Blogs

Cybersecurity is it worth it?

Business cybersecurity stands as both protector and barrier. Though it shields our systems, data and reputations from harm, it can also introduce friction. This comes in technical, operational and financial aspects. It’s not uncommon for businesses to wrestle with the...

Gamma get Cisco Webex

The best business VoIP system in the UK just got better.  Gamma get Cisco Webex!  Here's what you need to know. Gamma Horizon was already one of the most popular cloud-based hosted phone systems in the UK with millions of users. It’s reliable, feature-packed, and can...

Top 11 Ways Companies Get Hacked

Over the past year, we’ve seen a dramatic shift in how data breaches unfold. It’s no longer just about high-tech exploits or complex malware. Often, it comes down to old access privileges, overlooked updates, or one unsuspecting click. At MF Telecom Services, we’ve...

Cisco Webex for Horizon App User Guide

Welcome to the Cisco Webex for Horizon App User Guide! This guide provides step-by-step instructions to help you set up and use the Webex by Cisco application on your Computer and iOS or Android device. With this new Gamma Horizon app, you can make and receive calls,...

MFTS has moved

Our new office!MFTS has moved head office and we finally have our new premises ready in Hildenborough.  We will be officially opening our new office on Monday the 4th of November. Though we split from parent company, MF Communications, in 2016, we have continued to...

How to setup RDP from Mac to Windows

Looking to establish a remote desktop connection from your Mac to a Windows machine? You're in the right place!  This is your free guide on how to setup RDP from MAC to Windows. In this article, we will guide you through the process step-by-step, making it easy for...

How to password protect a document on word

You are able to protect access to sensitive files within Microsoft Word.  Here is your free guide on how to password protect a document on word.1. Open the Word document that you would like to password protect. Click on File > Save As2. Depending upon where you...

How to Setup Microsoft Authenticator App for MFA

Please see below a simple guide showing how to setup Microsoft authenticator app for MFA for a Work or School account.1. Login to office.com on a web browser, and enter your email and password provided to you. You will come across this window below. Click on Next.2....

AI Cyber Attacks

Business AI Cyber Attacks Explained: While Artificial Intelligence accelerates innovation across multiple sectors in business and for personal use, it also poses some significant risks.  Especially as it relates to becoming a tool for exploitation by cyber criminals. ...

Outsourcing IT Support in London

Unlocking the Benefits of Outsourcing IT Support in London Are you a small business owner in London, navigating the complexities of managing your IT needs? Whether you're an entrepreneur starting a new venture or a seasoned business owner, handling IT tasks can be...

All Blog Posts

Panasonic to close Business Communications arm

In a recent statement Japanese-owned, Panasonic announced its decision to close the business communications arm of its operation. The reason given for this closure was the increase in demand for cloud-based solutions.Feeling as though it was lagging behind its...

read more

Could your business benefit from consolidating its suppliers?

The majority of small business owners believe their company would perform better with a smaller number of suppliers.  Many SMEs have already begun bundling their communications services such as phone and broadband with one supplier. This includes those looking for...

read more

Work From Anywhere Solutions

For businesses to survive, and continue to operate throughout this pandemic, they have needed to adapt and change. We have been here, since before, and for the duration of this time, offering Work From Anywhere Solutions and support to help businesses manage these...

read more

Transition planning for businesses

Right now, businesses are having to adapt to change like never before. That’s why a transition plan is essential to be able to plan and manage the changes necessary to keep your business flowing. Whatever the transition, moving from one mode of operation to another...

read more

Cloud Services for Agile Business

Introduction:Cloud Services for agile business have become an everyday necessity, particularly since COVID-19 when many businesses adapted to working remotely. Cloud Service adoption has increased hugely since, and businesses have become very reliant on it. According...

read more

Efficiency within the workplace with Horizon Collaborate

Horizon Collaborate is a hosted PBX with full telephony features. Whether you wish to collaborate more efficiently within your organisation or externally with your customers, Horizon can help. In essence, it offers a fully unified ICT environment with all the benefits...

read more

Don’t ignore the continued threat of Toll Fraud

According to a Communications Fraud Control Association (CCFRA) survey, fraud loss costs an estimated $28.3 Billion USD a year. This is 1.74% of total revenues.  Including Toll Fraud. The Top five fraud methods are: Subscription Fraud (Application), Payment Fraud, PBX...

read more

Leasing hardware – who wins?

Leasing hardware, for IT or Telecoms infrastructure, is a fantastic way to reduce the capital outlay for your business. For a small business wishing to upgrade their IT/Telecoms infrastructure or any other hardware requirement, the cost can easily run into the tens of...

read more
Share on:
Loading...