What do we mean by unwanted phone activity?
As a business, you rely on phone calls to stay connected with customers, partners, and colleagues. But not every call is welcome.
Unwanted phone activity comes in many forms. Sometimes it's spam — irrelevant robocalls or aggressive sales calls that waste your team’s time. In more serious cases, it’s fraud — deceptive callers who try to scam you, impersonate your company, or mislead your employees. And behind the scenes, there are network threats like system abuse, call floods, or unauthorized access to your phone infrastructure.
Spam – repeated, irrelevant, or unwanted calls
Spam calls are unwanted phone calls that are often automated, persistent, or irrelevant to your business. These can include robocalls, aggressive telemarketing, or calls from unfamiliar numbers. While not always illegal, phone spam can disrupt your workday, distract your team, and reduce trust in phone communication.
Fraud – Calls that intentionally mislead or scam
Fraudulent calls are more than just a nuisance — they are intentional attempts to mislead. Scammers may impersonate trusted companies, use spoofed phone numbers, or pressure individuals into revealing confidential information. These calls can lead to financial loss, data breaches, or reputational harm.
If you believe a phone number associated with Voys is being used for fraudulent calls, please report it to us immediately. We also recommend contacting your local police or fraud helpdesk for guidance on how to proceed.
Purpose | Link |
🇳🇱 Report a company for unwanted calls | |
🇳🇱 Register your phone number to reduce cold calls | |
🇳🇱 Contact the police if you have been a victim of fraud | |
🇩🇪 Report a company for unwanted calls | |
🇦🇹 Report a company for unwanted calls |
Network Risk – protecting your own network and equipment
Even with a secure phone system on our side, your business remains vulnerable if your internal network and equipment are not protected. Network risks include unauthorized access to devices, misconfigured routers or firewalls, and insecure call forwarding settings. These vulnerabilities can be exploited to reroute calls, inflate costs, or disrupt your phone service.