Blogs

MFTS has moved

Our new office!MFTS has moved head office and we finally have our new premises ready in Hildenborough.  We will be officially opening our new office on Monday the 4th of November. Though we split from parent company, MF Communications, in 2016, we have continued to...

How to setup RDP from Mac to Windows

Looking to establish a remote desktop connection from your Mac to a Windows machine? You're in the right place!  This is your free guide on how to setup RDP from MAC to Windows. In this article, we will guide you through the process step-by-step, making it easy for...

How to password protect a document on word

You are able to protect access to sensitive files within Microsoft Word.  Here is your free guide on how to password protect a document on word.1. Open the Word document that you would like to password protect. Click on File > Save As2. Depending upon where you...

How to Setup Microsoft Authenticator App for MFA

Please see below a simple guide showing how to setup Microsoft authenticator app for MFA for a Work or School account.1. Login to office.com on a web browser, and enter your email and password provided to you. You will come across this window below. Click on Next.2....

AI Cyber Attacks

Business AI Cyber Attacks Explained: While Artificial Intelligence accelerates innovation across multiple sectors in business and for personal use, it also poses some significant risks.  Especially as it relates to becoming a tool for exploitation by cyber criminals. ...

Outsourcing IT Support in London

Unlocking the Benefits of Outsourcing IT Support in London Are you a small business owner in London, navigating the complexities of managing your IT needs? Whether you're an entrepreneur starting a new venture or a seasoned business owner, handling IT tasks can be...

Modern Phone Systems for Schools: The Benefits

When it comes to managing and streamlining operations in schools, efficient communication is key. Traditional phone systems can often be cumbersome and outdated, leading to unnecessary delays and disruptions. However, modern phone systems for schools offer a range of...

The Ultimate Guide to Finding Reliable IT Support in Kent

Businesses of all sizes rely heavily on technology to streamline their operations and stay competitive. However, with the increasing complexity of IT systems and the constant threat of cyberattacks, having reliable IT support in Kent has become an absolute necessity....

Pin an icon to the Outlook taskbar

How to pin an icon to taskbar in Outlook In this short guide, we show you how to pin an icon to taskbar in Outlook with a step by step process to follow. In Outlook it is quite common to lose or unpin the Task Icon for an app on the side pane.  Also, if there's an...

Microsoft password account reset

How to reset your password on your Microsoft 365 account. This short and simple guide will show you how to carry out a Microsoft password account reset.  If you need further IT support for your business click here. Note: For security only admins can reset their own...

All Blog Posts

Phishing – are your staff the weakest link?

Here is your free guide on how to spot scam phishing emails. Unfortunately, it doesn’t matter how much security software you add to your hardware if you don’t protect your emails and train your staff to recognise and avoid hackers. Okay, so that might sound a bit...

read more

Guide to SIP Trunks for Business

Here is your guide to SIP trunks for business. Session Initiation Protocol (or SIP) trunks are an ideal go-between for bridging the gap between traditional phone systems and internet-based (VoIP) ones. You might be used to traditional ISDN phone lines, so why change?...

read more

What is Smishing?

Most of us have been targeted by fraudsters using a technique called Smishing. You may not have even been aware of it.  But what is Smishing? Smishing is when fraudsters use SMS phone messaging to impersonate a trusted organisation in an attempt to steal your personal...

read more

Email and Cyber Attacks

Businesses across the planet rely on email to communicate, collaborate, and be productive. But that heavy reliance upon a single tool puts the email of businesses like yours squarely in the crosshairs of cybercriminals intent on doing harm.  Your business must...

read more

Managed Cyber Security

The 2022 World Economic Forum Global Cybersecurity Outlook1 demonstrates that the top three cybersecurity risks for businesses are ransomware, social engineering, and malicious insider activity.  That is why you should review your managed cyber security provider on a...

read more

Working from home shouldn’t mean compromising on security

Remote working is now an integral part of business practices. However, as well as managing the ins and outs of running a business, owners also have the added pressure of keeping employee devices safe and secure. Working from home cyber security is now something you...

read more

What is email secure gateway?

Secure Email Gateways (SEGs) Secure Email Gateways (SEGs) are a way of protecting your business from malicious emails and subsequent cyber fraud. They work by sitting inline on an email pathway, reaching from the sender via the public internet used, to your business...

read more

Business email security

From time to time, we reach out to current clients to let them know about emerging cybersecurity dangers and to inform them of the solutions available to combat those threats.  Here we look at business email security. According to a survey commissioned by Egress, 83%...

read more

How to reduce your business telecoms bill

Many business owners are asking themselves right now how they can reduce business costs, their business telecoms bill being just one of those considerations. Here are some tips to consider when looking to reduce your business telecom bill and IT costs. How much do you...

read more
Share on: