M.A. Polce

M.A. Polce

Information Technology & Services

Rome, New York 1,454 followers

Security at the Core of Everything.

About us

M.A. Polce is a New York State-based IT consultancy and cybersecurity services company serving Buffalo, Rochester, Syracuse, Utica-Rome, Albany, and surrounding areas. The company is headquartered in the Griffiss Business & Technology Park in Rome, NY, which is home to many leading technology firms. Since 1998, M.A. Polce has combined human intelligence with cutting-edge technology to provide support and protection to small and mid-sized public and private organizations. The company is committed to delivering cost-effective solutions that align with client goals and objectives while making security a top priority. M.A. Polce's practice is built on three pillars: 1) Cybersecurity, 2) Governance, Risk, and Compliance, and 3) IT Solutions and Professional Services. M.A. Polce is known for: - Providing high-quality, cost-effective IT and cybersecurity solutions - Serving organizations across various disciplines and industries in New York State - Partnering with leading manufacturers to offer the latest technology - An unwavering commitment to client satisfaction

Website
http://www.mapolce.com
Industry
Information Technology & Services
Company size
11-50 employees
Headquarters
Rome, New York
Type
Privately Held
Founded
1998
Specialties
IT Consulting, Hosting Services/Data Center, Support/Managed IT Services, VOIP, Networking & Wireless, Storage & Virtualization, Desktop Virtualization, Unified Computing System, Security Awareness Training, Information Security, Managed Security Services, Risk Assessments, Vulnerability Assessments, Policy & Procedure Development, Cloud Services, Cybersecurity, Hardware and Software Purchasing, Managed Detection and Response, and Managed Risk and Compliance

Products

Locations

Employees at M.A. Polce

Updates

  • View organization page for M.A. Polce, graphic

    1,454 followers

    In a recent interview with the Central New York Business Journal, our Cybersecurity Manager emphasized that AI is becoming an integral part of our daily lives, whether we embrace it or not. The challenge lies in integrating #AI while ensuring the privacy and security of our data. For an in-depth look at the rewards and risks of AI in the workplace, read the whole story. https://lnkd.in/ekfKTZed

    AI in the workplace offers rewards and risks

    AI in the workplace offers rewards and risks

    https://www.cnybj.com

  • View organization page for M.A. Polce, graphic

    1,454 followers

    We're thrilled to announce that one of our talented account engineers, Cesar Luna-Rodriguez, has recently earned his CompTIA Security+ Certification! This certification is a significant milestone in the career of any IT and cybersecurity professional, demonstrating a deep understanding of security concepts, tools, and procedures. We are incredibly proud of Cesar's accomplishment and look forward to his continued professional growth as a vital member of our team! Congratulations, Cesar! 🎉 #CompTIA #Cybersecurity

    • No alternative text description for this image
  • View organization page for M.A. Polce, graphic

    1,454 followers

    We all know that an always-on power supply is crucial, no matter your industry. Without a solid power protection solution, the risks during an outage are simply too great: operational downtime, data loss and corruption, equipment damage, financial losses, and customer dissatisfaction – the list goes on. But when was the last time you had your power supply assessed by an expert? For a limited time, we're offering complimentary power audits to help organizations make informed decisions about power protection, efficiency, and operating costs. If any of the following apply to you, it's time to schedule your audit: ➡️ Using UPS systems or other power protection equipment that are more than five years old. ➡️ Batteries in the power protection system haven’t been replaced or maintained recently. ➡️ Recent addition of new equipment or expansion of business operations without a corresponding upgrade in power infrastructure. ➡️ High energy bills or inefficient power consumption indicating potential wastage. ➡️ Lack of active management and monitoring of the IT environment. ➡️ Rising costs related to IT maintenance, repairs, and replacements due to power-related damage ➡️ Not having conducted a power audit or assessment in the past few years. Reserve your power audit with a qualified expert today. We'll help you identify and address gaps that could negatively impact your bottom line. https://lnkd.in/dAMdPzGd

    Free Onsite Power Audit

    Free Onsite Power Audit

    https://mapolce.com

  • M.A. Polce reposted this

    View organization page for FBI Cyber Division, graphic

    153,418 followers

    Our partners at the Cybersecurity and Infrastructure Security Agency (CISA) have discovered over 22 known exploited vulnerabilities (KEVs) related to VPN compromises. These vulnerabilities in legacy VPN systems can be exploited by #cyber threat actors to harm your organization. Read this new report by the #FBI, CISA, and other partners to learn about how to reduce your risk by transitioning to modern network access solutions: https://lnkd.in/e_Xhpmjd

    • African American female holding a smart phone and pointing to it with “VPN” on the screen and a coffee mug on the table.
  • View organization page for M.A. Polce, graphic

    1,454 followers

    Yesterday, the Cybersecurity and Infrastructure Security Agency (#CISA) released three Industrial Control Systems (#ICS) advisories. ➡️ ICSA-24-172-01 Yokogawa CENTUM (CVSS v4 7.7) ➡️ ICSA-24-172-02 CAREL Boss-Mini (CVSS v4 9.3) ➡️ ICSA-24-172-03 Westermo L210-F2G (CVSS v4 8.7) ICS are integral to #criticalinfrastructure sectors such as energy, water, transportation, and manufacturing, and vulnerabilities in these systems can lead to severe consequences, including disruptions in essential services, economic losses, and threats to public safety. Individuals responsible for maintaining and operating industrial control systems need to be aware of these vulnerabilities to ensure their systems remain secure and operational. To safeguard your systems, click to see the advisories and related mitigation strategies. This guidance will help you understand how to address vulnerabilities effectively and reduce the likelihood of successful #cyberattacks. #CIP #Alerts https://lnkd.in/e2c6wmts

    CISA Releases Three Industrial Control Systems Advisories | CISA

    cisa.gov

  • View organization page for M.A. Polce, graphic

    1,454 followers

    Calling all New York State K-12 IT personnel, Data Privacy Officers, Superintendents and Business Officials! Is protecting your district from advanced cyber threats top of mind for you for the coming school year? If so, you don't want to miss this. Save the date for a virtual Lunch and Learn we're co-hosting with Blackpoint Cyber and join us for a panel-style discussion on the advantage of Blackpoint MDR for school districts. Every attendee will be given a $25 DoorDash gift card as a 'thank you' for participating, and can expect to learn about: ✅ What "Partnership" Means in an #MDR Engagement & the Difference it Makes ✅ How #Ransomware Actually Unfolds in an Environment & Why Lateral Movement Matters ✅ The Differences Between Managed EDR & True MDR ✅ Drawbacks of Budget Security Solutions #EdTech #K12cybersecurity https://lnkd.in/evD8jwCE

    • No alternative text description for this image
  • View organization page for M.A. Polce, graphic

    1,454 followers

    “You get what you pay for,” and this week’s scam is no exception. Cybercriminals are distributing a “free” pirated version of Microsoft Office across torrenting websites. The catch is that it’s actually malware. If you download and install it, the malware can begin harvesting your personal data. If you download the malicious Microsoft Office file, the installation process appears to be legitimate. The installer looks professional and even allows you to select the version of Microsoft Office you would like to install. However, if you run the file, malware will install on your computer. The malware is designed to avoid detection from most antivirus systems. Even if your antivirus software scans and removes it, this particular malware can re-install itself afterward. Follow these tips to avoid falling victim to a malware scam: ➡️ Never download software from unofficial sources. A pirated version of the software isn’t an official release, and it may contain malware. ➡️ If something is too good to be true, it probably is. Microsoft Office is a software that you would normally pay for, and a free version isn’t likely to be legitimate. ➡️ Be sure to follow your organization’s instructions regarding antivirus software and data backups. Having updated software and data backups can help to protect your machine from a malware infection.

  • View organization page for M.A. Polce, graphic

    1,454 followers

    According to IBM, 35% of cloud security incidents occurred from attackers’ use of valid, compromised credentials... and 90% of assets for sale on dark web marketplaces consist of credentials. Are you curious about what's lurking on the #darkweb and what it means for your organization's security? This is your chance to find out. Join us during the Greater Rochester Chamber of Commerce's virtual #ROConTech event series on August 15th at 11 AM. Sign up today to gain valuable insights from M.A. Polce's Cybersecurity Manager as he explores the role that dark web monitoring plays in bolstering cybersecurity for organizations like yours. https://lnkd.in/et7ev4MB

    • No alternative text description for this image

Similar pages

Browse jobs