M.A. Polce Consulting

M.A. Polce Insights

Author: Bea Ewing
Date: July 27, 2016
Security? Who Would Want Access to Our Information?

“We’re not a bank.”
“We’re not a hospital.”
“We’re not the government.”

These days, you don’t need to be a high profile organization to become a target for hackers. All you need to attract unwanted attention is an internet connection.

“Why would anyone want to break into our network?”

From boredom to corporate or government espionage to simply the knowledge that they can, there are a plethora of reasons that hackers seek access to information. A few of the key reasons that should concern all of us are:

  • Identity Theft
  • Mobile Applications
  • The Internet of Things

We all know what identity theft is. In fact, many of us even know someone who has experienced it. It’s very easy to click on a web link, order something from our favorite internet superstore, or innocuously pass along some of the most basic information about ourselves on social media. But why does that make work a target for identify theft? Simple—the numbers work in the hacker’s favor, rather than your businesses. The sheer number of individual internet based transactions (web browsing, reading and responding to email, performing daily tasks) increase the likelihood that your users will inadvertently allow something they shouldn’t. Intruders count on that behavior. Home users need to be diligent as well. Good practice at home makes for good practice at work. So watch those links you’re clicking on carefully, closely examine those emails and who they’re from, don’t download any unknown documents or files, and keep unknown devices (USB drives, etc.) out of your machines.

Mobile applications are even a target for malicious activity. How many of you check your bank balances from your mobile devices, or log into your credit card app to pay the bill or look at this month’s rewards or cash back? If you’re doing it from a public wireless network, your mobile device is now on a network that’s accessible not just from other mobile devices, but from any device that can access that network. Public networks are generally not policed and are a great place for hackers trying to get a glimpse of somebody else’s information to hang out.

Mobility isn’t limited to just phones. The recent development of the Internet of Things shows us that everything is connected—datacenters, desktops, laptops, mobile devices, and televisions, to name a few. That’s a lot to watch, and intruders are counting on you not watching everything at once, which makes anything and everything a prime target for malicious actors. The brick and mortar business model is now permanently augmented by users accessing the network from anywhere—home, hotels, airports, restaurants, pretty much anywhere there’s a network or WIFI connection. That makes a BYOD (bring your own device) environment a target rich environment for hackers to pick and choose from.

We know it’s not your job to be security focused 24×7 and we’re not the only ones. Hackers, intruders, and anyone else who’s trying to gain unauthorized access to your devices or networks know it too. In fact, they’re counting on it. M.A. Polce’s dedicated security practice is continuously trained on best practices, how to thwart the latest threats, and how to assist clients in deploying advanced security and threat protection measures in any environment.

Contact us today to learn more about our security solutions and how they can help prevent hackers from accessing your network, 800.610.1858.

Company Insights

We Strive To Be The Best

The M.A. Polce Difference:

24/7/365 Operations & Support

Superior Customer Service

30+ Experienced Engineers

SOC 2 &
NIST Compliance

Rapid Incident Response

You are now leaving MA Polce Consulting

MA Polce Consulting provides links to web sites of other organizations in order to provide visitors with certain information. A link does not constitute an endorsement of content, viewpoint, policies, products or services of that web site. Once you link to another web site not maintained by MA Polce Consulting, you are subject to the terms and conditions of that web site, including but not limited to its privacy policy.

You will be redirected to

Click the link above to continue or CANCEL