Protecting yourself against call fraud and hacking is an issue we take seriously at Telnyx

Protecting yourself against call fraud and hacking is an issue we take seriously at Telnyx. That’s why we built fraud protection features into the Mission Control Portal that can help minimize your risk. Here’s a quick rundown of each setting and how to access it.
The max destination rate controls how much you’re willing to pay per minute for each outbound call. Calls to destinations with per minute rates that are higher than your max destination rate will not be allowed. You can set your max destination rate in the Outbound Profiles dashboard in the Mission Control Portal. Simply click on the gear button to the right of a profile and select advanced options. Then set the max destination rate in the advanced options window. Watch the Tutorial Video Here
Outbound whitelisting enables you to select which countries or regions are allowed for outbound calling. Outbound calls to destinations that have not been whitelisted will not be allowed. You can create your outbound whitelist from the Outbound Profiles dashboard. Just click the gear button to the right of a profile, select advanced options, then scroll down in the advanced options window to see a list of regions and countries that can be whitelisted for outbound calls. Watch the Tutorial Video Here
Your daily spend limit determines how much can be spent on outbound calls per day. A daily spend limit can be set for each connection associated with an outbound profile. Once the daily spending limit for a connection has been reached, all outbound calls on that connection will be blocked, and the account owner will receive a notification email. The daily spend limit resets each day at 00:00:00 UTC. Watch the Tutorial Video Here
These three settings protect your account against unauthorized or excessive outbound calls that eat up your budget and can stop your business from making important connections. If you’d like to learn more about setting up fraud protection or find out what else you can do in the Mission Control Portal, contact our customer success team.
What does “Twexit” mean for a brand? Twexit is the deliberate shift away from relying on X, formerly Twitter, toward owned channels you control for reach, data, and compliance. It typically involves moving audiences to email, SMS, MMS, and in-app messaging.
Why are companies considering a Twexit now? Brands are responding to volatile algorithms, brand safety concerns, and the risk of over-reliance on a single social platform. They want stable reach, measurable attribution, and first-party data they can manage under GDPR and CCPA.
What channels can replace tweets for reliable reach and engagement? Email, SMS, MMS, push, and in-app messages provide direct delivery with clear analytics. For mobile messaging, choose between SMS and MMS based on whether you need plain text or rich media like images or GIFs.
How do we migrate followers from Twitter to owned channels without losing them? Promote clear calls to action in your profile, pinned posts, and replies that drive people to opt-in forms, short codes, and QR codes. Incentives and visuals that boost click-throughs, as shown in MMS engagement guidance, can accelerate list growth.
Do tweet IDs or Twitter user IDs matter in a Twexit plan? Tweets and user IDs are platform-specific identifiers that do not carry over to other channels. Prioritize collecting consented first-party identifiers like email and phone numbers, and tag campaigns for attribution.
What content formats work best after a Twexit? Short updates, time-sensitive offers, product drops, and support notices work well, especially when paired with visuals. When you need images, GIFs, or short clips, use MMS messaging to add context and capture attention.
Should we use group MMS or broadcasts when shifting off Twitter? Use broadcasts for one-to-many announcements and updates, while reserving group threads for small collaborative discussions where participants see each other. The tradeoffs are outlined in MMS group versus broadcast guidance, including reply behavior and privacy considerations.
Related articles