Blogs

Cybersecurity is it worth it?

Business cybersecurity stands as both protector and barrier. Though it shields our systems, data and reputations from harm, it can also introduce friction. This comes in technical, operational and financial aspects. It’s not uncommon for businesses to wrestle with the...

Gamma get Cisco Webex

The best business VoIP system in the UK just got better.  Gamma get Cisco Webex!  Here's what you need to know. Gamma Horizon was already one of the most popular cloud-based hosted phone systems in the UK with millions of users. It’s reliable, feature-packed, and can...

Top 11 Ways Companies Get Hacked

Over the past year, we’ve seen a dramatic shift in how data breaches unfold. It’s no longer just about high-tech exploits or complex malware. Often, it comes down to old access privileges, overlooked updates, or one unsuspecting click. At MF Telecom Services, we’ve...

Cisco Webex for Horizon App User Guide

Welcome to the Cisco Webex for Horizon App User Guide! This guide provides step-by-step instructions to help you set up and use the Webex by Cisco application on your Computer and iOS or Android device. With this new Gamma Horizon app, you can make and receive calls,...

MFTS has moved

Our new office!MFTS has moved head office and we finally have our new premises ready in Hildenborough.  We will be officially opening our new office on Monday the 4th of November. Though we split from parent company, MF Communications, in 2016, we have continued to...

How to setup RDP from Mac to Windows

Looking to establish a remote desktop connection from your Mac to a Windows machine? You're in the right place!  This is your free guide on how to setup RDP from MAC to Windows. In this article, we will guide you through the process step-by-step, making it easy for...

How to password protect a document on word

You are able to protect access to sensitive files within Microsoft Word.  Here is your free guide on how to password protect a document on word.1. Open the Word document that you would like to password protect. Click on File > Save As2. Depending upon where you...

How to Setup Microsoft Authenticator App for MFA

Please see below a simple guide showing how to setup Microsoft authenticator app for MFA for a Work or School account.1. Login to office.com on a web browser, and enter your email and password provided to you. You will come across this window below. Click on Next.2....

AI Cyber Attacks

Business AI Cyber Attacks Explained: While Artificial Intelligence accelerates innovation across multiple sectors in business and for personal use, it also poses some significant risks.  Especially as it relates to becoming a tool for exploitation by cyber criminals. ...

Outsourcing IT Support in London

Unlocking the Benefits of Outsourcing IT Support in London Are you a small business owner in London, navigating the complexities of managing your IT needs? Whether you're an entrepreneur starting a new venture or a seasoned business owner, handling IT tasks can be...

All Blog Posts

Responsibility for recycling telephone system equipment

Europe leads the way in waste management legislation with the Waste Electrical and Electronic Equipment (WEEE) Directive, but very few UK businesses have a policy for dealing with surplus equipment. Most electronic waste ends up in landfill, with companies failing to...

read more

Is telecommunications part of your disaster recovery plan

For many businesses, the telephone is still their primary channel of customer contact. During a disaster, the pressure is on to continue services clients. Without a disaster recovery plan and some method of customer interaction, what would you do?  We have produced a...

read more

Why You Should Upgrade your Old Business Telephone System

If your business is still relying on an old, unsupported telephone system, you may be seeing growing costs and are wondering if your organisation has outgrown your telecommunications tools.  Is it time to upgrade your old Business Telephone system? If you are...

read more

How to provide flexibility when handling inbound calls

Inbound numbers, also known as Non-Geographic Numbers (NGN's), are prefixes such as 0800 and 0845 used by businesses to provide flexibility when handling inbound calls. Companies purchase the right to use NGN's, rather than leasing the lines themselves, which means...

read more

Voice over Internet Protocol – VoIP telephony explained

Voice over Internet Protocol - VoIP telephony explained VoIP or Voice over Internet Protocol is a term used for making voice calls over the internet. It works by converting voice data into digital packages and sending this out via the internet in a similar way to...

read more

Are you protecting your telephone system from being hacked?

Any business with a telephone system can be targeted by phone hackers (known as 'Phreakers'). The fraudsters hijack a PBX system by breaking the PIN code on the voicemail then configure it for their own use.  Below we explain how this happens and why protecting your...

read more

Save money extending the life of your telephone system

 A little bit of maintenance and support can go a long way to extending the life of your business telephone system. Which means you don't have to waste money on replacing it too soon, or lose business when you lose contact with your customers. What you can do about...

read more
Share on:
Loading...