4IT Blog

4IT has been serving the Miami area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Take Back Your Smartphone By Blocking Problem Numbers

Tip of the Week: Take Back Your Smartphone By Blocking Problem Numbers

Have you ever received unsolicited calls from unknown numbers? Sometimes you might receive them at incredibly inconvenient times, such as while you’re home and trying to wind down after a long day’s work. While Caller ID and voicemail have allowed users to keep unwanted calls to a minimum, there are other ways that you can block a caller entirely from reaching your smartphone.

It doesn’t matter which phone you have. This week’s tip will help you learn how to block everything from telemarketers to stalkers. Even though telemarketing is completely legal, the last thing you want to do is put up with it time and again. The most effective way to deal with it is to just block them. Follow these steps to block a number and never be bothered by the pesky number again.

Android Users
For users of Android Nougat and Marshmallow, follow these steps:

  • Go to the Phone application
  • Select All Calls
  • Choose Call from Undesired Contact
  • Select Block/Report Spam
  • You will be asked if you want to report the call as spam. If you’d like to report it, select this box.

For users of Android Lollipop (on Samsung Galaxy S4, S5, S6, and Note 4 users):

  • Open the Phone app and tap the Call Log
  • Select the phone number that you want to block
  • Tap More
  • Add the number to the Auto reject list

iPhone Users
If you want to block a number on your iPhone, follow these steps:

  • Select Recents, which is found at the bottom of the screen
  • Find the number of the caller that you want to block
  • Tap the i icon in the right-hand side of the screen
  • You’ll now see the caller’s information, along with how to create a new contact. Look at the very bottom of the screen and you’ll see the option to Block This Caller
  • Select this and a message will ask if you really want to do this. Tap Block Contact and you’ll seal the deal.

In the event that you’re receiving unwanted text messages from a stranger rather than phone calls, iOS demands that you add the number to your Contacts list before actually blocking them. To create a new contact directly from your Messages app, select the phone number at the top of the screen and select Create New Contact. Once you’ve done this, follow the directions outlined above. However, if you have yet to upgrade to iOS 10, you’ll have to look for the i icon in the top-right corner of the text conversation. Once you’ve selected it, tap Block This Caller and proceed to Block Contact.

Was our guide on how to block phone numbers helpful? Let us know in the comments, and be sure to subscribe to our blog for more technology tips and tricks.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 15 December 2017
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

Qr Code

Tag Cloud

security Tip of the Week Technology Cloud Privacy Best Practices Microsoft software Internet Business Computing Backup Hackers Productivity Hosted Solutions Business Management Managed Service Provider Malware Google IT Services Business Efficiency Windows Innovation Disaster Recovery IT Support Business Continuity Hardware Workplace Tips VoIP User Tips Computer Saving Money Windows 10 Miscellaneous Virtualization Upgrade Mobile Devices Mobile Device Management Data Network Security Server Mobile Computing Alert Email Microsoft Office Communication Network Save Money Smartphone Quick Tips communications Small Business Social Media Smartphones BYOD Going Green Mobile Office Information Technology Office Health Apps Android Managed IT Services Outsourced IT Operating System Browser Application Chrome Ransomware Gadgets Mobility Disaster Productivity Tablet Managed IT Holiday Firewall WiFi Avoiding Downtime Remote Computing Unified Threat Management IT Solutions Spam Passwords BDR Best Practice Data Management Search Risk Management Cybercrime Cybersecurity The Internet of Things Telephone Systems Facebook Budget Apple Automation Hard Drives Saving Time Vendor Management Hacking VPN Remote Monitoring History Employer-Employee Relationship Recovery Phone System Big Data Data Backup Content Filtering Proactive IT Office Tips Marketing Money User Error Collaboration Phishing Password Data Recovery iPhone Hosted Solution Wireless Technology Customer Relationship Management Computers Law Enforcement Printer Office 365 USB Analytics Encryption Gmail Router Bring Your Own Device Government Antivirus Shortcut Social Lithium-ion battery Humor Administration Vulnerability Wearable Technology Current Events Maintenance PowerPoint Telephony Work/Life Balance Virus Users Tech Support Windows 8 Data Security Outlook Politics Personal Information SaaS Audit HaaS App Wireless Unsupported Software Cost Management Point of Sale Intranet IT COnsultant Business Intelligence Cloud Computing Google Drive Bandwidth Computer Repair Printer Server Save Time Laptop OneNote Social Engineering Data Protection Trending Education Net Neutrality Private Cloud Samsung Benefits Wi-Fi DDoS Computer Accessories Artificial Intelligence Augmented Reality Emergency Compliance Applications Paperless Office Mouse Fax Server hacker Two-factor Authentication Workplace Transportation Managing Stress Excel Streaming Media Computer Care Network Congestion Battery Robot Uninterrupted Power Supply online currency Automobile Help Desk End of Support Travel IT Support Customer Service Update Internet Exlporer Biometrics Windows 10 Retail Virtual Reality Efficency Internet of Things Identity Theft Meetings Solid State Drive Flexibility Sports Social Networking Instant Messaging Emails HIPAA Data Storage Entertainment Display Dark Web Amazon Uograde How To Images Chromecast Microsoft Excel Screen Mirroring Upgrades Co-managed IT Training Branding Administrator File Sharing Cast Consultant Distributed Denial of Service Colocation Lifestyle Windows 10s The Blindside Of Ebay Nanotechnology Company Culture Computing Black Market Access WIndows 7 systems Inbound Marketing Touchscreen eWaste Storage Wiring Regulations Tablets Hard Disk Drive IT Security Root Cause Analysis Cleaning Information hack Value HBO Experience Debate Avoid Downtime Cameras NFL best practices Keyboard CrashOverride User Cortana Science IT Management Music Hiring/Firing Virtual Desktop Twitter Presentation Word data breach Settings Bluetooth Data storage Best Available Legislation Surge Protector WIndows Server 2008 Books IT Technicians Smart Technology Video Games Television Windows Ink risk management 3D Printing Nokia Document Management SharePoint Advertising Patch Management Data Breach Legal Google Maps Commerce Mobile Device Teamwork Touchpad Busines Continuity Regulation ISP Managed Security Scam Networking Near Field Communication Software as a Service Sync Programming Blogging Employer Employee Relationship Human Resources IT consulting Data Loss iOS Managed IT Service Worker Commute Running Cable Operating Sysytem PDF Adobe Managed IT Services Website Computer Fan Scalability Hard Drive Files Reliable Computing Google Docs Text Messaging Bloatware Licensing OneDrive Safety Credit Cards Reputation Sales Mobile IT solutions FAQ Managed Service Provder Webinar Professional Services Shadow IT IT service Relocation Tutorial Domains Comparison Buisness Specifications Gift Giving Taxes Conferencing Gifts Supercomputer Electronic Medical Records Redundancy IT Budget Microblogging Youtube Webinar