Can We Hack Your Password?

Passwords are the touchstone for securing access to sensitive data—both personal and professional. They are the main defense against computer hackers, protecting our identities on websites, e-mail accounts and more. They are also used for bank transactions and making secure purchases. With all of this sensitive data at stake, creating good passwords is extremely important….
Read More


M.A. Polce Supports Hospice & Palliative Care’s Summer Happy Hour

It was a full house last night at the Hospice & Palliative Care’s Summer Happy Hour Event! We had a great time last night supporting Hospice & Palliative Care at Aqua Vino! Great food and company! We are honored to have been a part of it. Pictured is Solutions Architect, Nick Polce (L), Marketing &…
Read More


M.A. Polce Supports First Annual My Pal Spencer Cookout and 9-Hole Golf Tournament

M.A. Polce was a proud sponsor of the first annual My Pal Spencer Cookout and 9-Hole Golf Tournament. The event was held at Teugega Country Club on July 24th in hopes to raise funds and awareness for Cure Sanfilippo Foundation. The mission of this foundation is to fund crucial medical research to find a cure…
Read More


How Do You Know What Your IT Department is Really Doing?

How do you know that the decisions they make and the actions they take are in the best interest of your business? Are you often uncomfortable with answers you get from your IT staff or not quite sure you buy in to what they are telling you and feel like there might be a better…
Read More


Does Your Company Have Maintenance Agreement Headaches?

It is very likely that the products you purchase today will come with some sort of maintenance agreement attached. The agreements can be attached to hardware, software, or both.  From time to time customers get comfortable with the solution they have and fail to see the many benefits of maintaining their support contract. Firmware upgrades,…
Read More


Disaster Recovery: Are You Prepared?

Hardware failures, bad patches, virus infections, malicious attacks, security vulnerabilities, and ransomware attacks are only a few of the many examples of outside forces that can interrupt IT functions. Unfortunately, many businesses find themselves caught off guard when an event happens, and they realize too late that they should have been more prepared. Ransomware alone…
Read More


Revitalize Meetings and Boost Productivity with Cisco WebEx

Do you frequently walk out of a meetings frustrated because it was a waste of time?  You keep thinking If you didn’t attend the meeting you would have accomplished so much more. To add insult to injury, you had to get up leave your work space to attend said meetings right?  What about the people…
Read More


The Importance of Compliance in Your Business

In recent years, regulators and lawmakers have been enacting a growing number of regulations across numerous industries that companies need to comply with. Most of these regulations are imposed to help ensure client or consumer data is kept secure and confidential, as well as to protect critical infrastructures. Examples of such compliance include HIPAA, PCI,…
Read More