Blogs

How to Avoid Being Phished – Your Essential Guide

Phishing scams are among the oldest and most effective ways cybercriminals attack. So we have produced a free guide on "How to Avoid Being Phished".  These cyber scams trick users into giving away sensitive information such as passwords, credit card details, or login...

Cybersecurity is it worth it?

Business cybersecurity stands as both protector and barrier. Though it shields our systems, data and reputations from harm, it can also introduce friction. This comes in technical, operational and financial aspects. It’s not uncommon for businesses to wrestle with the...

Gamma get Cisco Webex

The best business VoIP system in the UK just got better.  Gamma get Cisco Webex!  Here's what you need to know. Gamma Horizon was already one of the most popular cloud-based hosted phone systems in the UK with millions of users. It’s reliable, feature-packed, and can...

Top 11 Ways Companies Get Hacked

Over the past year, we’ve seen a dramatic shift in how data breaches unfold. It’s no longer just about high-tech exploits or complex malware. Often, it comes down to old access privileges, overlooked updates, or one unsuspecting click. At MF Telecom Services, we’ve...

Cisco Webex for Horizon App User Guide

Welcome to the Cisco Webex for Horizon App User Guide! This guide provides step-by-step instructions to help you set up and use the Webex by Cisco application on your Computer and iOS or Android device. With this new Gamma Horizon app, you can make and receive calls,...

MFTS has moved

Our new office!MFTS has moved head office and we finally have our new premises ready in Hildenborough.  We will be officially opening our new office on Monday the 4th of November. Though we split from parent company, MF Communications, in 2016, we have continued to...

How to setup RDP from Mac to Windows

Looking to establish a remote desktop connection from your Mac to a Windows machine? You're in the right place!  This is your free guide on how to setup RDP from MAC to Windows. In this article, we will guide you through the process step-by-step, making it easy for...

How to password protect a document on word

You are able to protect access to sensitive files within Microsoft Word.  Here is your free guide on how to password protect a document on word.1. Open the Word document that you would like to password protect. Click on File > Save As2. Depending upon where you...

How to Setup Microsoft Authenticator App for MFA

Please see below a simple guide showing how to setup Microsoft authenticator app for MFA for a Work or School account.1. Login to office.com on a web browser, and enter your email and password provided to you. You will come across this window below. Click on Next.2....

AI Cyber Attacks

Business AI Cyber Attacks Explained: While Artificial Intelligence accelerates innovation across multiple sectors in business and for personal use, it also poses some significant risks.  Especially as it relates to becoming a tool for exploitation by cyber criminals. ...

All Blog Posts

Alcatel Lucent 4018EE phones

The Alcatel-Lucent IP Touch 4018 Extended Edition (EE) phones are cost-effective, entry-level desk phones with integrated IP connectivity. Basic telephony features such as programmable soft keys, voicemail, speaker and hands free dialling allow configuration of the...

read more

Are you looking to upgrade your business phone system?

Are you looking to upgrade your business phones system? Do you have a system you no longer need? MF Telecom Services buys used, surplus or redundant business telecoms equipment. All models are considered and you can even part exchange your old system for a new one....

read more

Telephone system maintenance – don’t ignore it

What would you do if your telephone system stopped working? A reliable telephone system is the backbone of many businesses. Prolonged failure can be catastrophic. If your telephone system goes offline and you can't contact your customers, they won't be able to contact...

read more

How to deal with phone call scammers

Scammers are phoning up consumers, pretending to be calling from BT or Talk Talk It seems scammers are becoming increasingly clever in the way they trick consumers into downloading unsolicited links, or giving away personal information. Pretending to be from a highly...

read more

VoLTE – sending voice calls over high speed data networks

Mobile use is changing thanks to a new way of making calls. It's called VoLTE (voice over LTE) and promises faster connections, clearer audio and better service. VoLTE involves sending calls over high-speed data networks, rather than through a dedicated voice channel...

read more

What to do about IT and telecoms services when relocating

Moving offices takes a lot of organisation and when you're relocating, you want to be up and running as soon as possible, with minimum disruption to your business.  So you need to find a supplier you can trust with your IT and telecoms services when relocating. One of...

read more

Telecoms giant, Avaya files for bankruptcy

On Jan 19, Avaya made an agreement with creditors to restructure its debt after the telecoms giant filed for bankruptcy under chapter 11 of the United States Bankruptcy code. The Santa Clara, California-based company has been burdened by debt stemming from an $8.2...

read more

Phone system hacking – are you prepared?

Any business with a phone system, whether big or small, can be targeted by hackers. Unfortunately, through lack of publicity, many businesses are still unaware of the dangers and the risks. Criminals hijacked the phone system of a charity in Benwell, Newcastle, to...

read more
Share on:
Loading...