BNMC Blog

Tip of the Week: This Is What Should You Do When Your Smartphone Gets Wet

Tip of the Week: This Is What Should You Do When Your Smartphone Gets Wet

Mistakes happen, especially with smartphones. Whether you’re dropping it on the floor, in the toilet, or in a puddle, there’s no shame in making this mistake. Granted, when this does occur, you need to act fast. Any water in, on, or around your device isn’t recommended, but let’s talk about what happens when you’re thrown into a worst-case scenario.

One thing to keep in mind is that many manufacturers are making devices that are, at the very least, water resistant. These devices are given an International Protection (IP) score, which is based on the International Electrotechnical Commission (IEC). This rating is given to any consumer device, and it designates how much protection a consumer can expect from it. For example, a device classified as IP67 is resistant to dust and can be submerged in water no more than one meter deep for up to half an hour. The only difference between this and an IP68 device is that the IP68 guarantees protection in 1.5 meters of water for up to half an hour.

Of course, you didn’t come here to learn about the semantics related to device protection classification--you want to know what to do if your device falls in water. Here are some decent catch-all steps you can take to potentially save your device.

  1. Turn Off Your Device: Be sure to turn off your device as soon as possible. Don’t try to plug it in or shake it. Don’t blow in it or use a blow dryer to try to save it. Just follow the steps below and don’t stray from them.
  2. Remove your SIM card and any other expandable storage.
  3. Remove the battery if possible: Some phones don’t have the removable battery, so if it doesn’t, don’t just pry it open. Have a professional do it for you. You can always check out YouTube for tutorials as well.
  4. Use an absorbent rag to dab your phone dry: Try not to wipe it around, as this could spread the liquid too much.
  5. Place the phone in a plastic bag filled with uncooked rice: The rice will absorb the liquid.
  6. Let your phone dry for a day or two before trying to turn it on.
  7. Turn it on: If this doesn’t work, try charging it. If the device doesn’t charge, the battery could be damaged. You will want to work with a professional to do this, if you haven’t already done so.
  8. If it seems to work right, make sure everything does: Make sure you test the screen for responsiveness, as well as the speakers and microphone.

By following these eight steps, you’ll maximize your chances of getting away from a phone-meets-liquid incident unscathed. If you found this blog helpful, be sure to share it with anyone else who might benefit from it.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, June 20 2019

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Cloud Email Privacy User Tips Business Computing Hackers Productivity Google Malware Network Security Business Microsoft Computer Hosted Solutions Software Tech Term Ransomware Internet Data Communication IT Services Efficiency Mobile Devices Small Business Data Recovery Workplace Tips Backup Cloud Computing Hardware Smartphone IT Support Innovation Android Saving Money Managed IT Services Microsoft Office Business Continuity Internet of Things Managed IT Services Information Users Data Management Social Media Mobile Device Windows 10 Data Backup Windows Browser Business Management Facebook Server Phishing Word Outsourced IT Windows 10 App Upgrade Cybersecurity Gmail Vulnerability Passwords Productivity Office 365 Chrome communications Disaster Recovery Encryption Artificial Intelligence Remote Monitoring Smartphones Network IT Support Money Managed Service Provider Gadgets BYOD Applications Miscellaneous Tip of the week Website Employer-Employee Relationship Save Money Analytics Virtual Reality VoIP Managed Service Infrastructure Government Settings IT Management Maintenance Google Drive Display YouTube Bandwidth Content Filtering Router Risk Management Apps Education Office Tips Apple Robot Antivirus Paperless Office Automation Company Culture Big Data Hacker Data storage Employee-Employer Relationship Access Control VPN Unified Threat Management Development Telephone Systems SaaS Data Security Outlook desktop Server Management Spam Computing Business Technology Computers Virtualization Touchscreen WiFi Holiday Virtual Private Network Bring Your Own Device Operating System LiFi Firewall HIPAA Quick Tips Retail Alert Tablet Hosted Solution Administration Document Management Mobile Security Mouse Solid State Drive Wireless Monitors Business Intelligence Two-factor Authentication Vendor Management Chromebook Avoiding Downtime Storage Hard Disk Drive Scam Printing Laptop The Internet of Things End of Support Augmented Reality Networking Managing Stress Downtime Data loss Marketing Migration Nanotechnology Cyber Monday LED Wearable Technology Network upgrade Laptops Alt Codes Writing Motherboard Cables Legislation PowerPoint Digital Payment Alerts Wi-Fi USB Disaster Identity Continuity SharePoint Data Breach Digital Fraud Cost Management Microsoft Excel Mobility Social Screen Reader Managed IT Charging Smart Technology Co-Managed IT Budget Collaboration Dark Data Update Smart Office Techology Software as a Service Typing Humor Statistics Wires Onboarding Information Technology Licensing How To Dongle Lenovo Halloween Uninterrupted Power Supply Solar Downloads Slack Hard Disk Drives Current Events Spyware Assessment Politics Mail Merge Blockchain Print Toner Best Practice Messaging Computer Care IBM Smart Tech Shortcut Distributed Denial of Service Content File Sharing Customer Service VoIP Work Unified Threat Management Scary Stories Entertainment Cryptocurrency Office Samsung Bluetooth Voice over Internet Protocol Comparison Digital Signage Cooperation Firefox Service Level Agreement Private Cloud Superfish Google Docs Compliance Monitoring Solid State Drives IT solutions Going Green Identity Theft Hotspot Internet Exlporer Tech Support Address Permissions Running Cable Shortcuts User Error Buisness Employee-Employer Relationships Hacks Training Corporate Profile Connectivity Patch Management Managed IT Service Streaming IT Technicians Optimization Sports iOS Bitcoin G Suite Social Engineering Modem FinTech Specifications Virtual Desktop Troubleshooting Google Wallet Automobile Staff Customer Relationship Management Leominster Business Growth Dell Regulations Heating/Cooling Multi-Factor Security Spying National Security Language Value Websites Security Cameras Time Management Recycling Printer Analysis Students Password WannaCry IoT Break Fix Human Error Legal Cabling Mirgation Scalability Windows 8 Safety Cookies Search MSP Black Friday Unified Communications Drones Google Maps K-12 Schools Managed Services Social Networking Remote Computing Servers Google Calendar Computing Infrastructure Professional Services Emergency Network Congestion Chatbots Network Management eWaste Mixed Reality Mobile Device Management Star Wars Dark Web Cybercrime Device Deep Learning IT Consultant Cameras Processors Machine Learning Mobile Computing Tracking Unsupported Software Meetings Windows 7 Cleaning CCTV BDR Computer Repair Relocation Webcam Mobile Data How To Work/Life Balance Regulation Recovery Error Health Point of Sale Ben McDonald shares Black Market Law Enforcement Travel Notifications Electronic Medical Records Twitter Supercomputer CrashOverride Physical Security Emoji Staffing Upgrades Gadget Motion Sickness Taxes Crowdsourcing Printers Administrator Web Server what was your? Updates IT Budget Personal Information Botnet Cortana GPS 3D Printing

What Our Clients Say

  • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
  • 1
  • 2
  • 3