Protecting Yourself from Call Spoofing

Scammers use various methods to trick people into picking up their calls and acquiring their valuable personal information. Call spoofing is when a scammer disguises themselves as a trusted or local number to gain access to sensitive information.

Protect yourself from call spoofing:

  • Put your university and personal phone numbers on the National Do Not Call Registry list. This won't prevent fraudsters from reaching out to you, but it will stop telemarketing calls.
  • Ignore calls from unknown phone numbers. If it's a legitimate call, they will leave you a voicemail, and you can return that phone call.
  • If you answer the phone and the caller—or a recording—asks you to press a button to stop getting the calls or speak with an operator, just hang up. Scammers often use this trick to identify potential targets.
  • Never give out personal information like account numbers, Social Security numbers, mother's maiden names, passwords, or other identifying information in response to unexpected calls or if you are at all suspicious.

If you think you've been the victim of a phone scam, file a complaint with the FCC.

Securing our campus community is an ongoing effort as cybercriminals continue to evolve their efforts. In this era of persistent cyber threats, our university can be secure only with the active participation of everyone. Simple steps like securing your passwords, storing data securely in OneDrive and avoiding and reporting suspicious messages can go a long way toward protecting our campus community. To learn more, visit the Cybersecurity Checklist.   

Print Article

Related Articles (10)

Check voicemail from a desk phone or Teams, and set up a personalized greeting.
Microsoft Teams is a collaboration tool as well as the default app for meetings and making and receiving phone calls. Teams is available for Windows, Mac, iOS and Android.
Malware is malicious software such as computer viruses and ransomware that can infect your device when you click a link or download an attachment in a phishing email, download untrusted software, or neglect system updates. Ransomware is a type of malware that can lock and encrypt your files and then demand payment for their retrieval.
Conference phones are linked to their conference rooms using Exchange resource accounts.
New employees should request a phone number. A departmental phone account is designated with a departmental phone number and can be managed by one or more employees. This service is useful for front office reception, student/hourly/temp employees, and graduate assistants.
Wireless phone handsets are not available for the current VoIP system. To replace this functionality, IT Services can help departments configure a university-owned cellphone for making and receiving VoIP phone calls.
This service information is for AT&T analog/landline phones only.
Most faculty and staff with desk phones have the AudioCodes 405HD (standard phone) and 445HD (admin phone) models. These instructions apply to legacy AudioCodes 405/445HD desk phones models.
The Polycom conference phone is registered to the conference room where it is located.
If your phone or other mobile device has been replaced or is lost, stolen, or otherwise compromised, you can protect your identity by remotely wiping sensitive UARK data (Outlook email, calendar, contacts and file data) from the device using Outlook on the web.