4IT Blog

4IT has been serving the Miami area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Take Back Your Smartphone By Blocking Problem Numbers

Tip of the Week: Take Back Your Smartphone By Blocking Problem Numbers

Have you ever received unsolicited calls from unknown numbers? Sometimes you might receive them at incredibly inconvenient times, such as while you’re home and trying to wind down after a long day’s work. While Caller ID and voicemail have allowed users to keep unwanted calls to a minimum, there are other ways that you can block a caller entirely from reaching your smartphone.

It doesn’t matter which phone you have. This week’s tip will help you learn how to block everything from telemarketers to stalkers. Even though telemarketing is completely legal, the last thing you want to do is put up with it time and again. The most effective way to deal with it is to just block them. Follow these steps to block a number and never be bothered by the pesky number again.

Android Users
For users of Android Nougat and Marshmallow, follow these steps:

  • Go to the Phone application
  • Select All Calls
  • Choose Call from Undesired Contact
  • Select Block/Report Spam
  • You will be asked if you want to report the call as spam. If you’d like to report it, select this box.

For users of Android Lollipop (on Samsung Galaxy S4, S5, S6, and Note 4 users):

  • Open the Phone app and tap the Call Log
  • Select the phone number that you want to block
  • Tap More
  • Add the number to the Auto reject list

iPhone Users
If you want to block a number on your iPhone, follow these steps:

  • Select Recents, which is found at the bottom of the screen
  • Find the number of the caller that you want to block
  • Tap the i icon in the right-hand side of the screen
  • You’ll now see the caller’s information, along with how to create a new contact. Look at the very bottom of the screen and you’ll see the option to Block This Caller
  • Select this and a message will ask if you really want to do this. Tap Block Contact and you’ll seal the deal.

In the event that you’re receiving unwanted text messages from a stranger rather than phone calls, iOS demands that you add the number to your Contacts list before actually blocking them. To create a new contact directly from your Messages app, select the phone number at the top of the screen and select Create New Contact. Once you’ve done this, follow the directions outlined above. However, if you have yet to upgrade to iOS 10, you’ll have to look for the i icon in the top-right corner of the text conversation. Once you’ve selected it, tap Block This Caller and proceed to Block Contact.

Was our guide on how to block phone numbers helpful? Let us know in the comments, and be sure to subscribe to our blog for more technology tips and tricks.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, 17 March 2018
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

Qr Code

Tag Cloud

security Tip of the Week Technology Cloud Best Practices Privacy Microsoft Internet software Business Computing Business Management Hackers Backup Productivity Hosted Solutions Managed Service Provider Malware Google Business IT Services Efficiency Windows IT Support Disaster Recovery Innovation Hardware VoIP Business Continuity Workplace Tips Network Security Mobile Devices User Tips Computer Saving Money Windows 10 Miscellaneous Virtualization Mobile Device Management Upgrade Data Email Server communications Alert Mobile Computing Small Business Communication Network Save Money Microsoft Office Apps Smartphone Social Media Managed IT Services Outsourced IT Smartphones Quick Tips Browser Information Technology Productivity BYOD Going Green Mobile Office Health Office Gadgets Holiday Cybercrime Android Application Ransomware Operating System Chrome Managed IT Cybersecurity Tablet WiFi Data Backup Firewall The Internet of Things Avoiding Downtime Passwords Best Practice Disaster Mobility Risk Management Telephone Systems History Search Collaboration Automation Internet of Things Remote Computing Unified Threat Management IT Solutions Data Management Spam Data Recovery BDR User Error Employer-Employee Relationship Remote Monitoring Budget Wireless Technology VPN Apple Facebook Hacking Marketing Vendor Management Hard Drives Phishing Saving Time Computers iPhone Customer Relationship Management Maintenance Money Recovery Phone System Data Security Office Tips Big Data Content Filtering Law Enforcement Vulnerability Password Office 365 Proactive IT Hosted Solution Telephony Wearable Technology Intranet Lithium-ion battery PowerPoint Virus OneNote Google Drive Current Events Two-factor Authentication Bring Your Own Device Printer Antivirus Tech Support IT Support USB Shortcut Work/Life Balance Social Analytics Encryption Gmail Router Social Engineering Humor Government App Administration Cost Management Politics Personal Information Private Cloud Bandwidth Printer Server Laptop Wireless Unsupported Software Users Cloud Computing Data Breach Windows 8 Education Trending Save Time Net Neutrality Excel SaaS Audit Identity Theft Data Protection HaaS Flexibility Business Intelligence Windows 10 Outlook Point of Sale Retail IT COnsultant Computer Repair Managed IT Services online currency Google Docs hacker Data Storage Instant Messaging Emails Redundancy Transportation HIPAA Entertainment Battery Social Networking Robot Benefits Computer Care Computer Accessories DDoS Automobile Efficency Mouse Compliance End of Support eWaste Internet Exlporer Legal Managing Stress Cortana Display Project Management Solid State Drive Sports Augmented Reality Paperless Office Travel Network Congestion Blockchain Update Customer Service Fax Server Help Desk Commerce Biometrics Samsung Wi-Fi Workplace Virtual Reality Emergency Artificial Intelligence Streaming Media Networking Applications Data Loss Meetings Uninterrupted Power Supply Device Security Black Market Adobe Access Human Resources IT consulting Company Culture Twitter Touchscreen Computer Fan Running Cable IT Security Surge Protector Television Devices Licensing Reliable Computing Cleaning 3D Printing Experience Microsoft Excel Dark Web Screen Mirroring Bloatware Keyboard Credit Cards Avoid Downtime Spyware Music File Sharing Hard Drive Cast ISP Hiring/Firing FAQ Fraud Data storage Windows 10s Branding Books Uograde systems Images Nanotechnology Distributed Denial of Service Programming Blogging Smart Technology Charger Video Games Edge Document Management Sales Tablets Hard Disk Drive WIndows 7 Storage Inbound Marketing hack Advertising Root Cause Analysis HBO Website Regulations Wireless Charging Ciminal NFL Touchpad best practices Mobile Device Value Managed Security CrashOverride IT Management OneDrive Cameras Scam WannaCry Word Wiring data breach Amazon User Science Co-managed IT Information Legislation Settings WIndows Server 2008 Virtual Desktop Presentation Employer Employee Relationship Evernote MSP Worker Commute Debate Windows Ink Operating Sysytem risk management Bluetooth Best Available IT Technicians Lifestyle Comparison PDF Scalability Patch Management Files Ebay Workers IT Budget Google Maps SharePoint Computing Safety Specifications Text Messaging How To Regulation Chromecast Updates Upgrades Identities Software as a Service Teamwork Busines Continuity Nokia Conferencing Sync Administrator Near Field Communication Training Microsoft Word Consultant IoT Colocation iOS The Blindside Of Gifts Managed IT Service Language Shadow IT Webinar Tech Term Relocation Mobile IT solutions Proactive Gift Giving Microblogging Professional Services Youtube Websites Managed Service Provder Webinar IT service Taxes Domains Supercomputer Electronic Medical Records Buisness Reputation Tutorial