Blog

Are you ready? If not, providers must block your calls.

Everyone hates robocalls. If you are a voice service provider, a white label provider, or reseller of these services whether via TDM or SIP, then you need to know what the FCC has directed providers to implement. If you support more than 100,000 lines you must implement SHAKEN for SIP connections or Robocall Mitigation for TDM lines. If you support fewer than 100,000 lines, you have the options to select SHAKEN for SIP or Robocall Mitigation for TDM. This is the most common path forward for small providers by Implementing Robocall Mitigation to meet June 30th deadline.

Every service provider who serves end users must certify they have implemented either a Robocall Mitigation Program or SHAKEN in their network. The filing of certifications needs to be submitted after June 30, 2021. Will you be ready?

Service providers must block all calls from any service provider that is not in the FCC database. This must become effective 90 days after the deadline for robocall mitigation program certifications. This affects all the main carriers, VoIP resellers, UCaaS providers, some MSPs, and all OTT providers. There will be penalties for non-compliance. Any provider located outside of the US that wants their calls to be verified when calling clients in USA/Canada, need to work with a North American Partner in order to satisfy these requirements. All the enterprises the providers support will want their calls marked as ‘verified’.

These solutions are new to most providers. In a recent survey, 51% of the providers have not started implementation, only 22% have started, a few (5%) have finished while 22% didn’t know what to do. This means that 73% need to learn more about the technologies, responsibilities, and legal issues for dealing with robocalls. The June 30, 2021 date for compliance is approaching fast.

Dispelling myths about user token authentication

Dispelling myths about user token authentication

  • Blog
Ratings
(0)

With the implementation of STIR-SHAKEN protocols, there are many companies out there that are still trying to sort out the facts and myths about what exactly user token authentication does.

At Prescott-Martini, we want to help each understand what these protocols mean and what they don’t mean for your business. Read this short guide that’s meant to dispel some of these myths.

Authentication guarantees customers will answer calls.

When you have your phone number authenticated with a user token, your customers will see that you are a legitimate business and not a spammer trying to steal money from your customers. While this is a major win and identification verification will help, it’s not necessarily true that all customers will pick up.

There’s always been something intimate about calling someone on their cell phone. Even now as landlines have primarily gone the way of the world, many people don’t appreciate being called on their cell phone while they’re out running errands or trying to work. Because of this, many people will continue to ignore calls from legitimate businesses and send them directly to voicemail.

Authentication blocks unwanted calls.

Indeed, there are settings on a smartphone that make it easier to block unwanted calls. With settings that essentially range from mild, medium, and hot regarding threat level, the system isn’t perfect. Keep in mind that it’s still possible for scammers to obtain the necessary A-level authentication required to come through as a trusted call. As a result, cell phones can’t always identify the intent of the person calling.

Consider this, if you run a call center that strictly does surveys, you probably don’t want to be lumped in with spammers and salespeople. To avoid this, you’ve obtained the necessary A-level authentication. However, companies that use call centers to make a majority of their sales, will likely have the same user token authentication to ensure that their calls aren’t considered spam. The intent of your calls won’t be identified by your authentication level and will come through to potential customers the same way. If you call five minutes after somebody tries to sell your caller something, you’re not as likely to get through. So, while authentication can help to limit spam calls, it’s not capable of entirely blocking them.

All unauthenticated calls are spam.

Not everyone will be compliant with the new standards that come with user token verification. While telecom companies are required to include it as a part of their service, customers might not show up as an authenticated number. In fact, you could get a phone call from someone who's authenticated but you know very well. It simply depends on where they’re calling from.

In contrast, spam callers can use systems and technology available to telecom security companies to authenticate their numbers and receive a certain level of attestation. Keep in mind that while not all unauthenticated calls are spam, not all authenticated calls aren’t.

Get in touch to learn more

If you’d like to learn more about how we can help your company with user token authentication, get in touch by sending a message through our contact form. Our team at Prescott-Martini has your best interests in mind when implementing telecom security solutions, especially with number authentication. We understand that many businesses rely on the success of customers simply picking up the phone and these processes are designed to help improve that.

Have any of your questions answered in minutes

DigitalIPvoice logo 2

Prescott-Martini, Digital IP Voice, Inc. Emerg & Company, Inc.
Prescott-Clearwater Technologies

 

HOME | ABOUT | HOW DOES IT WORK | RESOURCES | VIDEOS | NEWS | CONTACT