivity Microsoft Network Security Google Software Tech Term Computer Hosted Solutions Communication Internet IT Services Efficiency Mobile Devices Ransomware Data Small Business IT Support Smartphone Innovation Android Workplace Tips Backup Hardware Data Recovery Saving Money Cloud Computing Managed IT Services Business Continuity Internet of Things Managed IT Services Users Data Management Microsoft Office Windows 10 Windows Data Backup Browser Productivity Vulnerability Server Business Management Outsourced IT Word Windows 10 Office 365 App Cybersecurity Passwords Smartphones Remote Monitoring Chrome Facebook Phishing Upgrade Social Media communications Artificial Intelligence Gmail Disaster Recovery Mobile Device Network Encryption Money VoIP IT Support Information Infrastructure Save Money Managed Service Provider Applications Analytics Website Tip of the week Employer-Employee Relationship BYOD Managed Service Settings Access Control Robot IT Management Automation Google Drive Content Filtering Bandwidth YouTube Maintenance Virtual Reality Miscellaneous Router Apple Risk Management Government Office Tips Company Culture Antivirus Hacker Data storage Employee-Employer Relationship Big Data Paperless Office Display Networking Spam Computing Downtime Development Outlook WiFi Monitors Vendor Management Operating System Gadgets Unified Threat Management LiFi VPN Data loss Chromebook Telephone Systems Data Security Hosted Solution HIPAA Business Technology Administration Server Management desktop Touchscreen Mouse Mobile Security Virtual Private Network End of Support Quick Tips Firewall Tablet Business Intelligence Document Management Education SaaS Storage Wireless Printing Solid State Drive Two-factor Authentication Holiday Computers Virtualization Laptop Avoiding Downtime Scam Retail Alert Hard Disk Drive The Internet of Things Managing Stress LED Chatbots eWaste Time Management Cabling Printer Migration Star Wars WannaCry Break Fix Customer Service Google Maps Office Samsung Laptops Nanotechnology Search Black Friday Alt Codes PowerPoint Wearable Technology Cybercrime Network upgrade Mobility Marketing Motherboard Cables Servers Google Calendar Bring Your Own Device Tech Support Alerts USB Emergency Co-Managed IT Identity Continuity Network Management Budget Fraud Cost Management Dark Web Social Social Engineering Information Technology Software as a Service Screen Reader Charging Cyber Monday Typing Humor Onboarding Smart Office Current Events Print Toner Wires Legislation Best Practice Websites Slack Licensing Dongle Digital Payment Content Halloween Solar Disaster SharePoint Messaging Assessment Digital Microsoft Excel Work Collaboration Techology Apps Safety Entertainment Smart Tech Managed IT Smart Technology Cryptocurrency Digital Signage How To Lenovo IT solutions Going Green Remote Computing Shortcuts Voice over Internet Protocol Statistics Google Docs Monitoring Cooperation Service Level Agreement Streaming Compliance Scary Stories Uninterrupted Power Supply Downloads Employee-Employer Relationships Hotspot Internet Exlporer Mail Merge Spyware Blockchain Network Congestion Hacks IT Technicians Running Cable Optimization File Sharing VoIP Unified Threat Management Google Wallet iOS Connectivity Computer Care Shortcut IBM Distributed Denial of Service Bitcoin Troubleshooting Firefox Superfish Writing Security Cameras Modem Buisness FinTech Bluetooth Comparison Business Growth Wi-Fi Spying Staff Leominster Human Error Regulations Sports Legal Analysis Language Value Virtual Desktop Identity Theft Address Permissions Password Mirgation Recycling User Error Unified Communications Drones Scalability IoT Training Patch Management Corporate Profile Managed IT Service Dark Data Windows 8 Update Automobile Customer Relationship Management Managed Services Cookies MSP G Suite Specifications Augmented Reality K-12 Schools Mobile Device Management Device Social Networking Heating/Cooling Dell Multi-Factor Security Deep Learning Politics Computing Infrastructure Professional Services Motion Sickness How To Work/Life Balance Staffing Recovery Administrator Taxes Health Private Cloud Mobile Computing Black Market Web Server what was your? IT Budget Law Enforcement Windows 7 GPS Notifications IT Consultant Electronic Medical Records Twitter BDR Cameras Physical Security Meetings Upgrades Gadget Tracking Emoji Crowdsourcing Regulation Cleaning CCTV Personal Information Botnet Webcam 3D Printing Cortana Error Processors Machine Learning Point of Sale Ben McDonald shares Unsupported Software Students Travel Printers Computer Repair Relocation Mobile Data Supercomputer CrashOverride

What Our Clients Say

  • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
  • 1
  • 2
  • 3