Blogs

How to Avoid Being Phished – Your Essential Guide

Phishing scams are among the oldest and most effective ways cybercriminals attack. So we have produced a free guide on "How to Avoid Being Phished".  These cyber scams trick users into giving away sensitive information such as passwords, credit card details, or login...

Cybersecurity is it worth it?

Business cybersecurity stands as both protector and barrier. Though it shields our systems, data and reputations from harm, it can also introduce friction. This comes in technical, operational and financial aspects. It’s not uncommon for businesses to wrestle with the...

Gamma get Cisco Webex

The best business VoIP system in the UK just got better.  Gamma get Cisco Webex!  Here's what you need to know. Gamma Horizon was already one of the most popular cloud-based hosted phone systems in the UK with millions of users. It’s reliable, feature-packed, and can...

Top 11 Ways Companies Get Hacked

Over the past year, we’ve seen a dramatic shift in how data breaches unfold. It’s no longer just about high-tech exploits or complex malware. Often, it comes down to old access privileges, overlooked updates, or one unsuspecting click. At MF Telecom Services, we’ve...

Cisco Webex for Horizon App User Guide

Welcome to the Cisco Webex for Horizon App User Guide! This guide provides step-by-step instructions to help you set up and use the Webex by Cisco application on your Computer and iOS or Android device. With this new Gamma Horizon app, you can make and receive calls,...

MFTS has moved

Our new office!MFTS has moved head office and we finally have our new premises ready in Hildenborough.  We will be officially opening our new office on Monday the 4th of November. Though we split from parent company, MF Communications, in 2016, we have continued to...

How to setup RDP from Mac to Windows

Looking to establish a remote desktop connection from your Mac to a Windows machine? You're in the right place!  This is your free guide on how to setup RDP from MAC to Windows. In this article, we will guide you through the process step-by-step, making it easy for...

How to password protect a document on word

You are able to protect access to sensitive files within Microsoft Word.  Here is your free guide on how to password protect a document on word.1. Open the Word document that you would like to password protect. Click on File > Save As2. Depending upon where you...

How to Setup Microsoft Authenticator App for MFA

Please see below a simple guide showing how to setup Microsoft authenticator app for MFA for a Work or School account.1. Login to office.com on a web browser, and enter your email and password provided to you. You will come across this window below. Click on Next.2....

AI Cyber Attacks

Business AI Cyber Attacks Explained: While Artificial Intelligence accelerates innovation across multiple sectors in business and for personal use, it also poses some significant risks.  Especially as it relates to becoming a tool for exploitation by cyber criminals. ...

All Blog Posts

Hotel WIFI Solutions

Getting away from it all doesn’t mean becoming disconnected. The vast majority of leisure travellers value decent hotel WiFi solutions and a free WIFI connection when they go to a hotel. In the same way that business travellers need good WIFI to work remotely,...

read more

BT Inspiration support

If you need BT Inspiration support or you currently own a BT business phone system and need help or want advice about upgrading, call us for a free consultation. Many businesses are now looking to move away from old BT phone systems, like the BT Inspiration, BT...

read more

Coworking spaces in Tunbridge Wells

We understand how important flexible working can be in the modern working environment. Although not a new concept, coworking spaces are more popular than ever in the wake of the Covid-19 pandemic.  Here are our top Coworking spaces in Tunbridge Wells.Our research...

read more

Hybrid working solutions

Remote working is here to stay. Hybrid working solutions are the preferred mode of operation among employees and business alike. This is according to the most recent survey of remote working carried out by Buffer. Having been tracking remote working since 2018, Buffer...

read more

Archiving Outlook emails

If you’re looking for a way to keep your inbox clear, have you thought about archiving older emails? If you don’t want your inbox clogged up with thousands of messages that it takes ages to sort through, archiving outlook emails is a good option. You can change how...

read more

How to secure your email account

Knowing how to secure your email account is paramount. Hackers can use email accounts as a way of breaching networks. Once they gain access, anything within that network becomes vulnerable. What are the different ways hackers can gain access to your network via email?...

read more

Sort your security alarm now

Do you have a security alarm connected to your alarm provider by a phone line? If so, you need to sort your security alarm now and move onto a new "mobile"/SIM card solution before BT/Openreach switches off all the old phone lines. As an example, there was a BT alarm...

read more

Email security

Email security for business is vital in today's environment to guard against phishing. Phishing emails are the primary cause of most data breaches. Almost all email providers include some form of email security. However, these only prevent 30% of the most common scam...

read more

Support for end-of-life systems

Best Endeavour Support for end-of-life systems. A customer approached us about their current old phone system. Their existing supplier had said that it was unsupportable due to it being end-of-life (EOL). When manufacturers declare systems end-of-life, this means they...

read more
Share on:
Loading...