M.A. Polce

Security

Security

SECURITY HINTS & TIPS: The Dangers of Using Messaging Apps on Work Devices

Messaging apps such as WhatsApp, Discord, and WeChat are a great way to keep in touch with friends and family. But not all messaging apps are safe to use on…
cityscape

Expand Your Infrastructure with Wireless Development Services

Accomplish more with wireless access technology. Granting yourself and your users the ability to step away from the desk to meet and collaborate can increase productivity, and when everybody can…

Why You Need A Risk Assessment

Regulatory requirements are on the rise across all sectors of our economy, from financial services industries to the healthcare arena. Each new regulation adds complexity and introduces additional concerns for…

M.A. Polce’s IT Threat Glossary

M.A. Polce Consulting’s IT Threat Glossary Understand what threats are in store for your business. The Internet can be a dangerous place, especially now that hackers are taking advantage of…

Remote Monitoring and Maintenance – A Cost Effective Solution to Proactive Network Security

Easily monitor and maintain your organization’s infrastructure. Have you ever been stuck in a technological bind caused by a flaw in your business’s network security? Organizations who aren’t prepared for…

Phishing – How Many Ways Can You Be Baited?

Every data breach and online attack seems to involve some kind of phishing attempt to steal password credentials, to launch fraudulent transactions, or to trick someone into downloading malware. According…

OpenDNS: A Cloud-Based Security Solution for Your Business

  Cisco Umbrella, also know as OpenDNS, is a cloud based security solution that is designed to protect users while they are browsing the web.  While being filtered through the…

Third Party Apps – How Secure Are They?

Third-party apps—we all use them, but do you really know the security concerns surrounding them? Many of them request access to your personal information. This includes access to your location,…

Meraki Makes It Possible to Do More with Less

When speaking to other professionals in the information technology business, it seems everyone has the same problem. They are expected to do more with less.  Be more productive with less…

Can We Hack Your Password?

Passwords are the touchstone for securing access to sensitive data—both personal and professional. They are the main defense against computer hackers, protecting our identities on websites, e-mail accounts and more.…

Download the "How Strong is Your Cybersecurity Culture?" Checklist!

Name(Required)