Thank you for your Interest in the American Hospital Association (AHA) Webinar!

Here are some resources we have curated for you:

What is Voice Spam?

With an ever-evolving amount of tools in their arsenal,
bad actors thrive on seeming legitimate.

With an ever-evolving amount of tools in their arsenal, bad actors thrive on seeming legitimate.

Voice Spam

The term voice spam is the blanket term that refers to any sort of unsolicited/unwanted phone calls. Under the Voice Spam umbrella comes many forms of unwanted calls, ranging from computer generated robocalls, to potentially dangerous scam calls or phishing schemes trying to ascertain your private information.

Spoof Calls

Spoof Calling is when you receive a call from a phone number that looks similar to your area code and exchange (the first six digits of your phone number) or a caller ID displaying the name of a nearby town or local business. However, the person on the other end is neither a neighbor nor legitimate business caller. The caller is typically a spammer trying to lure you into a scam.

Vishing

Vishing attacks are directed at specific individuals and employ social engineering techniques, often in combination with spoofed caller IDs and personal information gained through other hacking attacks. They manipulate the call recipient into a false sense of trust in order to extract from them sensitive or protected information. When perpetrated on an employee (who may be particularly vulnerable when in a helpdesk, customer or tech support position), the damage could be catastrophic with prospective loss of proprietary information, financial theft, public relations fallout and costly exposure to regulatory breach.

Robocalls

Appointment reminders, flight cancellations, and other informational calls are legitimate forms of robocalls. However, illegitimate players are leveraging Voice over Internet (VoIP) technology to generate thousands of robocalls to random numbers from an auto dialer. Their messaging, at best, is intended to elicit a purchase but, in growing numbers, is designed to lure the call recipient into a scam. Scammers often employ caller ID “spoofing” to disguise their identity, replacing their source ID with one showing a familiar area code or person (neighbor spoofing), or business name (enterprise spoofing) to entice recipients to answer.

phone number spoofing

How is Voice Spam impacting you & your organization?

We have the industry’s most powerful source of truth on the topic of unwanted voice traffic,
we call it the UVT Engine and here are a few of the insights…

We have the industry’s most powerful source of truth on the topic of unwanted voice traffic, we call it the UVT Engine and here are a few of the insights…

12%

Unwanted Traffic

Prior to implementing the Mutare Voice Spam Filter, on average, 12% of Client’s Voice Network Traffic is Unwanted Traffic.

34%

CYBER THREATS

Prior to implementing the Mutare Voice Spam Filter, on average, 34% of Unwanted Traffic are potential cyber threats.

23

MINUTES/DAY

According to a UC-Irvine study, unwanted calls can create up to 23 Minutes of unproductive time per incident

Free Assessment

Get Clarity on your Voice Spam Situation

Give us your CDR data and we will run a customized, comprehensive Voice Traffic Analysis
to expose and explain what is happening within your voice network.

Give us your CDR data and we will run a customized, comprehensive Voice Traffic Analysis to expose and explain what is happening within your voice network.

About

Through Voice Traffic Analysis we will provide you with a professional multi-page report chalked full of valuable information. Through this report you will gain insight and understanding around your voice traffic and the impact of unwanted robocalls, spoof calls, vishing and voice spam.

Your CDR Data

In a perfect world, we like 6 months of your CDR data; however, we can work with as little as 30 days of data. The process is simple, pull the data (call date, call time, call duration, caller id, caller id name, call party id) save to a .csv or .xlsx and submit to Mutare.

How we do it.

We analyze your CDR data with the Mutare UVT Engine to produce a comprehensive result-set. Our Team then reviews your information and assembles a customized Voice Traffic Analysis with tremendous insights and recommendations. Then, we present the reports to you and your team via virtual meeting.

Have questions? Let us know how we can help…

Healthcare Related Articles

Healthcare: Communications in Crisis

Healthcare: Communications in Crisis

Healthcare: Communications in Crisis Hospitals are battling malicious robocalls, voice spam & vishingBy Chuck French on 1/5/21Hospitals and Healthcare Organizations are Uniquely Vulnerable to Robocalls According to a Federal Communications Commission (FCC) report...

Spoof-Proofing the Enterprise Voice Network

Spoof-Proofing the Enterprise Voice Network

Spoof-Proofing the Enterprise Voice NetworkBy Chuck French on 4/28/20If you use a telephone, there’s high probability you’ve been spoofed – that is, received a spoof call from a phone number that looks similar to your area code and exchange (the first six digits of...