Blog

Are you ready? If not, providers must block your calls.

Everyone hates robocalls. If you are a voice service provider, a white label provider, or reseller of these services whether via TDM or SIP, then you need to know what the FCC has directed providers to implement. If you support more than 100,000 lines you must implement SHAKEN for SIP connections or Robocall Mitigation for TDM lines. If you support fewer than 100,000 lines, you have the options to select SHAKEN for SIP or Robocall Mitigation for TDM. This is the most common path forward for small providers by Implementing Robocall Mitigation to meet June 30th deadline.

Every service provider who serves end users must certify they have implemented either a Robocall Mitigation Program or SHAKEN in their network. The filing of certifications needs to be submitted after June 30, 2021. Will you be ready?

Service providers must block all calls from any service provider that is not in the FCC database. This must become effective 90 days after the deadline for robocall mitigation program certifications. This affects all the main carriers, VoIP resellers, UCaaS providers, some MSPs, and all OTT providers. There will be penalties for non-compliance. Any provider located outside of the US that wants their calls to be verified when calling clients in USA/Canada, need to work with a North American Partner in order to satisfy these requirements. All the enterprises the providers support will want their calls marked as ‘verified’.

These solutions are new to most providers. In a recent survey, 51% of the providers have not started implementation, only 22% have started, a few (5%) have finished while 22% didn’t know what to do. This means that 73% need to learn more about the technologies, responsibilities, and legal issues for dealing with robocalls. The June 30, 2021 date for compliance is approaching fast.

Myths vs. facts about telephone identity verification

Myths vs. facts about telephone identity verification

  • Blog
Ratings
(0)

It doesn’t matter if you’re protecting the personal information you keep on your phone for quick reference or proprietary business information, having secure access to your phone is critical.

At Prescott-Martini, we understand what it means to run secure telephone identity verification. However, we also know that there are several myths that surround the efficacy of these verification processes. Keep reading to learn more about some of these myths as well as the truth about these misconceptions.

Myth: More rules make for stronger security

This myth essentially states that you can better protect your data by making rules that surround your rules. This makes for more stringent processes to access information and the more difficult it is to access data, the less likely someone is to try to breach your security systems.

Fact: Effective rules make for stronger security

While more rules can make the job of getting into your database more time-consuming, it’s not necessarily going to make it more difficult. Keep in mind that criminals who try to access private information have all the time in the world to do what they’re doing because a single breach can be like a diamond mine and fund retirement.

Rather than making more rules, make more effective rules that serve a purpose. Use two-factor authentication that really works and requires updates in certification periodically.

Myth: Identity verification cannot be breached

There’s a belief that a call from a telephone number is always from the person the number says it is. This assumes that spammers don’t know how to spoof phone numbers and break through verification protocols.

Fact: When used properly verification is less likely to be breached

Nothing can fully guarantee that you’ll avoid a breach. Spammers are always working to try to keep up with or stay ahead of the curve when it comes to telecom and digital security. Because of this, technology and industry standards are continually improving to combat threats and stay several steps ahead of cybercriminals.

Myth: Two-factor verification can’t help keep a business secure

No matter what measures you put into place, a business is always at risk. Two-factor authentication is simply a barrier there to look good when investors want to make sure that we’re protecting our information. Employees can simply cut corners and make it easier to get into applications without using verification.

Fact: The correct two-factor verification will keep a business secure

While not all two-factor verification processes are effective, most can serve as an excellent barrier and deterrent to criminals. It’s important to have an identity verification process that truly verifies the identity of the person using the device.

Contact us for more

If you would like more information about telephone identity verification, please don’t hesitate to get in touch with our team at Prescott-Martini. We have more than 150 years of combined experience among us in telecommunications so we can help you find the appropriate solution to resolve any security issues or concerns that you might have.

Reach out by sending an inquiry via our online contact form and we’ll be sure to get back to you promptly to schedule a meeting. We look forward to speaking with you and helping you find the perfect solution for your needs. We’re proud to offer advanced and affordable solutions.

Have any of your questions answered in minutes

DigitalIPvoice logo 2

Prescott-Martini, Digital IP Voice, Inc. Emerg & Company, Inc.
Prescott-Clearwater Technologies

 

HOME | ABOUT | HOW DOES IT WORK | RESOURCES | VIDEOS | NEWS | CONTACT