4IT Blog

4IT has been serving the Miami area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Take Back Your Smartphone By Blocking Problem Numbers

Tip of the Week: Take Back Your Smartphone By Blocking Problem Numbers

Have you ever received unsolicited calls from unknown numbers? Sometimes you might receive them at incredibly inconvenient times, such as while you’re home and trying to wind down after a long day’s work. While Caller ID and voicemail have allowed users to keep unwanted calls to a minimum, there are other ways that you can block a caller entirely from reaching your smartphone.

It doesn’t matter which phone you have. This week’s tip will help you learn how to block everything from telemarketers to stalkers. Even though telemarketing is completely legal, the last thing you want to do is put up with it time and again. The most effective way to deal with it is to just block them. Follow these steps to block a number and never be bothered by the pesky number again.

Android Users
For users of Android Nougat and Marshmallow, follow these steps:

  • Go to the Phone application
  • Select All Calls
  • Choose Call from Undesired Contact
  • Select Block/Report Spam
  • You will be asked if you want to report the call as spam. If you’d like to report it, select this box.

For users of Android Lollipop (on Samsung Galaxy S4, S5, S6, and Note 4 users):

  • Open the Phone app and tap the Call Log
  • Select the phone number that you want to block
  • Tap More
  • Add the number to the Auto reject list

iPhone Users
If you want to block a number on your iPhone, follow these steps:

  • Select Recents, which is found at the bottom of the screen
  • Find the number of the caller that you want to block
  • Tap the i icon in the right-hand side of the screen
  • You’ll now see the caller’s information, along with how to create a new contact. Look at the very bottom of the screen and you’ll see the option to Block This Caller
  • Select this and a message will ask if you really want to do this. Tap Block Contact and you’ll seal the deal.

In the event that you’re receiving unwanted text messages from a stranger rather than phone calls, iOS demands that you add the number to your Contacts list before actually blocking them. To create a new contact directly from your Messages app, select the phone number at the top of the screen and select Create New Contact. Once you’ve done this, follow the directions outlined above. However, if you have yet to upgrade to iOS 10, you’ll have to look for the i icon in the top-right corner of the text conversation. Once you’ve selected it, tap Block This Caller and proceed to Block Contact.

Was our guide on how to block phone numbers helpful? Let us know in the comments, and be sure to subscribe to our blog for more technology tips and tricks.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, 17 October 2017
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

Qr Code

Tag Cloud

security Tip of the Week Technology Cloud Privacy Best Practices Microsoft Business Computing Internet software Backup Hackers Hosted Solutions Productivity Business Management Managed Service Provider Malware Google IT Services Business Efficiency Windows Innovation Disaster Recovery IT Support Hardware Workplace Tips Business Continuity Computer VoIP Saving Money Windows 10 Miscellaneous Virtualization User Tips Upgrade Mobile Devices Mobile Device Management Data Network Security Server Mobile Computing Email Alert Save Money Microsoft Office Communication Network Quick Tips communications Social Media Smartphone Smartphones Information Technology BYOD Going Green Mobile Office Office Health Apps Android Small Business Outsourced IT Operating System Chrome Browser Application Ransomware Gadgets Productivity Managed IT Services Firewall Disaster Avoiding Downtime Tablet BDR Managed IT Search Passwords Cybersecurity Holiday The Internet of Things Mobility Data Management Remote Computing Risk Management Unified Threat Management IT Solutions Cybercrime Spam WiFi Telephone Systems Budget Apple Automation Vendor Management Hacking VPN Best Practice Facebook Phishing History Hard Drives Remote Monitoring Employer-Employee Relationship Saving Time Recovery Phone System User Error Collaboration Law Enforcement Office Tips Marketing Wireless Technology Password Big Data Hosted Solution iPhone Customer Relationship Management Computers Proactive IT Lithium-ion battery Bring Your Own Device Current Events Office 365 Antivirus Data Recovery Shortcut Social Humor Administration Printer Wearable Technology USB Money Content Filtering Data Backup Maintenance Telephony PowerPoint Analytics Encryption Gmail Router Virus Users Government Save Time App Cost Management Windows 8 Intranet Bandwidth Printer Server Work/Life Balance Laptop Audit OneNote HaaS Point of Sale Education Trending IT COnsultant Business Intelligence Net Neutrality Computer Repair Tech Support Social Engineering Wireless Unsupported Software Outlook Cloud Computing Google Drive Private Cloud Data Security Internet Exlporer Benefits Computer Accessories Uninterrupted Power Supply DDoS online currency Internet of Things Mouse Identity Theft Compliance Data Protection Solid State Drive Flexibility Two-factor Authentication Managing Stress SaaS IT Support Excel Efficency Windows 10 Network Congestion Samsung Wi-Fi Emergency Vulnerability Help Desk Applications Travel Update Customer Service Politics Display hacker Biometrics Personal Information Retail Transportation Data Storage Virtual Reality Augmented Reality Computer Care Battery Paperless Office Robot Meetings Automobile Fax Server Instant Messaging Emails End of Support Social Networking Workplace HIPAA Streaming Media Entertainment Legal Uograde Images Tablets Hard Disk Drive Mobile Device Root Cause Analysis Touchpad Twitter HBO Managed Security NFL Branding Scam best practices CrashOverride Surge Protector Distributed Denial of Service Television IT Management 3D Printing Sports Word Employer Employee Relationship data breach WIndows 7 eWaste Settings Worker Commute Inbound Marketing Operating Sysytem Wiring WIndows Server 2008 Regulations PDF Scalability Information Files Windows Ink risk management ISP Value Debate Patch Management Safety Cameras Text Messaging User How To Chromecast Google Maps Upgrades Commerce Science Programming Blogging Regulation Virtual Desktop Presentation Artificial Intelligence Best Available Administrator Bluetooth Training IT Technicians Consultant Website Colocation Sync The Blindside Of iOS Black Market Nokia Access Data Loss SharePoint Company Culture Touchscreen Managed IT Service OneDrive Adobe IT Security Managed IT Services Amazon Cleaning Computer Fan Co-managed IT Teamwork Experience Busines Continuity Avoid Downtime Licensing Networking Keyboard Near Field Communication Dark Web Screen Mirroring Music Ebay Human Resources Hiring/Firing IT consulting Computing Data storage Running Cable Cast Books Video Games Hard Drive Smart Technology Windows 10s Reliable Computing Nanotechnology Document Management Bloatware Data Breach Advertising Sales Managed Service Provder Taxes Webinar Supercomputer Storage Electronic Medical Records IT service IT Budget Gift Giving Domains Reputation Software as a Service Buisness Shadow IT Google Docs Relocation Webinar Lifestyle Mobile IT solutions Professional Services Tutorial Youtube Microblogging