Blogs

Top 11 Ways Companies Get Hacked

Over the past year, we’ve seen a dramatic shift in how data breaches unfold. It’s no longer just about high-tech exploits or complex malware. Often, it comes down to old access privileges, overlooked updates, or one unsuspecting click. At MF Telecom Services, we’ve...

Cisco Webex for Horizon App User Guide

Welcome to the Cisco Webex for Horizon App User Guide! This guide provides step-by-step instructions to help you set up and use the Webex by Cisco application on your Computer and iOS or Android device. With this new Gamma Horizon app, you can make and receive calls,...

MFTS has moved

Our new office!MFTS has moved head office and we finally have our new premises ready in Hildenborough.  We will be officially opening our new office on Monday the 4th of November. Though we split from parent company, MF Communications, in 2016, we have continued to...

How to setup RDP from Mac to Windows

Looking to establish a remote desktop connection from your Mac to a Windows machine? You're in the right place!  This is your free guide on how to setup RDP from MAC to Windows. In this article, we will guide you through the process step-by-step, making it easy for...

How to password protect a document on word

You are able to protect access to sensitive files within Microsoft Word.  Here is your free guide on how to password protect a document on word.1. Open the Word document that you would like to password protect. Click on File > Save As2. Depending upon where you...

How to Setup Microsoft Authenticator App for MFA

Please see below a simple guide showing how to setup Microsoft authenticator app for MFA for a Work or School account.1. Login to office.com on a web browser, and enter your email and password provided to you. You will come across this window below. Click on Next.2....

AI Cyber Attacks

Business AI Cyber Attacks Explained: While Artificial Intelligence accelerates innovation across multiple sectors in business and for personal use, it also poses some significant risks.  Especially as it relates to becoming a tool for exploitation by cyber criminals. ...

Outsourcing IT Support in London

Unlocking the Benefits of Outsourcing IT Support in London Are you a small business owner in London, navigating the complexities of managing your IT needs? Whether you're an entrepreneur starting a new venture or a seasoned business owner, handling IT tasks can be...

Modern Phone Systems for Schools: The Benefits

When it comes to managing and streamlining operations in schools, efficient communication is key. Traditional phone systems can often be cumbersome and outdated, leading to unnecessary delays and disruptions. However, modern phone systems for schools offer a range of...

The Ultimate Guide to Finding Reliable IT Support in Kent

Businesses of all sizes rely heavily on technology to streamline their operations and stay competitive. However, with the increasing complexity of IT systems and the constant threat of cyberattacks, having reliable IT support in Kent has become an absolute necessity....

All Blog Posts

Telephone system maintenance – don’t ignore it

What would you do if your telephone system stopped working? A reliable telephone system is the backbone of many businesses. Prolonged failure can be catastrophic. If your telephone system goes offline and you can't contact your customers, they won't be able to contact...

read more

How to deal with phone call scammers

Scammers are phoning up consumers, pretending to be calling from BT or Talk Talk It seems scammers are becoming increasingly clever in the way they trick consumers into downloading unsolicited links, or giving away personal information. Pretending to be from a highly...

read more

VoLTE – sending voice calls over high speed data networks

Mobile use is changing thanks to a new way of making calls. It's called VoLTE (voice over LTE) and promises faster connections, clearer audio and better service. VoLTE involves sending calls over high-speed data networks, rather than through a dedicated voice channel...

read more

What to do about IT and telecoms services when relocating

Moving offices takes a lot of organisation and when you're relocating, you want to be up and running as soon as possible, with minimum disruption to your business.  So you need to find a supplier you can trust with your IT and telecoms services when relocating. One of...

read more

Telecoms giant, Avaya files for bankruptcy

On Jan 19, Avaya made an agreement with creditors to restructure its debt after the telecoms giant filed for bankruptcy under chapter 11 of the United States Bankruptcy code. The Santa Clara, California-based company has been burdened by debt stemming from an $8.2...

read more

Phone system hacking – are you prepared?

Any business with a phone system, whether big or small, can be targeted by hackers. Unfortunately, through lack of publicity, many businesses are still unaware of the dangers and the risks. Criminals hijacked the phone system of a charity in Benwell, Newcastle, to...

read more

Responsibility for recycling telephone system equipment

Europe leads the way in waste management legislation with the Waste Electrical and Electronic Equipment (WEEE) Directive, but very few UK businesses have a policy for dealing with surplus equipment. Most electronic waste ends up in landfill, with companies failing to...

read more
Share on:
Loading...