M.A. Polce
Cybersecurity
Cybersecurity
25
August, 2022
0
SCAM OF THE WEEK: Callback Phishing Scams
The Dangers of Callback Phishing Scams While making a phone call may seem harmless, you should always consider who's on the other end of the line. Cybercriminals can use callback…
13
May, 2022
6 Reasons MSSPs are a Great Cybersecurity Solution for Businesses
As technology continues to evolve, so does the frequency of sophisticated cyber-attacks. Regardless of size or industry, all businesses are viable targets for cybercriminals. These threats demand that companies take…
11
April, 2022
Managed Detection and Response (MDR) and Global Cybersecurity Risks: Why Small to Medium Sized Businesses (SMB’s) Need to Pay Attention to Both
Managed Detection and Response (MDR) and Global Cybersecurity Risks Cybersecurity headlines are all over the news. Most recently, President Biden's administration, the Department of Homeland Security, and the US Department…
24
August, 2021
Top 10 Tips to Secure Your Business
Cybersecurity is a big deal today. Over the last few months, we have seen the trickle-down effect to the consumer of ransomware attacks with the Colonial Pipeline, JBS meat processing company, and…
07
July, 2021
Managed Service Provider (MSP) vs. Managed Security Service Provider (MSSP). What’s the difference?
As a business owner, you need the right technology to keep your business running efficiently and securely from data breaches. When looking to outsource these services, it can be confusing. …
30
May, 2018
M.A. Polce’s IT Threat Glossary
M.A. Polce Consulting’s IT Threat Glossary Understand what threats are in store for your business. The Internet can be a dangerous place, especially now that hackers are taking advantage of…
26
April, 2018
Remote Monitoring and Maintenance – A Cost Effective Solution to Proactive Network Security
Easily monitor and maintain your organization’s infrastructure. Have you ever been stuck in a technological bind caused by a flaw in your business’s network security? Organizations who aren’t prepared for…
27
March, 2018
Phishing – How Many Ways Can You Be Baited?
Every data breach and online attack seems to involve some kind of phishing attempt to steal password credentials, to launch fraudulent transactions, or to trick someone into downloading malware. According…
18
October, 2017
OpenDNS: A Cloud-Based Security Solution for Your Business
Cisco Umbrella, also know as OpenDNS, is a cloud based security solution that is designed to protect users while they are browsing the web. While being filtered through the…
17
October, 2017
Third Party Apps – How Secure Are They?
Third-party apps—we all use them, but do you really know the security concerns surrounding them? Many of them request access to your personal information. This includes access to your location,…
Recent Posts
- MFA Deployment Best Practices
- Five High Value Cybersecurity Investments in K-12 Education
- Top 9 Cybersecurity Priorities for Local Government in 2025
- Fighting Cyber Fatigue: Focused Strategies for K-12 IT Teams and DPOs
- Reducing Cyber Fatigue in K-12 Education: A Guide for IT Directors, IT Teams, and DPOs