MERIT Solutions Blog

MERIT Solutions has been serving the Chesapeake area since 1982, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Take Back Your Smartphone By Blocking Problem Numbers

Tip of the Week: Take Back Your Smartphone By Blocking Problem Numbers

Have you ever received unsolicited calls from unknown numbers? Sometimes you might receive them at incredibly inconvenient times, such as while you’re home and trying to wind down after a long day’s work. While Caller ID and voicemail have allowed users to keep unwanted calls to a minimum, there are other ways that you can block a caller entirely from reaching your smartphone.

It doesn’t matter which phone you have. This week’s tip will help you learn how to block everything from telemarketers to stalkers. Even though telemarketing is completely legal, the last thing you want to do is put up with it time and again. The most effective way to deal with it is to just block them. Follow these steps to block a number and never be bothered by the pesky number again.

Android Users
For users of Android Nougat and Marshmallow, follow these steps:

  • Go to the Phone application
  • Select All Calls
  • Choose Call from Undesired Contact
  • Select Block/Report Spam
  • You will be asked if you want to report the call as spam. If you’d like to report it, select this box.

For users of Android Lollipop (on Samsung Galaxy S4, S5, S6, and Note 4 users):

  • Open the Phone app and tap the Call Log
  • Select the phone number that you want to block
  • Tap More
  • Add the number to the Auto reject list

iPhone Users
If you want to block a number on your iPhone, follow these steps:

  • Select Recents, which is found at the bottom of the screen
  • Find the number of the caller that you want to block
  • Tap the i icon in the right-hand side of the screen
  • You’ll now see the caller’s information, along with how to create a new contact. Look at the very bottom of the screen and you’ll see the option to Block This Caller
  • Select this and a message will ask if you really want to do this. Tap Block Contact and you’ll seal the deal.

In the event that you’re receiving unwanted text messages from a stranger rather than phone calls, iOS demands that you add the number to your Contacts list before actually blocking them. To create a new contact directly from your Messages app, select the phone number at the top of the screen and select Create New Contact. Once you’ve done this, follow the directions outlined above. However, if you have yet to upgrade to iOS 10, you’ll have to look for the i icon in the top-right corner of the text conversation. Once you’ve selected it, tap Block This Caller and proceed to Block Contact.

Was our guide on how to block phone numbers helpful? Let us know in the comments, and be sure to subscribe to our blog for more technology tips and tricks.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, 21 May 2018

Captcha Image

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Cloud Business Computing Network Security Hackers Malware Internet Software Hosted Solutions Business Management google Productivity Backup Managed IT Services Mobile Devices Microsoft Computer Disaster Recovery VoIP Business IT Support communications Outsourced IT Business Continuity Cybersecurity Email User Tips Windows 10 Productivity Hardware IT Services Innovation Efficiency Cybercrime Data Backup Small Business Apps Windows Mobility Managed IT Server Ransomware Saving Money Mobile Device Management Data Recovery Smartphone Data Operating System Law Enforcement browser Internet of Things Android Virtualization Tech Term Save Money Telephone Systems Smartphones Hosted Solution Quick Tips Phishing BDR Money Data Security Passwords Cloud Computing Password Recovery Holiday Microsoft Office Office 365 Chrome BYOD Automation Communication VPN Information Technology Gadgets Work/Life Balance Budget Cost Management Data Management Wi-Fi Network Vulnerability upgrade Social Google Drive Hacking App Avoiding Downtime Two-factor Authentication Data Breach Alert Health Wireless Miscellaneous Managed Service Provider Computers Facebook Government Risk Management Unsupported Software Social Media Best Practice Collaboration Update IT Support Shortcut Workplace Tips Employer-Employee Relationship Firewall Application Windows 10 Antivirus Social Engineering Current Events Streaming Media Audit Spam Wireless Technology Personal Information search Managed IT Services Politics Telephony Cleaning USB Save Time User Error Office tips Applications Private Cloud History Identity Theft Proactive IT Data Protection The Internet of Things Flexibility IT solutions Redundancy Humor Disaster DDoS Commerce Project Management SaaS Cortana Television Patch Management Sports Samsung Content Filtering Tech Support Apple Battery Hacker HaaS Solid State Drive Internet Exlporer Wireless Charging Compliance WiFi Excel Going Green Data Storage Bandwidth Automobile iPhone OneNote Value Blockchain eWaste Mobile Computing Transportation Saving Time Mobile Security Office Data Loss Phone System Robot Devices Computer Care Marketing End of Support Google Docs Remote Computing Legal Users Encryption Gmail Fraud Artificial Intelligence Big Data Virus Twitter IT Management Managing Stress Windows 10s control Nanotechnology Chromebook Travel Ciminal Storage Books Data storage Scalability Proactive Credit Cards Hiring/Firing WSJ WIndows Server 2008 Education Hard Disk Drive Exchange Chromecast Root Cause Analysis Router Smart Tech Vendor Management Administration Tablets Distributed Denial of Service altivista How To Websites FAQ Benefits NFL SBS Augmented Reality Connectivity Colocation MSP Unified Threat Management Hard Drives Lifestyle compaq Business Intelligence Touchscreen Data Theft Charger Outlook Files Word Entertainment Administrator Lithium-ion battery Content Filter Training Wearable Technology intranet Upgrades Legislation Electronic Medical Records hp Managed IT Service iOS Computing Point of Sale Relocation Windows Ink HIPAA domain Access Monitoring Company Culture IT budget Consultant Comparison Safety Black Market Computer Fan Analysis Evernote Smart Technology Regulation Google Maps remote Avoid Downtime Management Maintenance PDF Specifications Yahoo Screen Mirroring Shadow IT Dark Web App store Networking Sync Document Management Software as a Service Experience Server 2008 Meetings Financial Technology Device Security Running Cable Identities Text Messaging Sales Ali Rowghani Cast Emails Trending Workers Adobe Settings Video Games Printing IoT Retail Virtual Reality WannaCry Identity Updates Scam Licensing Music server installation dvd "cannot install required files" Google Assistant Spyware Language Conferencing stock Laptop HBO Uninterrupted Power Supply Webinar Data Privacy Microsoft Word Employer Employee Relationship Mobile Microsoft Excel Analytics Computer Forensics Gifts Keyboard tweet Touchpad Instant Messaging IT solutions Worker Commute Hard Drive Computer Accessories Reputation Professional Services Edge Mobile Device Advertising File Sharing calculator CrashOverride Emergency Worker Cache Thank You Monitors Remote Monitoring Congratulations

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

Anna Jackson 5 SEO Tools To Get a Google-Eye View of Your Website
15 September 2017
Hello Randall! I was doing very important work but due to your subject I felt better to stay at you...
David Miller Not all project-management tools are right for all businesses
25 August 2017
All the points depicted by you in this blog is v.apt. I love the title of this blog because it says ...