{"id":148,"date":"2022-03-04T17:35:44","date_gmt":"2022-03-04T17:35:44","guid":{"rendered":"https:\/\/microtalk.co.uk\/blog\/?p=148"},"modified":"2025-07-28T07:52:35","modified_gmt":"2025-07-28T07:52:35","slug":"introducing-stir-shaken-compliance-with-microtalk","status":"publish","type":"post","link":"https:\/\/microtalk.co.uk\/blog\/introducing-stir-shaken-compliance-with-microtalk\/","title":{"rendered":"Introducing STIR\/SHAKEN Compliance with Microtalk"},"content":{"rendered":"<p>STIR\/SHAKEN is used to help defeat scammers and illegal robocalls. If you\u2019re thinking it sounds like something out of James Bond\u2019s cocktail order, you\u2019d be right as the acronyms (\u2018Secure Telephony Identity Revisited&#8217; and \u2018Signature-based Handling of Asserted Information Using Tokens\u2019) were created as a nod to the character\u2019s villain fighting skills. It may not seem like a dramatic threat, but just under 2000 robocalls are made per second. According to the FCC, these calls are the number one source of consumer complaints. So, it\u2019s good news that we\u2019ll soon be able to avoid scam call trickery and, thanks to Microtalk, your business can be one of the first in the UK to benefit.<\/p>\n<p><u>What is caller ID spoofing?<\/u><\/p>\n<p>STIR\/SHAKEN refers to a new range of protocols and procedures that are designed to stop caller ID spoofing. Most people complain about getting too many phone calls from spammers and telemarketers at work or home. These days, they\u2019re getting harder to spot. You may see a familiar number \u2014 either a local area code or a recognisable local business number or even the name of your bank \u2014 and assume the call is legitimate. However, caller ID spoofing is the act of maliciously faking the caller ID on a phone call and using this to increase the chances of the call being answered. Once the receiver picks up, they\u2019re open to any number of scams as they assume, judging by the number, the caller is either local or a trustworthy business and familiar.<\/p>\n<p>In the past, there was little to be done to stop this, but STIR\/SHAKEN ensures there are steps we can take to battle nuisance callers.<\/p>\n<p><u>How can STIR\/SHAKEN stop caller ID spoofing?<\/u><\/p>\n<p>In short, STIR provides the ability to authenticate the caller ID and SHAKEN is the set of guidelines that set out how to deal with calls that have suspicious or missing STIR information.<\/p>\n<p>To give a little more detail, STIR works by adding a\u00a0digital certificate\u00a0to the\u00a0Session Initiation Protocol\u00a0(SIP) information used to initiate and route calls via your VoIP system, for example, a call made using a <a href=\"https:\/\/microtalk.co.uk\/cloud-pbx\">Cloud PBX<\/a>. The VoIP service provider automatically examines the caller ID and compares it to the existing list of IDs that have already been provided to that customer. Then, the VoIP service provider can add the\u00a0digital certificate to the SIP information; it includes the service provider&#8217;s identity and a trust value. The VoIP software on the receiving end can check the authenticity and can decide whether to reroute any suspicious calls.<\/p>\n<p><u>What are the different trust tokens?<\/u><\/p>\n<p>The digital certificate differentiates between trusted, unsure, and untrustworthy calls with a simple ABC.<\/p>\n<p>Full (A) \u2014 This means the carrier knows the caller ID has not been spoofed. For example, the carrier is responsible for the origination of the call, it\u2019s on the list of known caller IDs as the caller has an authenticated relationship with the customer and the number used to make the call has already been verified with that ID.<\/p>\n<p>Partial (B) \u2014 This means that, although the carrier originated the call and has a relationship with the customer making the call, the carrier cannot be certain the caller ID has not been spoofed as the number used for the call may not be recognised.<\/p>\n<p>Gateway (C) \u2014 Lastly, this means the carrier isn\u2019t familiar with caller ID. It may have entered their network, but its origins are unknown.<\/p>\n<p><u>What happens as a result of the different verifications<\/u><u>?<\/u><\/p>\n<p>All calls aid Real-Time Analytics, so the system will be better placed to tell the difference between spam and real calls by the more calls received. Practice makes perfect!<\/p>\n<p>In the meantime, receivers can also be notified on the interface where they receive the call, showing if the caller ID has been verified. You can also have the B and C calls intercepted and diverted to voicemails.<\/p>\n<p><u>How can my business use STIR\/SHAKEN?<\/u><\/p>\n<p>If your business or <a href=\"https:\/\/microtalk.co.uk\/contact-center\">contact center<\/a> uses STIR\/SHAKEN, all your calls are signed based on their trust so you\u2019ll instantly improve performance, productivity and it\u2019ll result in happier workers as they will no longer be caught out by spam and robocalls multiple times per day.<\/p>\n<p>With the number of spam and robocalls on the rise, you\u2019ll be pleased to hear Microtalk is one of the only providers in the UK that offer this extra line of security. Microtalk is a US FCC licensed company, meaning we recognised the importance of this new technology early on and we\u2019re now fully compliant. To our current knowledge, we\u2019re the only carrier in the UK that is STIR\/SHAKEN compliant.<\/p>\n<p>Microtalk connects over 40 million calls a month and, being management-owned, we\u2019re dedicated to ensuring our customers get the support they need and so are constantly on the lookout for new technologies that can help your business succeed. Visit <a href=\"https:\/\/microtalk.co.uk\/\">our website<\/a> to request your trial and learn more.<\/p>\n"},"excerpt":{"rendered":"<p>STIR\/SHAKEN is used to help defeat scammers and illegal robocalls. If you\u2019re thinking it sounds like something out of James Bond\u2019s cocktail order, you\u2019d be right as the acronyms (\u2018Secure Telephony Identity Revisited&#8217; and \u2018Signature-based Handling of Asserted Information Using Tokens\u2019) were created as a nod to the character\u2019s villain fighting skills. It may not [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":151,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[145],"tags":[190,6,184,8,186,188,183,189,185,182,165,9,7,20,187],"class_list":["post-148","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-business-news","tag-8-x-8","tag-business","tag-call","tag-cloud","tag-fishing","tag-how-does-stir-shaken-works","tag-ofcom","tag-ofcom-stir-shaken","tag-regulation","tag-robocall-legislation","tag-stir-shaken","tag-telephony","tag-uk","tag-voip","tag-what-is-stir-shaken"],"_links":{"self":[{"href":"https:\/\/microtalk.co.uk\/blog\/wp-json\/wp\/v2\/posts\/148","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/microtalk.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/microtalk.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/microtalk.co.uk\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/microtalk.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=148"}],"version-history":[{"count":6,"href":"https:\/\/microtalk.co.uk\/blog\/wp-json\/wp\/v2\/posts\/148\/revisions"}],"predecessor-version":[{"id":588,"href":"https:\/\/microtalk.co.uk\/blog\/wp-json\/wp\/v2\/posts\/148\/revisions\/588"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/microtalk.co.uk\/blog\/wp-json\/wp\/v2\/media\/151"}],"wp:attachment":[{"href":"https:\/\/microtalk.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=148"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/microtalk.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=148"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/microtalk.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=148"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}