Feeds

Telco sets honey pot for nuisance marketers

Call centre spivs get dose of their own medicine

Choosing a cloud hosting partner with confidence

A small telco has decided to turn the tables on irritating unsolicited calls by setting up a block of dummy phone numbers that play messages to trick marketers into lenghty and pointless sales pitches.

The wheeze is the work of Andrews and Arnold (AAISP), a small business provider, and was prompted by a deluge of unsolicited calls to its office lines over the past month.

The firm has reserved a block of four million VoIP lines for the prank. All are registered with the Telephone Preference Service, so any unsolicited marketing calls they get are likely to be the result of illegal use of autodialler software.

AAISP has adapted its anonymous call reject service so customers can use the honey pot message too. Today it kept one marketer punting "free calls" on the line for more than three and a half minutes.

The firm's boss has posted a recording of the call on his blog. The marketer is told the message is a recording and that she has called a honey pot line about one minute in, but stays on the line for a further two and a half minutes. ®

Intelligent flash storage arrays

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
10 ways wire data helps conquer IT complexity
IT teams can automatically detect problems across the IT environment, spot data theft, select unique pieces of transaction payloads to send to a data source, and more.