There has been a lot of talk about STIR/SHAKEN in the news lately, but what is this strange system? The answer is actually less complicated then it seems. Essentially, STIR/SHAKEN is a system developed to help combat criminal robocalls and caller ID spoofing. Still confused? Let's start at the beginning.
Currently, scammers can change the number they're using to call with to make it appear as if someone friendly is calling. This is called spoofing. This kind of scam is highly illegal and is used to steal information and money (for example, a caller may impersonate a tax agency representative in order to steal your tax refund).
What STIR/SHAKEN does is validate phone calls as they travel through the phone networks, which allows phone companies and consumers to be sure the call they're receiving is from legitimately from the person making it.
When a call begins on a network, the service provider uses the STIR tech to create a SIP Identity Header. This includes information such as date, time and phone numbers involved. Most importantly, it includes an attestation level which is a level of confidence indicator. There are 3 levels of attestation based on the level of verification the company is able to achieve.
Overall, STIR / SHAKEN helps everyone by making our phone lines a safer and more authentic form of communication.
We engaged The Computer Geeks in mid-2023 as they have a reputation for API integration within the T . . . [MORE].
We all have been VERY pleased with Adrian's vigilance in monitoring the website and his quick and su . . . [MORE].
FIVE STARS + It's true, this is the place to go for your web site needs. In my case, Justin fixed my . . . [MORE].
We reached out to Rich and his team at Computer Geek in July 2021. We were in desperate need of help . . . [MORE].
Just to say thank you for all the hard work. I can't express enough how great it's been to send proj . . . [MORE].
I would certainly like to recommend that anyone pursing maintenance for a website to contact The Com . . . [MORE].
Top Cybersecurity Threats
How to Conduct a Successf
The Future of E-Learning: