Unwanted and automated phone calls are an unfortunate reality for every business today. Advances in caller ID spoofing, robocalls, and AI-driven dialing mean that even well-managed phone systems are constantly being targeted.
At DTPBX, we have options to control these calls so that real people can still reach you, while automated and abusive calls are reduced. These controls are not implemented by default - we do so when we become aware of impacts to our customers. This is so that we don't impact real callers without your knowledge.
This article explains what we do, why it works, and what decisions we’ll ask you to make.
Spam calls fall into a few broad categories:
Modern phone networks allow callers to present almost any caller ID they want, which makes it difficult to block spam based on phone number alone.
This is also why we do not recommend explicit number blocking as a spam control method - it doesn't work because spam callers rotate numbers.
The industry’s answer to this problem is call attestation.
Call attestation is part of a telecom framework called STIR/SHAKEN. It allows phone carriers to cryptographically verify how confident they are that a caller is legitimate.
You don’t need to remember the acronym — just the idea:
Attestation tells us how trustworthy the caller’s identity is.
There are three common levels:
Important note:
Even legitimate businesses — including your own staff calling from certain phones or systems — may occasionally appear as B or even C attestation. This is more common than most people expect.
Rather than simply blocking calls, we use call interruption and verification.
Depending on your chosen settings:
This is the most common concern — and a valid one.
Our approach is designed specifically to avoid losing legitimate calls:
No system is perfect, and we want to be transparent:
This is the key decision we’ll ask you to make.
We’ll help you understand what your inbound traffic looks like and recommend a starting point — but the final decision is always yours.
Traditional “block lists” and number-based filtering don’t work well anymore. Spam callers constantly rotate numbers and spoof legitimate caller IDs.
Verification-based controls focus on behavior, not just numbers.
That’s why this method:
Our goal is simple:
Protect your staff from unnecessary interruptions while ensuring real people can still reach you.
Spam calling technology will continue to evolve. We actively monitor trends and adjust our controls as needed.
If you’d like to implement, review, or change your call verification settings, just let us know.