Contact us today!
217-428-6449

Network Solutions Unlimited Blog

Tip of the Week: What To Do With a Wet Smartphone

Tip of the Week: What To Do With a Wet Smartphone

Even though no one will admit to it themselves, everyone knows that person that, for some reason or another, has dropped his/her smartphone in the toilet, or into the sink, or into a puddle. Needless to say that dropping electronics into any bit of water isn’t typically recommended, but today we will talk about what to do if this happens to you.

Before we begin we should mention that many smartphone manufacturers are now creating devices that are at least water resistant. These devices are given an IP score. IP stands for International Protection as drawn up by the International Electrotechnical Commission (IEC), which is a classification given to a device that rates the type of protection a consumer should expect. If your device is classified as IP67, it is resistant to dust and can be submerged in water no more than one meter deep for up to a half an hour. The only difference between IP67 and IP68, is that devices that are classified as IP68, guarantees protection in water up to one and a half meters deep for a half hour.

Regardless of how your smartphone is classified, it is probably not a great idea to expose it to water for very long. If it does happen, following these steps will give you the best chance of saving the device.

1. Turn off your device.
If it is off, do not turn it on.

In fact, there are a bunch of things you will not want to do. Don’t plug it in. Don’t shake it. Don’t blow in it. Don’t try and use a blow dryer to save it. In fact, if this happens to you, don’t do anything to the device except the outlined suggestions in this list.

2. Remove your SIM and any expandable storage you have inside your device.

3. If your phone has a battery that can be removed, remove the battery
If you don’t have a phone where you can easily access the battery, don’t just pry it open. Either take it to a professional to do so, or check out the many YouTube tutorials available to properly take your phone apart and remove the battery.

4. Use an absorbent rag to dab your phone dry.
Do not wipe it around as it could spread the liquid to more, harder to reach parts of your phone.

5. Bury the phone in a ziplock bag filled with uncooked rice.
The rice will absorb the liquid.

6. Let your phone dry for a day or two before trying to turn it on.

7. After that time, try turning it on.
If it doesn’t turn on, try charging it. If it doesn’t charge, your battery was probably damaged. At this point you’ll want to take it to a professional if you haven’t done so already.

8. If it seems to work properly, makes sure it does.
If all seems well, you’ll want to test the display for responsiveness, test your speakers and your microphone to makes sure they work properly.

If you follow these eight tips, you may just have a chance to save your (likely expensive) smartphone from the eWaste pile at your local landfill. If you like this tip, return to our blog weekly for more tips and tricks to help you get the most out of your technology.

Understanding Biometrics
How to Make Sure Your Messages are Secure
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, March 20 2019

Captcha Image

Mobile? Grab this Article!

QR-Code

Tag Cloud

Sync Colocation Utility Computing Root Cause Analysis Smartphone Co-Managed Services The Internet of Things VPN Testing Social Engineering Content Worker Commute Downtime Windows 10s HBO Experience Books How To Saving Time WPA3 Tech Term Data Security Chrome Education How to Lifestyle Paperless Office Windows 10 Monitoring Virtual Assistant Outsourced IT Webinar Cloud Computing Google Maps Content Filter Data Storage Display Health Remote Monitoring Training Alert Cortana Data Backup Break/Fix Patch Management Search Backup Avoiding Downtime IoT Managed Service Legislation Cloud Scalability Content Filtering Physical Security Language Cache Users App History Microsoft Word Value CrashOverride Human Resources Internet Exlporer Recovery OneNote Data Protection Hardware Employee-Employer Relationship Word Worker Hybrid Cloud Google Docs Settings Server IT budget E-Commerce Wireless Amazon Rootkit Adobe Microsoft Router Keyboard Efficiency Commerce IT Services Regulation Employer-Employee Relationship Communication Laptop Devices Android Credit Cards Samsung Proactive Analysis Phone System Peripheral Specifications Business Connectivity Mobile Security Audit Work/Life Balance Managed IT Services Software Machine Learning Unsupported Software Payment Cards Travel Artificial Intelligence Data Loss Business Computing Sales Private Cloud Excel Screen Mirroring Storage Internet of Things Hard Drives Upgrades Data Management Employee Gmail Automobile Network Security Printers End of Support PowerPoint Professional Services Device Security Admin hacker Identity Theft Gamification Files Computing Infrastructure FAQ Virtualization Windows Ink HaaS Security Cameras Internet exploMicrosoft Risk Management Entertainment Chromebook Proactive IT Malware Quick Tips Computer Cleaning Computer Accessories Office Tips Gadgets Identity Internet Workers Virtual Private Network Mobility Information Technology Productivity Hacking Safety Transportation Data Google Assistant PDF Identities USB Computer Care Mobile Device Save Time Alexa for Business Firewall Touchscreen Projects Redundancy Company Culture Medical IT HIPAA Software as a Service Workplace Tips Holiday Managed IT Service Spam Windows 7 Monitor Upgrade Personal Information Networking Shadow IT Consultant Browser Mobile Device Management intranet iOS Financial Technology Project Management Twitter Analytics Managing Stress Congratulations Hosted Solution Memory IT Solutions Apple Chromecast Remote Computing Microsoft Office Black Market Two Factor Authentication Spyware Touchpad User Tips Gifts Cybersecurity Wi-Fi Data Recovery Virtual Reality Google Save Money Augmented Reality Backup and Disaster Recovery Social Media Assessment Remote Workers eWaste Unified Threat Management Troubleshooting Public Computer Ciminal Comparison Maintenance Administration Robot Disaster Recovery Reputation Bandwidth Passwords Video Games Innovation Edge Mobile Best Practices Wireless Technology Business Continuity Application Going Green Password WIndows Server 2008 Electronic Medical Records Ransomware Communications Advertising Humor Conferencing Data Privacy Flexibility WannaCry Loyalty Government Data Breach Retail Hyperlink VoIP Office 365 Computer Fan Security Hard Drive File Sharing Shortcut Telephone Bring Your Own Device Emergency Tech Support Smart Tech Telephone Systems Television Evernote Hiring/Firing Tablets Unified Communications File Storage Wireless Internet Miscellaneous Mobile Devices IT Support NFL Hosted Solutions Computer Forensics Data Theft Updates BYOD Meetings Benefits User Error Best Practice Computing Wasting Time Students Managed Service Provider Outlook Smart Technology Smartphones Audiobook WiFi Apps Tip of the Week Vendor Data storage Information Blockchain Nanotechnology Customer Privacy Antivirus Financial Productivity Management SaaS SMB Automation Update Technology Microsoft Excel Google Drive Vulnerability Cybercrime Operating System Monitors Small Business Fraud Payroll Cast Applications Encryption Document Management Emails Hard Disk Drive Keyboard Shortcuts Computers Printing Business Technology App store BDR Wireless Charging Business Intelligence Compliance Relocation Facebook Law Enforcement Employer Employee Relationship Business Owner Cost Management Charger Budget Phishing Sports Managed IT Spam Blocking Virus Public Cloud Websites Instant Messaging Windows 10 Scam Battery IT Support Saving Money Bluetooth Politics Network Streaming Media Camera Vendor Management Email IT Management Legal Business Management IT Service Office Dark Web Collaboration Hackers Marketing Wasting Money iPhone Managed IT Services Access Control Two-factor Authentication Accessory IT solutions Windows MSP Licensing Techology Money Thank You Solid State Drive Big Data