M.A. Polce Company Golf Outing 2018

Our employees enjoyed a full day of golf followed by dinner at Teugega Country Club in Rome on Saturday, August 4th! We had cash prizes, goodie bags and great company. Thank you to President Mike Polce for this special event! Visit our Facebook page for more photos of the outing!


M.A. Polce at the 2018 Cybersecurity Conference in Albany!

We attended the 21st Annual NYS Cybersecurity Conference in Albany! Brian Millar, Manager of Information Security, and Amanda Fanelli, Marketing & PR Coordinator attended the two-day conference! Brian got to attend workshops and seminars from leading industry experts. We had a great time expanding our knowledge and networking with other professionals.


M.A. Polce’s IT Threat Glossary

M.A. Polce Consulting’s IT Threat Glossary Understand what threats are in store for your business. The Internet can be a dangerous place, especially now that hackers are taking advantage of advanced tools and threats. New types of malware, ransomware, and viruses are being created every day, for the express purpose of seeing your organization fail….
Read More


Remote Monitoring and Maintenance – A Cost Effective Solution to Proactive Network Security

Easily monitor and maintain your organization’s infrastructure. Have you ever been stuck in a technological bind caused by a flaw in your business’s network security? Organizations who aren’t prepared for the constant upkeep that a computing network demands will quickly find themselves overwhelmed. Despite the difficulties that come with technology management, maintenance is an absolutely…
Read More


Phishing – How Many Ways Can You Be Baited?

Every data breach and online attack seems to involve some kind of phishing attempt to steal password credentials, to launch fraudulent transactions, or to trick someone into downloading malware. According to a Verizon cybersecurity report, an attacker sending out 10 phishing emails has a 90 percent chance that one person will fall for it. Do…
Read More


How Secure Will You Be Shopping This Holiday Season?

It’s almost that time of year again! The two busiest shopping days of the year are upon us, and while you’re out looking for the best deals, identity thieves are just as busy trying to steal your financial information. To help yourself stay secure, keep the following tips in mind while shopping both online or in…
Read More


OpenDNS: A Cloud-Based Security Solution for Your Business

  Cisco Umbrella, also know as OpenDNS, is a cloud based security solution that is designed to protect users while they are browsing the web.  While being filtered through the Cisco Umbrella cloud, users can surf the net with confidence knowing that they are being protected by one of the most comprehensive web security solutions…
Read More


Third Party Apps – How Secure Are They?

Third-party apps—we all use them, but do you really know the security concerns surrounding them? Many of them request access to your personal information. This includes access to your location, photos, contacts and messages. What’s worrisome is that these apps can be vulnerable to digital snoops, data breaches, and real-world thieves. The recent trend towards…
Read More


Meraki Makes It Possible to Do More with Less

When speaking to other professionals in the information technology business, it seems everyone has the same problem. They are expected to do more with less.  Be more productive with less time. Provide better computing environments with less of a budget.  Service more employees with less staff. I’m sure everyone who has been in this situation…
Read More


Can We Hack Your Password?

Passwords are the touchstone for securing access to sensitive data—both personal and professional. They are the main defense against computer hackers, protecting our identities on websites, e-mail accounts and more. They are also used for bank transactions and making secure purchases. With all of this sensitive data at stake, creating good passwords is extremely important….
Read More