facebook linkedin twitter

Computerware Blog

Tip of the Week: Laptop Cleaning Best Practices

Tip of the Week: Laptop Cleaning Best Practices

While we don’t mean to gross you out, your computer can be a pretty dirty place - and considering that we have our hands all over it (and who knows what else) all day, it seems a little obvious. What is also obvious is the idea that perhaps it should be cleaned once in a while. Here, we’re giving you a few tips to help you to do so safely.

Considering that laptops are much more portable (and thereby more vulnerable to uncleanliness) we’ll be focusing on the proper technique for cleaning your laptop, which is somewhat different than cleaning a desktop device.


...as today’s tips will focus on laptop cleanliness specifically, there are a few processes that could void the manufacturer’s warranty, like disassembling the laptop to clean the interior. Therefore, we recommend that you don’t do that. Besides, due to the form factor of a laptop, interior messes are not likely to be an issue. On top of being a very lengthy process, it is easy to damage the components of a laptop by taking it apart. So, again, do not take your laptop apart.

The primary reasons to clean a laptop are essentially all cosmetic, so if its function has you concerned, you’d be better off turning to Computerware and asking my team for assistance.

Step One: Kill the Power to the Device

Hopefully, you would think to do this anyway, but we thought it would be prudent to mention that your device should always be turned off and unplugged before you attempt to clean it. While minimal liquid should be used in the cleaning process, you still want to avoid the risk of electric shock. You wouldn’t want to find yourself in the hospital and/or with a fried device.

Step Two: Cleaning the Various Components

In order to safely clean your device’s exterior, you should be sure to abide by the following recommendations:

The Laptop’s Case

The body of your laptop itself is likely to smudge and gather some grime. Removing this dirt and debris is a simple, if delicate process. Using a mixture of five parts water and one part diluted soap, gently dampen a microfiber cloth. Fully wringing out the cloth, wipe off the exterior, and use compressed air to clear anything out of its ports. Don’t be shy with the compressed air, either.

The Laptop’s Keyboard

Getting water under your keys would be a very bad thing, so don’t use any water at all when cleaning them off. Carefully shake out any debris or use your compressed air to clean them out. To get rid of the oils that your fingers have deposited, use a dry cloth (maybe with a tiny bit of rubbing alcohol, as it dries quickly) and polish your keys. To clean the gaps between the keys, use a cotton swab.

The Laptop’s Display

In order to properly use a laptop, you need to see what you are doing, so you will want to avoid moisture. Therefore, only wipe the screen down with a dry microfiber cloth or special screen-cleaning wipe.

Does Any of This Matter?

Technically not, but there is always the chance that an investment into a device’s exterior will help to encourage safe practices for its interior. After all, it would be a shame if a nicely cleaned device was rendered inoperable by a bug picked up from an unsafe website.

When the time comes to actually replace a device so that its user can keep up with the demands of the business, reach out to us at (703) 821-8200. Our experts can advise you on the solutions you need. In the meantime, subscribe to our blog for more useful technology information!

Three Reasons to Seriously Consider Software-as-a-...
Is IT for Healthcare Plateauing?


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, August 04, 2020

Captcha Image

By accepting you will be accessing a service provided by a third-party external to https://www.cwit.com/

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Business Computing Privacy Internet Cloud Software Data Hackers Business Management Hardware Workplace Tips Microsoft Network Security Backup Productivity Business Hosted Solutions Managed Service Provider Productivity Email Malware IT Services Saving Money Efficiency Google Computer Small Business User Tips Innovation Collaboration VoIP IT Support IT Support Data Backup Smartphones Quick Tips Network Mobile Devices communications Business Continuity Disaster Recovery Microsoft Office Gadgets Data Recovery Social Media Android Cybersecurity Upgrade Mobile Office Communication Server Virtualization Phishing Smartphone Miscellaneous Mobile Device Management Holiday Vendor Management Ransomware Windows Managed IT Services Mobile Device Tech Term Users Outsourced IT Operating System Windows 10 Passwords Apps Facebook Internet of Things Remote Monitoring Unified Threat Management Automation BDR Managed IT services Data Management Analytics BYOD Remote Computing Mobile Computing Apple WiFi Windows 10 The Internet of Things Marketing Cloud Computing History Artificial Intelligence Training Business Technology Browser Save Money Firewall Encryption Help Desk Alert Big data App Spam Information Technology Office 365 Budget Two-factor Authentication Managed Service Office Health IT Consultant Bandwidth Going Green Hard Drives Access Control Maintenance Printer Bring Your Own Device VPN Windows 7 Antivirus Gmail Government Cybercrime Managed IT Content Filtering Best Practice Windows 8 Lithium-ion Battery Cost Management Outlook Hiring/Firing Healthcare Saving Time Computers Tech Support Virus Wireless Technology Search Recovery Employer-Employee Relationship Retail Information Hacking Money Document Management IBM Networking Humor Augmented Reality It Management Data Security Customer Service Travel Education Blockchain Remote Work Computing Data Loss Update Covid-19 Phone System iPhone Project Management Flexibility Hacker Mobility Voice over Internet Protocol Proactive IT Customer Relationship Management Computer Repair Running Cable Legal PowerPoint Applications Regulations Intranet Twitter Wi-Fi Wireless Patch Management Administration Conferencing SaaS Storage Website Vendor Risk Management Law Enforcement Current Events Avoiding Downtime Data Breach Save Time File Sharing Compliance Solid State Drive Data storage Password Hard Drive Value Downtime Vulnerabilities Black Market Google Maps Excel Comparison Tablet Fax Server Cryptocurrency Social Engineering Laptop Software as a Service Company Culture Business Growth Social Networking Meetings User Private Cloud Virtual Desktop Paperless Office Social Telephony Sports Cooperation Disaster DDoS Machine Learning Hosted Solution End of Support Scam Telephone Systems Robot Monitoring Securty Net Neutrality Word Business Intelligence Digital Digital Payment Management Cortana Websites Router Computer Accessories Start Menu Tech Terms Mobile Technology Politics Integration Lifestyle Virtual Reality Smart Devices Emails Google Docs Processors Trending Automobile Memory Video Conferencing Experience Mouse USB Uninterrupted Power Supply Chromebook Presentation Monitors Vulnerability Computing Infrastructure Hack Managed Services Provider Cleaning Programming Office Tips Statistics Bitcoin How To Gaming Console How To Specifications Safety Distribution Data Protection Network Congestion Download Managed Services Webcam Employee/Employer Relationship YouTube Text Messaging Downloads Documents Managed IT Service Unified Communications Settings Entertainment Cost Teamwork Heating/Cooling Streaming Media Microchip Taxes Distributed Denial of Service Redundancy Processor Inbound Marketing Public Cloud Licensing IT service Chrome Evernote Co-managed IT User Error Multi-factor Authentication Solutions eWaste Virtual Assistant Identity Theft Notifications Professional Services Pain Points Telephone Bluetooth GDPR Network Management Managing Risk Troubleshooting online Currency Data Warehousing Reliable Computing FinTech Printers Equifax SQL Server Fleet Tracking Entrepreneur Business Metrics Computer Malfunction Development HIPAA Access Data Storage Device security MSP Deep Learning Environment Emergency Hard Drive Disposal In Internet of Things Tech Hypervisor Work/Life Balance Procurement Desktop Finance Holidays Electronic Payment LinkedIn Microsoft Excel Upselling Fileless Malware Nanotechnology Hybrid Cloud Social Network Visible Light Communication Competition Computer Care Business Cards Modem Video Surveillance Service Level Agreement Strategy Business Owner Google Drive Windows Server 2008 Scalability Organization Proxy Server Startup Azure Asset Tracking IT consulting Best Practives Motion Sickness IP Address Spyware Archive Mobile Payment Messenger Tracking PCI DSS Electronic Medical Records Saving ZTime Transportation Username Skype Communitications Unified Threat Management Term Backup and Disaster Recovery Rental Service Supply Chain Management Recording Gamification Optimization CIO Human Resources Microserver Directions Screen Reader Display Customer Resource management Advertising Flash Application Electricity Printing Internet Service Provider Piracy SSID Debate Upload Staffing Google Wallet Cabling Harddrive Dark Web Smart Tech Free Resource Windows XP Point of Contact Web Server Society cache Television Books Workers Regulations Compliance Health IT HTML Displays Get More Done Administrator IT Assessment GPS Fiber-Optic Processing Database Printer Server Supercomputer Remote Working External Harddrive Mobile Security Logistics Virtual Machines Micrsooft Turn Key Wasting Time Telephone System Digital Signature WannaCry Software License Trends Cyber security Drones Recycling Time Management Freedom of Information Worker Bookmark Multi-Factor Security Corporate Profile Analytic Trojan Fraud Google Play Ebay Tactics Telephone Service Assessment SharePoint Organize Reading Samsung Financial Data Thin CLient Devices Employer/Employee Relationships Product Reviews Electronic Health Records 3D Google Calendar Read Employer Employee Relationship Smart Phones UTM Microsoft 365 Content PDF Tip of the week G Suite Memes Managing Costs Permissions Language Physical Security Managing IT Services IT Plan Medical IT Enterprise Resource Planning Trend Micro Touchscreen News Browsers Legislation Error Best Available Keyboard VoIP Hacks Adminstration email scam Security Cameras Pirating Information Addiction Threats Music Domains Device Management Consultation Relocation Tablets Telework User Tip Leadership Accountants Proactive Maintenance A.I. switches Writing Knowledge Banking Botnet Surveillance Public Speaking Content Management Technology Tips Webinar Remote Workers Upgrades Business Managemenet Sync IT Navigation Virtual Machine CCTV Virtual Private Network Migration Connected Devices eCommerce Fake News Data Analysis Wireless Headphones Employees LiFi Shortcut Audit Productuvuty 3D Printing Managing Stress Personal Information Regulation CrashOverride Financial Capital