UK Business Guide to Blocking Scam Calls From BT in 2026
It’s a scenario we see all too often: a call comes in, the caller ID says "BT," and the person on the other end creates a sense of instant panic. "Your line is about to be disconnected." For a busy UK business, that threat is enough to make anyone stop what they're doing.
These aren't just nuisance calls; they're calculated attacks on your business's finances and operations. The key is training your team to spot the fraud before the damage is done.
Why BT Impersonation Scams Are Targeting Your Business
Criminals have realised that businesses, especially professional services firms and SMEs, are high-value targets. Why? The potential payday is simply much larger than scamming an individual, and the disruption caused can be far more significant.
A single successful scam can net fraudsters thousands of pounds in fake payments and cause chaos for your business. We're talking about direct financial loss, but also the knock-on effects: data breaches, critical systems being down while you investigate, and the reputational hit if client data is exposed. For a legal practice or accountancy firm, such a breach can be catastrophic.
Common Scam Scripts and Red Flags
Scammers aren't usually creative geniuses; they rely on a handful of tested scripts designed to provoke panic. They know that threatening your phone or internet connection is the fastest way to get your undivided attention.
Here are a few of the classic plays we see time and time again:
- The 'Digital Voice' Switchover Ploy: Fraudsters invent an urgent deadline for the Digital Voice migration, claiming you'll be cut off unless you immediately pay for new equipment or "authorise" the switch. For example, they might call a marketing agency and claim their "enhanced fibre" order has been corrupted and requires an immediate £500 payment to secure their new connection date.
- Fake Billing Emergencies: You get a call about a supposedly "unpaid" bill, with threats of immediate disconnection unless you pay over the phone right there and then. A common tactic is to call a busy medical practice on a Monday morning, claiming a direct debit has failed and services will be cut in an hour, hoping the receptionist pays quickly to avoid disruption.
- Bogus Technical Support: The caller claims they've detected a virus on your network or a fault on your line. Their goal is to get you to grant them remote access to a computer, which is their route to stealing data or installing malware. For instance, they might tell a financial advisor they have "detected suspicious traffic" from their IP address and need to run a "security scan" immediately.
These tactics have become more sophisticated, especially with the real-world migration from the old copper network (PSTN) to IP-based Digital Voice. Scammers cleverly exploited the genuine switch, with a wave of calls citing a fake ‘January 2025 deadline’ to pressure businesses.
With UK fraudsters stealing a staggering £1.17 billion in 2023, and BT impersonation scams being one of the most common threats, the scale of this problem is immense.
Expert Insight: A scammer's primary weapon is psychological pressure. They invent a crisis to stop you from thinking clearly. The very moment a "BT" caller makes you feel rushed, threatened, or panicked, that should be your number one red flag.
Criminals also use technical tricks like understanding suspected spoofed DIDs to make their incoming call look like it’s genuinely from BT. This is why caller ID cannot be trusted. Your team must learn to rely on the caller's behaviour, not what the screen says.
To help your staff tell the difference in the heat of the moment, we’ve put together this simple comparison.
Recognising a BT Scam Call vs a Legitimate Call
This quick-reference table is designed to help any employee spot the tell-tale signs of a scam versus a genuine call from BT.
| Indicator | Typical Scam Call (Red Flag) | Legitimate BT Communication (Green Flag) |
|---|---|---|
| Sense of Urgency | Creates extreme pressure, demanding immediate action or payment to avoid a penalty like service disconnection. | Communicates information clearly and gives you time to review it. Will not pressure you into immediate on-the-spot decisions. |
| Request for Info | Asks for full bank details, passwords, PINs, or remote access to your computer over the phone. | Will never ask for your full password or banking PINs. Verification is done through partial information you provide. |
| Method of Contact | Often an unsolicited call about a problem you were unaware of. The number may be withheld or appear unusual. | Will refer to existing tickets or account details. Information is primarily managed through your official online 'My BT' account. |
| Caller's Tone | Can be evasive, aggressive, or overly threatening when questioned. Discourages you from hanging up to verify. | Professional, patient, and willing to provide a reference number for you to quote when you call back on an official number. |
Ultimately, if a call feels 'off,' it probably is. The best defence is to empower your staff to trust their instincts, hang up, and verify the information independently.
What to Do the Moment You Suspect a Scam Call
It’s a feeling we’ve all had. That slight hesitation when a caller, supposedly from BT, asks for something that just doesn’t feel right. That single moment is critical. How your team responds can be the difference between a near-miss and a costly security breach.
The goal is to equip your staff with a clear, confident protocol. This isn't about being rude; it's about being secure. The first and most important rule is simple: if you feel pressured, end the conversation. A genuine BT representative will never penalise you for taking security precautions.
Initial Call Handling and Verification
As soon as a call feels suspicious, the only objective is to get off the phone safely and verify the caller's claim through official channels. There’s no need to argue or give the scammer a piece of your mind. All your team needs is a simple, firm script.
For instance, if a caller demands remote access to fix a so-called "problem," your employee’s response should be polite but absolute:
"Thank you. As a matter of company policy, we do not grant remote access or confirm any details on unsolicited calls. I will pass this on to our IT department to verify with our BT account manager directly."
This statement is powerful. It shuts down the conversation, frames the refusal as a standard security policy (which is hard to argue with), and puts your company back in control. Scammers thrive on creating panic and keeping you on the line. A script like this takes away their power.
Let's look at how this plays out in a real-world situation we see all too often.
Scenario: The Disconnection Threat
Imagine an accounting firm in Dorset gets a call. The caller ID has been spoofed to say 'BT'. An agent claims the firm's broadband will be cut off in the next hour due to a £480 missed payment. The pressure is on.
Here’s what a well-trained receptionist does:
- She does not get drawn into a debate about billing or confirm any account information.
- She calmly states, "I understand. I will pass this to our accounts team, who will check it with BT through our own records. Thank you."
- She hangs up. No waiting for a response, no further discussion.
- Crucially, she does not call back any number the scammer provided. She finds BT’s official business support number from a recent invoice or by logging into the firm’s ‘My BT’ online portal.
- A quick call to the genuine BT support team confirms the account is fully paid. The threat was a complete fabrication.
This simple, repeatable process transforms a high-stakes panic situation into a routine security check, completely neutralising the threat.
The infographic below shows the typical playbook these criminals use, from the urgent hook to the final, devastating financial loss.

This methodical approach is alarmingly effective, contributing to the staggering £1.17 billion that UK fraudsters managed to steal in 2023 alone.
Logging and Internal Reporting
Once the immediate danger has passed, do not just move on. The next step is to log the incident internally. This is not just box-ticking; it’s a crucial part of your company's intelligence gathering and ongoing defence.
A simple, shared log—a spreadsheet will do—should be used to capture key details about every suspected scam call.
Make sure to record:
- Date and Time: Essential for spotting patterns.
- Number Displayed: Even though it’s likely spoofed, this data can sometimes be useful.
- Scammer's Story: A quick summary of their script (e.g., 'Digital Voice switchover issue', 'unpaid bill threat', 'router security flaw').
- Action Taken: Simply note that the call was terminated and no information was shared.
Over time, this log becomes an invaluable resource. You might notice calls cluster at certain times of the day or that scammers are recycling a particular story. This insight allows you to refine your team’s training and keep everyone alert to the latest tactics being deployed against your business.
Fortifying Your Business Phone System Against Scams
While well-trained staff are your first and best line of defence, technology provides the crucial second layer. It is one thing to teach your team to spot the psychological tricks scammers use, but it is another to stop those calls from ever reaching them in the first place. By hardening your telephony infrastructure, you can cut through the noise of daily scam attempts and free up your people to focus on genuine business.
Drawing on our years of experience with modern Voice over IP (VoIP) systems like 3CX, we know how to implement powerful rules that automatically screen and manage incoming calls. This is not just about blocking a number here and there; it’s about building intelligent policies that spot and neutralise suspicious patterns before they disrupt your day.

Creating Technical Barriers to Scammers
Modern phone systems are packed with features that can be configured to your advantage. Instead of leaving the door wide open to every caller, you can set up rules that automatically screen for common scammer tactics, taking the pressure off your front-line staff.
Here are a few practical steps we often implement for our professional services clients:
- Block Hidden Numbers: Scammers love to hide their caller ID. A simple but effective rule can be set up to automatically route any call from a withheld or anonymous number straight to a dedicated voicemail box or play an announcement explaining you do not accept them.
- Flag Suspicious International Calls: If your business primarily operates within the UK, why are you getting calls from obscure international prefixes? We can configure your system to flag or divert these calls, perhaps sending them to a low-priority queue or prompting the caller to identify themselves.
- Build a Centralised Blocklist: When you identify a scam number, do not just let one person ignore it. Your phone system administrator should add it to a central blocklist. Once it is on there, it can never bother anyone in your company again.
A Real-World Example: We work with a Dorset-based accounting firm that was being plagued by nuisance calls. We tweaked their 3CX system with a single rule: any call with a hidden ID gets a pre-recorded message saying, "We do not accept calls from withheld numbers. Please redial with your caller ID enabled." This one change cut their nuisance calls by over 50% overnight.
Leveraging Provider-Level Protection
The fight against scammers extends beyond your own office walls. As more businesses move to VoIP, technologies like SIP trunking are allowing telephony providers to offer network-level filtering that is more powerful than ever. These services can spot and shut down large-scale spam campaigns in real time by analysing call patterns across their entire network.
BT’s own initiatives show just how effective this can be. In the first four months after its May 2024 launch, their Enhanced Call Protect service for Digital Voice blocked over 2.4 million scam calls and flagged another 17.7 million spam calls. Given that UK residents were receiving an average of three spam calls per month in the first half of 2024, these network-level defences are no longer a luxury—they are essential. As you can read in the BT newsroom, this technology is already making a real difference.
Advanced Call Routing and Filtering
For businesses that need an even tighter lockdown, advanced call routing offers more granular control. It might sound basic, but an Interactive Voice Response (IVR) menu—that familiar "press 1 for sales, press 2 for support" system—can be an incredibly effective scam filter.
Why? Most of the automated dialling systems that scammers use are not sophisticated enough to navigate these menus. Forcing a caller to make a simple choice is often enough to make their robocaller hang up.
Here’s a simple but effective structure:
- Greeting: Start with a professional welcome message.
- Screening Prompt: Follow with, "To speak with a member of our team, please press 1."
- Routing: Legitimate callers press 1 and get through. The automated diallers usually fail at this point and disconnect.
Think of it as a simple Turing test for your phone lines, filtering out basic robocalls so your team only has to handle calls from real people. When you combine this with a well-kept blocklist and smart rules for handling anonymous callers, you create a formidable barrier against the daily barrage of scam calls. This proactive approach keeps your phone lines open for what really matters: your clients.
How to Report Scam Calls and Help Shut Down Fraud Networks
When you spot a scam call, your first instinct is to hang up. That’s a good start, but it only protects you for a moment. To really fight back, you need to report it.
Taking that extra step does more than just protect your own business. It feeds vital intelligence to the authorities who are working to dismantle the very networks these criminals rely on. Think of it this way: hanging up stops one call, but reporting it helps stop thousands.
Getting Your Evidence in Order
Before you fire off a report, it pays to have your facts straight. A vague "I got a scam call" report is unfortunately easy to ignore. A detailed one, however, is a powerful piece of evidence.
Make it a habit for you and your team to jot down the specifics right away. To build an effective report, you will need:
- Date and Time of the Call: Pinpoint accuracy helps authorities connect the dots between different incidents.
- The Number on Your Display: It’s probably spoofed, but it is still a crucial data point. Log the exact number.
- The Scammer’s Story: What did they want? A fake BT ‘Digital Voice’ issue, a problem with your bill, or an urgent technical support matter?
- Any Names or IDs Given: Scammers love to use fake names and reference numbers to sound official. Note them down.
- Their Specific Demands: Did they push for remote access, ask for payment details, or try to get personal information? This helps classify the fraud.
Keeping a clear log is not just for reporting. It is a cornerstone of good security practice. This kind of structured approach is fundamental to a formal incident response plan, which can bring clarity when things get chaotic.
Who to Report Scam Calls To
Knowing where to send your report is half the battle. Each organisation has a specific role, and sending your information to the right place ensures it gets looked at by the people who can act on it.
1. Tell BT Directly
BT takes brand impersonation very seriously. When you report a scammer pretending to be them, you’re helping BT’s own security teams track these fraudsters and warn other customers.
- When to report: Any time someone calls claiming to be from BT and your gut tells you it’s a scam.
- How to report: Use the ‘Scams and phishing’ form on the official BT website. It’s designed to get the information straight to their security experts.
2. File a Report with Action Fraud
Action Fraud is the UK’s national reporting centre for all fraud and cybercrime. A report here feeds into the national crime database, contributing to a bigger intelligence picture.
- When to report: Always report if your business has lost money. You should also report significant attempts where no money was lost, especially if the scammer had specific details about your business.
- How to report: You can file a report on the Action Fraud website. The detailed log you made earlier will make this process much faster.
3. Inform the ICO (Information Commissioner's Office)
If you are being bombarded with repeated unwanted calls, the ICO is the authority to turn to. They focus on nuisance communications and protecting your privacy.
- When to report: When you’re dealing with persistent nuisance calls or if it feels like your business number has been added to a spam list.
- How to report: The ICO provides a straightforward online tool for reporting nuisance calls and messages.
Key Takeaway: Your report is never just a single data point. It’s a piece of a national puzzle. When combined with thousands of others, it helps law enforcement and security services identify the infrastructure criminals use, shut down their phone numbers, and disrupt their financial networks. Every report matters.
Training Your Team to Be a Human Firewall
Technical controls are an absolute must, but they only go so far. When it comes to stopping scam calls from BT, your most effective and adaptable defence is your own team. Scammers are masters of social engineering, using psychology to talk their way past even the most sophisticated security systems. That’s why building a continuous security awareness programme is not just a good idea; it is a core business function.
Your goal is to turn every employee into a vigilant gatekeeper—what we in the industry call a "human firewall".
A quick training session during someone's first week simply will not cut it. Scammers are constantly changing their scripts and tactics, so your team's knowledge has to keep pace. This is about making security a shared, daily responsibility, not an annual box-ticking exercise. It is about embedding vigilance right into your company culture.

Developing an Ongoing Awareness Programme
An effective programme is built on regular, engaging, and relevant training. Forget dry presentations and dusty PDF documents. People learn best from real-world examples and practical conversations that relate directly to what they do every day.
Here’s what a successful training framework looks like in practice:
- Scenario-Based Training: Do not just give abstract warnings. Walk your team through concrete examples, like a fraudster posing as a BT engineer who claims they need remote access to "fix" a broadband issue. Actually role-playing these scenarios helps staff build the muscle memory to respond correctly under pressure.
- Regular Security Touchpoints: It does not have to be a huge production. Dedicate just five minutes in your weekly team meetings to discuss any suspicious calls or emails that came in. This keeps security front-of-mind and makes it a normal topic of conversation.
- Immediate Internal Alerts: As soon as you spot a new scam tactic—maybe a new script about billing problems or a router upgrade—send out a quick internal alert. This kind of real-time intelligence is incredibly valuable.
The threat from BT impersonation scams is a persistent headache for UK businesses. We see it all the time: scammers call claiming there are broadband problems or unpaid bills, creating a false sense of urgency. For professional services firms like accountants or care providers, the stakes are even higher. Falling for one of these cons could lead to serious data breaches and even regulatory penalties. With recent data showing 28% of all unknown calls in the UK are spam, the sheer volume of these attacks is staggering.
Making Security Part of Your Culture
Real security awareness is achieved when your team feels empowered and responsible, not afraid of making a mistake. You want to create an environment where any employee feels completely comfortable saying, "I’m not sure about this call, so I’m going to hang up and check," without worrying they will appear unhelpful.
Our Approach: At SES Computers, we advise clients to make "verify, then trust" a company mantra. It means every unsolicited request for payment, access, or information is treated with healthy scepticism until it’s independently confirmed through an official channel you trust.
This cultural shift starts from the top. When managers openly discuss security alerts and praise staff for correctly spotting a scam attempt, it sends a clear message that vigilance is a valued part of the job. A strong training programme is not just a series of lessons; it is about building a collective defence. You can discover more about building a robust defence with our guidance on IT security awareness training.
Practical Training Ideas for Your Business
To keep that human firewall strong, weave security awareness into your daily operations. Here are a few practical, low-effort ideas that deliver great results.
- Create a Scam Log: Set up a simple, shared document where staff can log details of any suspicious calls or emails. Reviewing this log together can reveal patterns and give everyone a heads-up on the latest tactics being used against your company.
- "Catch of the Week": Acknowledge and celebrate employees who spot and report a scam. A small bit of recognition in a team meeting or a company-wide email goes a long way in encouraging everyone to stay alert.
- Simulated Phishing Tests: With professional help, running controlled phishing simulations is a fantastic way to see how your team responds in a safe environment. These tests provide powerful, non-punitive learning opportunities that really stick.
By putting these strategies into play, you move from a passive defence to an active one. Your team truly becomes your greatest security asset, ready to stop threats that technology alone might miss.
A Multi-Layered Defence Strategy Against Telephony Fraud
Tackling telephony fraud effectively is not about finding one magic bullet. It’s about building a smart, multi-layered strategy that protects your business from all angles. We’ve already talked about the immediate tactics for handling a suspicious call, the technical fixes you can apply, and the importance of staff training. Now, let’s pull it all together.
Think of it this way: a truly secure business does not just react to threats—it anticipates them. This is where a managed approach comes in, turning a simple checklist of security tasks into a cohesive and resilient shield. At SES Computers, we spend our days building these layered defences for businesses across Dorset, Somerset, Wiltshire, and Hampshire, ensuring their systems are tough from the inside out.
Weaving Technology and Service into a Security Fabric
An effective defence is one where every component works in harmony. When we partner with a business, our goal is not to just install some new software. It is to integrate solutions that create a protective fabric around your entire operation.
Here’s what that looks like in practice:
- A Secure Internet Foundation: Everything starts with your internet connection. Our managed internet solutions, from superfast broadband to dedicated leased lines, are not just about speed. They are constantly monitored to ensure stability and, crucially, to secure the main entry point to your network.
- Managed 3CX VoIP Systems: Your phone system should be one of your best defensive assets, not a liability. We proactively configure your 3CX system with custom call-blocking rules, automatically filter out anonymous callers, and implement clever IVR menus that stop automated robocallers long before they can bother your team.
- Proactive Network Monitoring: Our 24/7 monitoring services are your digital watchtower. We are constantly looking for tell-tale signs of trouble, like unusual call patterns or potential intrusions. This allows us to neutralise threats, often before you even know they exist.
When these elements are managed under one roof, the effect is multiplied. An alert from the network can instantly trigger a new blocking rule on the phone system. Insights from the types of calls being blocked can then directly inform your next staff training session. It becomes a living, breathing security system.
From Reactive Fixes to Proactive Defence
All too often, we see businesses stuck in a reactive cycle—only dealing with a security issue after it has already caused disruption and stress. Our entire philosophy is built on flipping that model on its head. We work in the background, constantly hardening your defences against the next wave of threats.
This proactive stance is a continuous effort:
- Initial System Hardening: From day one, any 3CX system we deploy is configured with security best practices to minimise your exposure to common attacks right out of the gate.
- Ongoing Threat Management: This is not a "set it and forget it" service. We are actively managing blocklists, applying critical system updates, and adjusting call filters based on the latest intelligence on active scam campaigns.
- Expert Support and Guidance: When a sophisticated threat does get through—and sometimes they do—your team has a direct line to our local experts. We know your specific setup and can provide immediate, practical advice to shut it down.
Building a strong internal culture of security is just as important as the technology itself. For a deeper look at establishing company-wide safeguards, A Comprehensive Guide to Fraud Prevention and Risk Management for Businesses offers some excellent frameworks.
Partnering with a local IT expert means you have someone who not only understands the technology but also understands your business and the regional threat landscape. This transforms cybersecurity from an abstract concern into a managed, confident reality.
By combining managed VoIP, secure internet, and proactive monitoring, we create a formidable barrier. This approach does not just stop scam calls from BT; it builds a foundation of operational resilience that lets you focus on running your business.
Your business deserves a security strategy that is as serious and professional as you are. SES Computers provides the expertise and local support to build that defence. Schedule a complimentary security consultation with us today, and let's turn your vulnerabilities into strengths. Find out more at https://www.sescomputers.com.