BNMC Blog

Tip of the Week: How to Deal With All the Robocalls

Tip of the Week: How to Deal With All the Robocalls

Many people have fallen out of the habit of answering their mobile phones when they receive a call, simply because of the rising prevalence that scam calls have seen in the past few years. While these calls are undeniably annoying, they can also be dangerous, which is why it suits your interests to prevent them as much as possible.

Stopping the Robocalls

Fortunately, there are many efforts actively being carried out to quell these calls. Not only have all four major carriers in the United States put free spam call blocking into action, the Traced Act passed in 2019 enables law enforcement to fight back. Google and Apple alike have incorporated more protections into their operating systems to help redirect spam calls and prevent unknown callers from making contact.

More tools and similar features are currently in development as well, and the Traced Act has yet to fully go into effect. These are all clear indications that something is being done—it’s just a matter of time before it fully generates real change.

In the meantime, let’s go through some of the basic steps to help minimize the frustration of dealing with robocall spam:

  • Don’t answer calls from unknown or blocked numbers. Answering a robocall just confirms that the number dialed works, affirming that they’ve reached someone.
  • Keep your contacts updated. For similar reasons, you will want to update your contacts whenever someone’s information changes. This will help prevent you from missing messages without requiring you to pick up an unknown call.

Of course, these tips aren’t going to work for everyone and their use case. For instance, those who rely on their phone for business could easily have unknown callers calling that are legitimate potential customers, which means they really do have to answer their phone. In this case, we recommend the following:

  • Hang up on suspected robocalls. Cybercriminals wouldn’t continue using these calls if they didn’t work. The less effective these robocalls are (as immediate disconnections will imply), the less incentivized a scammer will be to use them to their advantage.
  • Don’t say anything, particularly “yes.” Unfortunately, these callers could be recording you, and by combining your phone number with a captured voice, mimic you and potentially create significant challenges.

Consult with Your Carrier’s Options

While we aren’t thrilled that call blocking and other such services incur an extra fee, a few dollars a month may be worth the investment to you.

T-Mobile/Sprint

With the merger between these two carriers, there are a few advantages that this actually brings you as a user. Sprint’s Call Screener is currently free for their customers, and soon Sprint subscribers will have access to T-Mobile’s free Scam Shield and its benefits—including full caller ID and proxy numbers. Sprint’s Call Screener Pro is currently available for $3/month and will label, block, and report scam calls.

AT&T

AT&T offers a free and paid version of their Call Protect application, which can block spam numbers or even all unknown callers. Shelling out $4 each month for the paid version also gives access to things like caller ID and other perks.

Verizon

If a Verizon customer uses an Android, they may already have the carrier’s Call Filter application installed (which can be found in the iPhone’s app store as well). The free version filters out spam calls and maintains a log of what has been blocked, and the $3/month paid version adds caller ID services.

If you utilize a different wireless carrier, make sure you check their website or call their support services to find out what they offer in terms of spam blocking.

Third-Party Applications

Of course, there are also independent applications that a user can install to help quell these spam calls further. Take, for instance, Hiya. Developed by the same people behind the AT&T Call Protect app, Hiya can be downloaded for free on either Android or iOS. Samsung uses a technology that Hiya inspired to power their call-blocking services.

Likewise, the hilariously-but-fittingly-named Nomorobo application (available for $2/month) is based on Verizon’s technology. iPhones can support a particularly useful app called Firewall, which also provides a user with one-use throwaway numbers to help keep their personal number private.

Where Does This All Leave Us?

While nothing is going to completely stop all robocalls while they remain profitable to those who send them, a little vigilance will go a long way. Resist the temptation to react, as you’ll only be wasting your own time.

As we said, vigilance will be key. For more ways to keep your IT more secure and productive, make a habit of checking back here on our blog.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, April 20 2021

Captcha Image

By accepting you will be accessing a service provided by a third-party external to https://www.bnmc.net/

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Technology Productivity Business Computing User Tips Cloud Email Software Privacy Network Security Microsoft Hackers Workplace Tips Efficiency Business Google Computer Data Hardware Hosted Solutions Malware IT Services Internet Communication Mobile Device IT Support Smartphone Mobile Devices Small Business Android Cloud Computing Innovation Phishing Users Data Recovery Ransomware Backup Tech Term Managed IT Services Windows Smartphones Saving Money Cybersecurity VoIP Quick Tips Information Outsourced IT Network Disaster Recovery Passwords Miscellaneous Upgrade Browser Windows 10 Microsoft Office Facebook Business Management Data Backup communications Social Media Office 365 Server Business Continuity Collaboration COVID-19 Managed IT Services Productivity Internet of Things Managed Service Windows 10 Gadgets Data Management Apps Remote Work Information Technology Mobile Office Infrastructure Analytics Save Money App Vulnerability Artificial Intelligence Gmail Remote Monitoring Word Router Money Encryption Government Spam WiFi Conferencing Chrome Managed Service Provider Remote Workers Access Control Virtual Reality Applications VPN Data Security IT Support Employer-Employee Relationship Holiday Company Culture Paperless Office Settings BYOD Google Drive Display Tip of the week Website Networking Hacker Data storage Document Management IT Management Compliance Business Technology Wireless Virtual Private Network Big Data Wi-Fi Operating System Computers Virtualization Employee-Employer Relationship Managed Services Content Filtering Bandwidth Avoiding Downtime Unified Threat Management Development YouTube Apple Antivirus Education Robot Storage Risk Management HIPAA Firewall Maintenance Automation BDR Office Tips End of Support Social Network Free Resource Laptop Remote Computing Server Management Solid State Drive The Internet of Things Business Intelligence iOS Touchscreen SaaS Outlook Images 101 Identity Theft Computing Bring Your Own Device Managed IT Training LiFi Budget Tablet Hard Disk Drive Cybercrime Social Regulations How To Downtime Humor Blockchain Marketing Hosted Solution Best Practice Augmented Reality Retail Alert Administration MSP Mouse Remote Managing Stress Two-factor Authentication OneNote Cryptocurrency Data Breach Managed IT Service Data loss Going Green Vendor Management Monitors Customer Relationship Management Scam Telephone Systems Windows 7 desktop Chromebook Software as a Service Break Fix Printing Search Password Mobile Security IT Vendor Policy Network Management Monitoring Uninterrupted Power Supply Solid State Drives Virtual Desktop Work Dark Web Shortcuts Spyware Mobile Management Sports Safety Smart Tech File Sharing Employee-Employer Relationships Deep Learning Cooperation Service Level Agreement Employees Cyber Monday Computer Care Streaming IBM Processor Mobile Device Management Voice over Internet Protocol Hotspot Internet Exlporer Banking Legislation Troubleshooting Business Analysis Network Congestion Holidays Hybrid Cloud Procedure SharePoint Spying National Security Alt Codes IT Technicians Optimization Distribution Microsoft Excel Security Cameras Profiles Connectivity Analysis Students Staff Leominster Gig Economy Smart Technology Human Error Corporate Profile Memory Writing Modem FinTech Techology Language Value Reviews Statistics G Suite Virus Payment Card Lenovo Automobile Scalability IoT PCI DSS Downloads Dell Updates Dark Data Update Typing Mirgation Recycling Logistics Mail Merge Utility Computing VoIP Unified Threat Management Cabling Mixed Reality K-12 Schools FBI Shortcut Distributed Denial of Service Device WannaCry Reducing Cost Current Events Cookies Politics Computing Infrastructure Professional Services Bluetooth Comparison LED Threats Social Networking Inventory Firefox Superfish Google Maps Migration Consulting Star Wars Battery PowerPoint Customer Service Chatbots eWaste Asset Management Address Permissions Laptops Work/Life Balance User Error Health Private Cloud Google Docs Wearable Technology Network upgrade K-12 Education Patch Management Mobility Batteries Halloween Office Samsung IT solutions Nanotechnology Peripheral Tech Support Alerts USB user treats Specifications Co-Managed IT Hacks Motherboard Cables Shadow IT Fraud Cost Management Files Heating/Cooling Multi-Factor Security Onboarding GDPR Bitcoin Identity Continuity Memes Digital Payment Managed Services Provider Google Wallet Management Time Management Printer Meetings Slack Disaster Hard Disk Drives Business Growth Smart Office Instant Messaging Print Toner Digital Myths Scary Stories Social Engineering Screen Reader Charging Messaging Websites Legal Licensing Dongle Shopping Black Friday Content Huawei Running Cable Twitter Wires Gamification Drones Assessment RMM Servers Google Calendar Digital Signage Data Warehouse Windows 8 Solar Emergency Entertainment Buisness Unified Communications Webcam Crowdsourcing Regulation Personal Information Botnet Cortana Error 3D Printing Point of Sale Ben McDonald shares Travel Machine Learning Processors Mobile Computing Unsupported Software Printers Supercomputer CrashOverride Motion Sickness Computer Repair Relocation Staffing Mobile Data Taxes Administrator Web Server what was your? Recovery IT Budget How To GPS IT Consultant Financial Black Market Cameras Law Enforcement Electronic Medical Records Tracking Notifications Physical Security Cleaning CCTV Emoji Upgrades Gadget

What Our Clients Say

  • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
  • 1
  • 2
  • 3