Blogs

Cybersecurity is it worth it?

Business cybersecurity stands as both protector and barrier. Though it shields our systems, data and reputations from harm, it can also introduce friction. This comes in technical, operational and financial aspects. It’s not uncommon for businesses to wrestle with the...

Gamma get Cisco Webex

The best business VoIP system in the UK just got better.  Gamma get Cisco Webex!  Here's what you need to know. Gamma Horizon was already one of the most popular cloud-based hosted phone systems in the UK with millions of users. It’s reliable, feature-packed, and can...

Top 11 Ways Companies Get Hacked

Over the past year, we’ve seen a dramatic shift in how data breaches unfold. It’s no longer just about high-tech exploits or complex malware. Often, it comes down to old access privileges, overlooked updates, or one unsuspecting click. At MF Telecom Services, we’ve...

Cisco Webex for Horizon App User Guide

Welcome to the Cisco Webex for Horizon App User Guide! This guide provides step-by-step instructions to help you set up and use the Webex by Cisco application on your Computer and iOS or Android device. With this new Gamma Horizon app, you can make and receive calls,...

MFTS has moved

Our new office!MFTS has moved head office and we finally have our new premises ready in Hildenborough.  We will be officially opening our new office on Monday the 4th of November. Though we split from parent company, MF Communications, in 2016, we have continued to...

How to setup RDP from Mac to Windows

Looking to establish a remote desktop connection from your Mac to a Windows machine? You're in the right place!  This is your free guide on how to setup RDP from MAC to Windows. In this article, we will guide you through the process step-by-step, making it easy for...

How to password protect a document on word

You are able to protect access to sensitive files within Microsoft Word.  Here is your free guide on how to password protect a document on word.1. Open the Word document that you would like to password protect. Click on File > Save As2. Depending upon where you...

How to Setup Microsoft Authenticator App for MFA

Please see below a simple guide showing how to setup Microsoft authenticator app for MFA for a Work or School account.1. Login to office.com on a web browser, and enter your email and password provided to you. You will come across this window below. Click on Next.2....

AI Cyber Attacks

Business AI Cyber Attacks Explained: While Artificial Intelligence accelerates innovation across multiple sectors in business and for personal use, it also poses some significant risks.  Especially as it relates to becoming a tool for exploitation by cyber criminals. ...

Outsourcing IT Support in London

Unlocking the Benefits of Outsourcing IT Support in London Are you a small business owner in London, navigating the complexities of managing your IT needs? Whether you're an entrepreneur starting a new venture or a seasoned business owner, handling IT tasks can be...

All Blog Posts

Best cyber security companies

Data magazine recently selected MF Telecom Services as one of their top picks for the best Cyber Security companies in Kent. How did they select us as one of the Best cyber security companies? They chose us based on our approach to innovation within this industry...

read more

Cyber Security for Business

NCSC advises businesses to act following Russia’s attack on Ukraine. Cyber security should be at the top of your priority list right now. The National Cyber Security Centre (NCSC) warns there is an increased threat to businesses of possible cyber-attacks. This follows...

read more

Microsoft price increase

Microsoft Price Increase - What’s happening? In August 2021, Microsoft launched the New Commerce Experience (NCE) for their seat-based subscriptions. This extends to Microsoft 365, Dynamics 365 and Power Platform. It means there will be some price rises on their most...

read more

New Managing Director

New Managing Director at MF Telecom Services Congratulations go to Ben Capas who has recently been appointed as Managing Director of MF Telecom Services. Ben is customer focused. He has a wealth of experience supporting customers through the network upgrades process,...

read more

Horizon Teams Voice

Recently, we completed another installation of a hosted cloud-based telephony system. The company was splitting into two separate entities. Our job involved setting users up so they could send and receive calls using the Microsoft Teams app. With the company already...

read more

Office IT upgrade

A construction and engineering customer of ours required our advice. They weren’t happy with their current IT capabilities and wanted to find out what was available in terms of an office IT upgrade. Their IT Services manager had recently retired, so they felt now was...

read more

Cybercrime and online fraud

Cybercrime is increasing.  Cyber criminals now use techniques that are so sophisticated, they fool even the most astute of people. With the number of reported scams in 2021, more than doubling in the past year (according to Citizens Advice) any of one us could become...

read more

NEC SV9100 DECT Mobility Upgrade

We recently completed an NEC DECT upgrade for a customer. (NEC SV9100 DECT Mobility) They had been using an NEC SV9100 system but wanted to upgrade so that they could operate DECT phones. This would give their employees more mobility, and the freedom to move around on...

read more

Adding a Shared Mailbox to Outlook

This short and simple guide will show you how to add a shared mailbox in outlook that you have permissions to open. Please note that this will only work if you have been delegated access to the outlook mailbox and will not work if you intend to use the password to...

read more
Share on:
Loading...