So, are Apple devices and Macs immune to viruses? Short answer: no. Then why do so many people believe that they are? Let’s break it down.
Pensar's Business IT Blog
14 September 2016
This is part two of a series of blog posts giving marketing agencies quick, helpful advice so they can overcome some of the most common technology problems they face. We’ve been working with marketing agencies since day one, so we have a few hacks up our sleeves to help.
7 September 2016
When you’re on the move, security is often your first priority. Is your data safe across all devices? Who can access it other than yourself or your employees? But beyond security, you also need to address the practical considerations when selecting the right hardware for your mobile workforce.
1 September 2016
‘Look at this.’
It’s the simplest of requests and one you’ll ask your office colleagues on a daily basis. But it’s not so simple when your colleagues are in an office across the ocean:
11 August 2016
The biggest challenge to your overseas office isn’t the new building or overseas ISPs: it’s the people.
A transparent workplace is becoming ever more important. Many companies think they’re good at it but few truly are. It’s a bandwagon worth jumping on, though, for the impact it has on your business.
27 July 2016
Over the next few months we'll be running a series of blog posts giving marketing agencies quick, helpful advice so they can overcome some of the most common technology problems they face. We've been working with marketing agencies since day one, so we know the kind of problems they have and we have a few hacks up our...
20 July 2016
Employees will come and go so it helps to have an employee exit IT security checklist to make sure that there are no gaps in your defences after they leave.
Expanding your business overseas is a big step and not everyone is ready, willing or able to do so yet. That said, 82 percent of US businesses are looking to expand overseas to Asia and Europe.
How would your business respond if you got a virus? Far too many businesses wait until they’ve already suffered a cyber attack to think about that question. By then, the damage is already done: when a virus hits your systems, every second counts.