Blog
Blog
The M.A. Polce Blog: Valuable Insights for IT and Cybersecurity
03
February, 2017
0
Is Your Anti-Virus Providing You The Best Protection?
It has always been best practice to have Anti-Virus (AV) on your machine although, historically, AV has been resource hungry and often a day late and a dollar short on…
03
February, 2017
Beware: Business Email Compromises are on the Rise
There are many forms of fraud in the world today, yet email continues to prove itself as the most inexpensive and popular method for distributing fraudulent messages to potential victims.…
06
January, 2017
Do You Have a Good Plan for Your IT Initiatives in 2017?
The end of the year and holidays spell a busy time for many. Like most people, you probably just wanted to survive and get through it. Now that it is…
01
November, 2016
What’s in a Password?
As our everyday lives become more and more dependent on the Internet, cybersecurity is becoming a crucial necessity for all of us. According to a recent Rand Corp. study, it’s…
30
August, 2016
How to Protect Yourself from Malware
As technology advances, every person must know how to protect themselves from malware. For almost as long as computers and networks have been in use, malware has existed, attempting to…
30
August, 2016
Best Practices for Home Wireless
he advances of wireless technology have made it easier for users to connect to reliable and high speed networks while not being tied down to an Ethernet cable. Due to…
30
August, 2016
Three Things You Need to Know When Considering a Voice Over IP (VoIP) Phone System
Is it time for you to consider a new VoIP phone system solution? If you have answered yes to this question, there are three things you should be aware of…
27
July, 2016
Five Reasons to Migrate to Cloud-Based Services
Nowadays, planning the future of your organization's IT environment may not be as daunting as it once was. Still, with all of the options available for both on-premise and off-premise…
27
July, 2016
Do I Need Information Security for My Business?
"Why do I need information security for my business?" "Why would someone want to access my information?" "We're not a bank." "We're not a hospital." "We're not the government." Why…