Blogs

How to Avoid Being Phished – Your Essential Guide

Phishing scams are among the oldest and most effective ways cybercriminals attack. So we have produced a free guide on "How to Avoid Being Phished".  These cyber scams trick users into giving away sensitive information such as passwords, credit card details, or login...

Cybersecurity is it worth it?

Business cybersecurity stands as both protector and barrier. Though it shields our systems, data and reputations from harm, it can also introduce friction. This comes in technical, operational and financial aspects. It’s not uncommon for businesses to wrestle with the...

Gamma get Cisco Webex

The best business VoIP system in the UK just got better.  Gamma get Cisco Webex!  Here's what you need to know. Gamma Horizon was already one of the most popular cloud-based hosted phone systems in the UK with millions of users. It’s reliable, feature-packed, and can...

Top 11 Ways Companies Get Hacked

Over the past year, we’ve seen a dramatic shift in how data breaches unfold. It’s no longer just about high-tech exploits or complex malware. Often, it comes down to old access privileges, overlooked updates, or one unsuspecting click. At MF Telecom Services, we’ve...

Cisco Webex for Horizon App User Guide

Welcome to the Cisco Webex for Horizon App User Guide! This guide provides step-by-step instructions to help you set up and use the Webex by Cisco application on your Computer and iOS or Android device. With this new Gamma Horizon app, you can make and receive calls,...

MFTS has moved

Our new office!MFTS has moved head office and we finally have our new premises ready in Hildenborough.  We will be officially opening our new office on Monday the 4th of November. Though we split from parent company, MF Communications, in 2016, we have continued to...

How to setup RDP from Mac to Windows

Looking to establish a remote desktop connection from your Mac to a Windows machine? You're in the right place!  This is your free guide on how to setup RDP from MAC to Windows. In this article, we will guide you through the process step-by-step, making it easy for...

How to password protect a document on word

You are able to protect access to sensitive files within Microsoft Word.  Here is your free guide on how to password protect a document on word.1. Open the Word document that you would like to password protect. Click on File > Save As2. Depending upon where you...

How to Setup Microsoft Authenticator App for MFA

Please see below a simple guide showing how to setup Microsoft authenticator app for MFA for a Work or School account.1. Login to office.com on a web browser, and enter your email and password provided to you. You will come across this window below. Click on Next.2....

AI Cyber Attacks

Business AI Cyber Attacks Explained: While Artificial Intelligence accelerates innovation across multiple sectors in business and for personal use, it also poses some significant risks.  Especially as it relates to becoming a tool for exploitation by cyber criminals. ...

All Blog Posts

Cybersecurity and Malware Threats

DO NOT click links on any emails if you are unsure who sent them.  Below is a brief intro to Cybersecurity and Malware threats your business now faces. Scam Email Example: Recently, one of our customers received a dangerous scam email.The email auto-launched a piece...

read more

Can my Phone System be hacked?

Any phone system can be hacked in much the same way as a computer can. Hackers can access the phone system and the result can be catastrophic. What could hackers do with my phone system?  Phone System hacking (also known as Toll Fraud) is a huge problem and the...

read more

Using your mobile as a remote working device

Would working from my mobile help give me more freedom and flexibility in my work-from-home day? This is a question I asked myself recently given the current situation. For example, staring at the same four walls, day in, day out, for the last ten months.  Constant...

read more

Using a generic router for your broadband

Are you still using the generic, basic router that came from your broadband supplier for your business connection? If you are using a generic router for your business broadband, you need to review its security capabilities. Many organisations use the generic model...

read more

Cashback on your old Siemens system

MF Telecom Services is offering £250 cash for your old Siemens phone system. Remote working is now essential, and with these old systems, it is much harder to have staff working remotely and all your devices working together. Many are obsolete and therefore not...

read more

NEC end-of-life systems

The NEC Aspire, NEC XN120 and NEC SL1100 systems are discontinued NEC end-of-life system models Classified as ‘end-of-life’ they are no longer supported by the manufacturer. However, this does not mean that you need to stop using these systems if you are still...

read more

Do you need support for your BT Norstar or BCM systems?

If you need support for BT Norstar or BCM systems because they are no longer supported by your current provider, contact MF Telecom Services. These older BT systems are no longer manufactured, but many businesses still use them.  And MFTS still offer support for BT...

read more

Maintenance and support for NEC systems

As an NEC partner, MF Telecoms Services provides maintenance and support for NEC systems. This includes both new and legacy NEC telephone systems. In addition, we can also offer one-off callouts or bespoke contracts. Our qualified telecoms engineers are fully...

read more

Does your company receive a BT bill?

If the answer is ‘yes’, we guarantee to beat your BT bill. If we cannot, MFTS will donate £100 to your chosen charity.Don’t overpay for your telecoms. Investing in the right communications solution and supplier will ensure you are ready for the challenges of 2023. We...

read more
Share on:
Loading...