Blogs

Cybersecurity is it worth it?

Business cybersecurity stands as both protector and barrier. Though it shields our systems, data and reputations from harm, it can also introduce friction. This comes in technical, operational and financial aspects. It’s not uncommon for businesses to wrestle with the...

Gamma get Cisco Webex

The best business VoIP system in the UK just got better.  Gamma get Cisco Webex!  Here's what you need to know. Gamma Horizon was already one of the most popular cloud-based hosted phone systems in the UK with millions of users. It’s reliable, feature-packed, and can...

Top 11 Ways Companies Get Hacked

Over the past year, we’ve seen a dramatic shift in how data breaches unfold. It’s no longer just about high-tech exploits or complex malware. Often, it comes down to old access privileges, overlooked updates, or one unsuspecting click. At MF Telecom Services, we’ve...

Cisco Webex for Horizon App User Guide

Welcome to the Cisco Webex for Horizon App User Guide! This guide provides step-by-step instructions to help you set up and use the Webex by Cisco application on your Computer and iOS or Android device. With this new Gamma Horizon app, you can make and receive calls,...

MFTS has moved

Our new office!MFTS has moved head office and we finally have our new premises ready in Hildenborough.  We will be officially opening our new office on Monday the 4th of November. Though we split from parent company, MF Communications, in 2016, we have continued to...

How to setup RDP from Mac to Windows

Looking to establish a remote desktop connection from your Mac to a Windows machine? You're in the right place!  This is your free guide on how to setup RDP from MAC to Windows. In this article, we will guide you through the process step-by-step, making it easy for...

How to password protect a document on word

You are able to protect access to sensitive files within Microsoft Word.  Here is your free guide on how to password protect a document on word.1. Open the Word document that you would like to password protect. Click on File > Save As2. Depending upon where you...

How to Setup Microsoft Authenticator App for MFA

Please see below a simple guide showing how to setup Microsoft authenticator app for MFA for a Work or School account.1. Login to office.com on a web browser, and enter your email and password provided to you. You will come across this window below. Click on Next.2....

AI Cyber Attacks

Business AI Cyber Attacks Explained: While Artificial Intelligence accelerates innovation across multiple sectors in business and for personal use, it also poses some significant risks.  Especially as it relates to becoming a tool for exploitation by cyber criminals. ...

Outsourcing IT Support in London

Unlocking the Benefits of Outsourcing IT Support in London Are you a small business owner in London, navigating the complexities of managing your IT needs? Whether you're an entrepreneur starting a new venture or a seasoned business owner, handling IT tasks can be...

All Blog Posts

Working from home shouldn’t mean compromising on security

Remote working is now an integral part of business practices. However, as well as managing the ins and outs of running a business, owners also have the added pressure of keeping employee devices safe and secure. Working from home cyber security is now something you...

read more

What is email secure gateway?

Secure Email Gateways (SEGs) Secure Email Gateways (SEGs) are a way of protecting your business from malicious emails and subsequent cyber fraud. They work by sitting inline on an email pathway, reaching from the sender via the public internet used, to your business...

read more

Business email security

From time to time, we reach out to current clients to let them know about emerging cybersecurity dangers and to inform them of the solutions available to combat those threats.  Here we look at business email security. According to a survey commissioned by Egress, 83%...

read more

How to reduce your business telecoms bill

Many business owners are asking themselves right now how they can reduce business costs, their business telecoms bill being just one of those considerations. Here are some tips to consider when looking to reduce your business telecom bill and IT costs. How much do you...

read more

Why your business must use MFA now!

What is Multifactor Authentication (MFA) When signing into accounts online, such as your email or finance package, you are proving to the application that you are who you say you are. This is a process known as ‘Authentication’. It is your first line of defence from...

read more

The end of basic authentication by Microsoft

Most businesses are using some kind of Microsoft application, so if you are not aware of the changes to how you and your staff login, this will be of interest to you.  This blog explains what the end of basic authentication means for you. What is changing and when: As...

read more

Cyber attacks on small businesses

Did you know small businesses are an easy target for cybercriminals?Cyber attacks on small businesses are rising, but why? Because unfortunately, cyber security for small businesses is limited to non-existent. Many presume they will not fall victim to cybercrime. As...

read more

Cyber security health check

Do you have concerns over your Cyber Security? Perhaps an IT Security health check would help give you peace of mind.Why a Cyber Security health check is a good idea:Protecting your IT network and computers ensures they’re not vulnerable.We can spot any...

read more

Hotel WIFI Solutions

Getting away from it all doesn’t mean becoming disconnected. The vast majority of leisure travellers value decent hotel WiFi solutions and a free WIFI connection when they go to a hotel. In the same way that business travellers need good WIFI to work remotely,...

read more
Share on:
Loading...