MERIT Solutions Blog

MERIT Solutions has been serving the Chesapeake area since 1982, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Take Back Your Smartphone By Blocking Problem Numbers

Tip of the Week: Take Back Your Smartphone By Blocking Problem Numbers

Have you ever received unsolicited calls from unknown numbers? Sometimes you might receive them at incredibly inconvenient times, such as while you’re home and trying to wind down after a long day’s work. While Caller ID and voicemail have allowed users to keep unwanted calls to a minimum, there are other ways that you can block a caller entirely from reaching your smartphone.

It doesn’t matter which phone you have. This week’s tip will help you learn how to block everything from telemarketers to stalkers. Even though telemarketing is completely legal, the last thing you want to do is put up with it time and again. The most effective way to deal with it is to just block them. Follow these steps to block a number and never be bothered by the pesky number again.

Android Users
For users of Android Nougat and Marshmallow, follow these steps:

  • Go to the Phone application
  • Select All Calls
  • Choose Call from Undesired Contact
  • Select Block/Report Spam
  • You will be asked if you want to report the call as spam. If you’d like to report it, select this box.

For users of Android Lollipop (on Samsung Galaxy S4, S5, S6, and Note 4 users):

  • Open the Phone app and tap the Call Log
  • Select the phone number that you want to block
  • Tap More
  • Add the number to the Auto reject list

iPhone Users
If you want to block a number on your iPhone, follow these steps:

  • Select Recents, which is found at the bottom of the screen
  • Find the number of the caller that you want to block
  • Tap the i icon in the right-hand side of the screen
  • You’ll now see the caller’s information, along with how to create a new contact. Look at the very bottom of the screen and you’ll see the option to Block This Caller
  • Select this and a message will ask if you really want to do this. Tap Block Contact and you’ll seal the deal.

In the event that you’re receiving unwanted text messages from a stranger rather than phone calls, iOS demands that you add the number to your Contacts list before actually blocking them. To create a new contact directly from your Messages app, select the phone number at the top of the screen and select Create New Contact. Once you’ve done this, follow the directions outlined above. However, if you have yet to upgrade to iOS 10, you’ll have to look for the i icon in the top-right corner of the text conversation. Once you’ve selected it, tap Block This Caller and proceed to Block Contact.

Was our guide on how to block phone numbers helpful? Let us know in the comments, and be sure to subscribe to our blog for more technology tips and tricks. your social media marketing partner


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, 19 March 2018

Captcha Image

Tag Cloud

Security Tip of the Week Technology Privacy Best Practices Cloud Business Computing Hackers Network Security Malware Software Internet Hosted Solutions Backup Business Management google Managed IT Services Productivity Computer Disaster Recovery Microsoft IT Support communications Mobile Devices VoIP Business Continuity Outsourced IT Business User Tips Windows 10 Email IT Services Hardware Productivity Innovation Cybercrime Windows Efficiency Managed IT Mobility Data Backup Mobile Device Management Small Business Apps Cybersecurity Smartphone Server Ransomware browser Data Recovery Saving Money Internet of Things Save Money Telephone Systems Hosted Solution Quick Tips Android Virtualization Operating System Law Enforcement Passwords Microsoft Office Phishing Chrome BYOD Data Office 365 BDR Money VPN Data Security Information Technology Recovery Password Holiday Work/Life Balance Vulnerability Wi-Fi Social upgrade Google Drive Hacking Avoiding Downtime Automation App Alert Communication Health Miscellaneous Managed Service Provider Computers Facebook Government Wireless Best Practice Social Media Risk Management Unsupported Software IT Support Budget Gadgets Smartphones Data Management Cloud Computing Flexibility Windows 10 Shortcut Social Engineering Spam Wireless Technology Firewall Application Antivirus search Current Events Managed IT Services Telephony Audit Data Breach Personal Information Applications Private Cloud Office tips Politics History User Error Two-factor Authentication Proactive IT USB Save Time The Internet of Things Update Collaboration Identity Theft Workplace Tips Network Artificial Intelligence Sports Cortana Blockchain Television Tech Support Cost Management Hacker Streaming Media Apple Internet Exlporer Solid State Drive SaaS WiFi Excel Samsung Content Filtering iPhone Data Storage Going Green Battery Bandwidth OneNote HaaS Mobile Computing Fraud eWaste Transportation Compliance Robot Automobile Data Loss End of Support Remote Computing Marketing Saving Time Google Docs Project Management Cleaning Gmail Office Computer Care Phone System Data Protection Humor Disaster Legal Redundancy Users Encryption IT solutions Employer-Employee Relationship Commerce DDoS Computer Accessories Tablets Worker Commute Root Cause Analysis Maintenance Exchange altivista Mobile Device Big Data Colocation Distributed Denial of Service Managing Stress FAQ Hard Drives Patch Management NFL Augmented Reality Files Device Security SBS Identities compaq Lithium-ion battery Lifestyle Books Business Intelligence Scalability Administrator Touchscreen Education Charger Hiring/Firing Outlook Vendor Management Word Router Wearable Technology Devices IoT hp Legislation Relocation Managed IT Service How To Access iOS Wireless Charging Benefits Windows Ink Spyware domain Language Unified Threat Management Comparison Computer Fan Evernote PDF Regulation Training Google Maps Entertainment remote Tech Term Yahoo Upgrades Specifications Electronic Medical Records Screen Mirroring Point of Sale Dark Web Networking Text Messaging Sync Company Culture Software as a Service HIPAA Meetings Running Cable Edge Server 2008 Virus Ali Rowghani Consultant Sales Cast Black Market Emails Trending Workers Smart Technology Adobe Value Settings Avoid Downtime Ciminal Proactive Retail Shadow IT Licensing Document Management Laptop WannaCry Uninterrupted Power Supply Updates Experience server installation dvd "cannot install required files" Webinar Websites stock Conferencing HBO Mobile Touchpad Microsoft Word Microsoft Excel Reputation Video Games MSP IT solutions tweet Gifts Advertising Virtual Reality Professional Services Scam File Sharing Music intranet calculator Data storage Windows 10s Twitter IT Management Travel Nanotechnology control Employer Employee Relationship Storage Analytics Administration Chromecast IT budget Hard Disk Drive WSJ Credit Cards Keyboard WIndows Server 2008 Instant Messaging CrashOverride Safety Emergency Cache Thank You Monitors Remote Monitoring Congratulations Worker

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

Anna Jackson 5 SEO Tools To Get a Google-Eye View of Your Website
15 September 2017
Hello Randall! I was doing very important work but due to your subject I felt better to stay at you...
David Miller Not all project-management tools are right for all businesses
25 August 2017
All the points depicted by you in this blog is v.apt. I love the title of this blog because it says ...