Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Use Your Smartphone With the Lights Off and Risk Temporary Blindness

Use Your Smartphone With the Lights Off and Risk Temporary Blindness

You may have heard of digital eye strain. The Vision Council defines it as “the physical discomfort felt after two or more hours in front of a digital screen and is associated with the close to mid-range distance of digital screens.” As annoying as this condition is, in some cases, it has actually developed into something far worse, like temporary blindness.

Before we delve into the details of how this is possible, let’s first take a look at a TechInsider report highlighting just how much time people spend in front of screens.

  • 10 percent of users spend three-quarters of their waking hours looking at screens.
  • 40 percent of users spending more than five hours a day looking at screens.
  • 95 percent of users spend more than two hours a day looking at screens.

What makes digital eye strain difficult for the modern office worker is the fact that avoiding the screen can be virtually impossible. Plus, it doesn’t help that so much of our entertainment involves a television or computing device.

In regards to the risk of temporary blindness, two recent cases link the condition to looking at a smartphone screen, in a dark room, and with one eye covered. This happened to two women, aged 22 and 40, while they were using their smartphones in a dark room. In each case, the two women were lying on their side with a pillow covering the eye not looking at the screen. When their temporary blindness condition was brought to the attention of an optometrist, it was determined that misuse of the mobile devices was to blame.

In these two situations, temporary blindness occurred because the women had one eye covered while using their device. This causes one eye to try and adapt to the darkness by catching up to the other that isn’t being used, which couldn’t happen because a pillow was in the way. Subsequently, when the screen turns off, the open eye tries to adapt again, but experiences darkness until the other eye catches up.

Fortunately, these two cases have been diagnosed as circumstantial, and therefore, shouldn’t be a cause for concern from the smartphone-using public. However, the fact that these temporary blindness incidents resulted from looking at a screen incorrectly should be reason enough to warn about the dangers of digital eye strain--especially since so many office workers are required to spend so much of their time staring at a screen.

Here are four best practices for looking at screens that can potentially save your eyesight.

Remember to Blink
Not blinking often enough can dry out your eyes and cause pain. Blinking more often than you already are can go a long way in preventing eye strain.

Increase the Size of the Text
The smaller the text means the more you’ll have to squint in order to read it. In most apps, increasing the text size is as easy as using Ctrl + (+). Larger text may help alleviate headaches caused by eye strain.

The 20-20-20 Rule
Every 20 minutes, take 20 seconds to look away from the screen and instead look at an object that’s 20 feet away. Doing so will prevent your eye muscles from focusing on a screen too much throughout the workday and going sedentary.

Reduce Blue-Light Exposure
Continuous absorption of blue light emitted from screens can cause damage to your eyes and produce cataracts, among many other problems. Minimizing screen time and using a pair of “computer glasses” to block some of the blue light are two ways to reduce this light.

Do you suffer from digital eye strain? What are some ways that you’ve found helpful to alleviate this strain? Share them with us in the comments.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 30 January 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support Privacy IT Services Google Email Workplace Tips Computer Phishing Collaboration Hosted Solutions Workplace Strategy Users Ransomware Mobile Device Microsoft Backup Small Business Productivity Quick Tips Managed Service Passwords Saving Money Cybersecurity Communication Smartphone Data Backup Android AI Data Recovery Upgrade Disaster Recovery VoIP Business Management Smartphones Mobile Devices communications Windows Social Media Browser Microsoft Office Managed IT Services Network Current Events Tech Term Internet of Things Remote Artificial Intelligence Holiday Facebook Information Miscellaneous Automation Cloud Computing Training Covid-19 Gadgets Server Managed Service Provider Compliance Remote Work Outsourced IT IT Support Encryption Employee/Employer Relationship Spam Office Windows 10 Government Business Continuity Data Management Bandwidth Windows 10 Blockchain Virtualization Business Technology Wi-Fi Two-factor Authentication Data Security Mobile Office Vendor Apps Networking Managed Services Voice over Internet Protocol Chrome Mobile Device Management Budget BYOD Gmail Apple WiFi App Tip of the week Employer-Employee Relationship Information Technology Hacker Conferencing Avoiding Downtime How To Office 365 BDR Marketing HIPAA Access Control Applications Computing 2FA Help Desk Risk Management Computers Managed IT Services Website Analytics Office Tips Healthcare Augmented Reality Storage Password Bring Your Own Device Virtual Private Network Big Data Health Router Operating System Retail Monitoring Customer Service Scam Excel Data loss Remote Workers Telephone Patch Management Save Money Remote Monitoring End of Support Vulnerability Cooperation Free Resource Firewall Vendor Management Project Management Windows 7 Physical Security Display Microsoft 365 The Internet of Things Printer Solutions Paperless Office Infrastructure Going Green Social Document Management Cybercrime Windows 11 Data Storage Cryptocurrency Maintenance Hacking Smart Technology Supply Chain Antivirus Video Conferencing Presentation Managed Services Provider Saving Time Virtual Machines Virtual Desktop Professional Services LiFi Data storage Wireless Technology Managed IT Service Outlook Downloads Robot Money iPhone Licensing Word Humor Entertainment Vulnerabilities Data Privacy Sports IT Management VPN Meetings Images 101 Mouse Telephone System Safety Multi-Factor Authentication Mobility Cost Management Administration Computer Repair Employees Integration Settings Machine Learning User Tip Printing Modem Wireless Mobile Security Content Filtering Processor Customer Relationship Management Holidays YouTube Mirgation Hypervisor Displays Twitter Error Shopping Nanotechnology Optimization PowerPoint 5G Language Employer/Employee Relationships Outsourcing Experience Social Engineering Google Docs Addiction Unified Communications Management PCI DSS Bitcoin Chatbots User Running Cable Navigation Remote Computing Gig Economy Google Wallet Screen Reader Distributed Denial of Service Workplace Computing Infrastructure Teamwork Hiring/Firing Tablet Service Level Agreement Internet Service Provider Regulations Compliance IP Address Windows 8 Identity Laptop Evernote Paperless Alert File Sharing Bookmark Dark Data Drones Smart Tech Memes Co-managed IT Managed IT Alerts SQL Server Technology Care How To Download Net Neutrality Financial Data History Recovery Halloween Business Communications Notifications Travel Browsers Smartwatch Connectivity IT Hard Drives Break Fix Scams Domains Azure Hybrid Work Techology Google Maps Upload Procurement Social Network Telework Hacks Cyber security Scary Stories Multi-Factor Security Tech Human Resources Fun Unified Threat Management CES IoT Communitications Refrigeration Dark Web Cables Public Speaking Deep Learning Unified Threat Management Trends Supply Chain Management Customer Resource management FinTech Lithium-ion battery Regulations Google Calendar Term Google Apps Entrepreneur Data Analysis Network Congestion Star Wars IT Assessment Education Microsoft Excel IT Maintenance Staff Value Business Intelligence User Error Gamification Flexibility Organization Mobile Computing Social Networking Legislation Shortcuts Search Point of Sale Fileless Malware Digital Security Cameras Smart Devices Undo Ransmoware Content Remote Working Best Practice Wearable Technology Memory Vendors Tech Support Health IT Motherboard Data Breach Buisness Comparison Google Play Be Proactive Network Management Permissions Workforce Directions Videos Monitors Legal Assessment Electronic Health Records IT solutions Business Growth Wasting Time Threats Websites Trend Micro Application Specifications Security Cameras Workplace Strategies Fraud Meta Cortana Microchip Internet Exlporer Software as a Service Username IBM Alt Codes Managing Costs Amazon SharePoint Electronic Medical Records eCommerce Downtime Black Friday SSID Virtual Assistant Outsource IT Lenovo Writing Database Surveillance Hosted Solution Typing IT Technicians Virtual Machine Environment Media Virtual Reality Private Cloud Proxy Server Reviews Cookies Cyber Monday Medical IT Server Management Hotspot Transportation Small Businesses Superfish Knowledge Identity Theft Google Drive Tactics Development Competition

Blog Archive