We're #hiring a new Senior Cybersecurity Analyst/Pen Tester in Rome, New York. Apply today or share this post with your network.
M.A. Polce
Information Technology & Services
Rome, New York 1,454 followers
Security at the Core of Everything.
About us
M.A. Polce is a New York State-based IT consultancy and cybersecurity services company serving Buffalo, Rochester, Syracuse, Utica-Rome, Albany, and surrounding areas. The company is headquartered in the Griffiss Business & Technology Park in Rome, NY, which is home to many leading technology firms. Since 1998, M.A. Polce has combined human intelligence with cutting-edge technology to provide support and protection to small and mid-sized public and private organizations. The company is committed to delivering cost-effective solutions that align with client goals and objectives while making security a top priority. M.A. Polce's practice is built on three pillars: 1) Cybersecurity, 2) Governance, Risk, and Compliance, and 3) IT Solutions and Professional Services. M.A. Polce is known for: - Providing high-quality, cost-effective IT and cybersecurity solutions - Serving organizations across various disciplines and industries in New York State - Partnering with leading manufacturers to offer the latest technology - An unwavering commitment to client satisfaction
- Website
-
http://www.mapolce.com
External link for M.A. Polce
- Industry
- Information Technology & Services
- Company size
- 11-50 employees
- Headquarters
- Rome, New York
- Type
- Privately Held
- Founded
- 1998
- Specialties
- IT Consulting, Hosting Services/Data Center, Support/Managed IT Services, VOIP, Networking & Wireless, Storage & Virtualization, Desktop Virtualization, Unified Computing System, Security Awareness Training, Information Security, Managed Security Services, Risk Assessments, Vulnerability Assessments, Policy & Procedure Development, Cloud Services, Cybersecurity, Hardware and Software Purchasing, Managed Detection and Response, and Managed Risk and Compliance
Products
Managed Detection & Response (MDR) Services
Endpoint Detection & Response (EDR) Software
Our MDR service is an advanced combination of network visualization, insider threat monitoring, anti-malware, traffic analysis, and endpoint security used to keep you safe around the clock. With real-time threat hunting, detection, and response, MDR services enable us to catch cyber threats before they can spread. The core service includes: Threat Monitoring – We watch your network around the clock, ready to respond 24×7. Advanced Detection – Artificial intelligence and experienced analysts to detect and analyze threats. Rapid Mitigation – Our 24×7 Security Operations Center (SOC) can quarantine threats in minutes. Expert Guidance – When questions arise, our team of experienced security analysts is there for you. Detailed Reports – Helpful reports allow you to see your attack history, areas of concern, and other insights. Dashboard Visibility – View your entire network, active threats, and prioritize alerts in one intuitive dashboard.
Locations
-
Primary
401 Phoenix Drive
Rome, New York 13441, US
-
301 Plainfield Rd
Suite 300
Syracuse, New York 13212, US
Employees at M.A. Polce
Updates
-
In a recent interview with the Central New York Business Journal, our Cybersecurity Manager emphasized that AI is becoming an integral part of our daily lives, whether we embrace it or not. The challenge lies in integrating #AI while ensuring the privacy and security of our data. For an in-depth look at the rewards and risks of AI in the workplace, read the whole story. https://lnkd.in/ekfKTZed
-
We're thrilled to announce that one of our talented account engineers, Cesar Luna-Rodriguez, has recently earned his CompTIA Security+ Certification! This certification is a significant milestone in the career of any IT and cybersecurity professional, demonstrating a deep understanding of security concepts, tools, and procedures. We are incredibly proud of Cesar's accomplishment and look forward to his continued professional growth as a vital member of our team! Congratulations, Cesar! 🎉 #CompTIA #Cybersecurity
-
We all know that an always-on power supply is crucial, no matter your industry. Without a solid power protection solution, the risks during an outage are simply too great: operational downtime, data loss and corruption, equipment damage, financial losses, and customer dissatisfaction – the list goes on. But when was the last time you had your power supply assessed by an expert? For a limited time, we're offering complimentary power audits to help organizations make informed decisions about power protection, efficiency, and operating costs. If any of the following apply to you, it's time to schedule your audit: ➡️ Using UPS systems or other power protection equipment that are more than five years old. ➡️ Batteries in the power protection system haven’t been replaced or maintained recently. ➡️ Recent addition of new equipment or expansion of business operations without a corresponding upgrade in power infrastructure. ➡️ High energy bills or inefficient power consumption indicating potential wastage. ➡️ Lack of active management and monitoring of the IT environment. ➡️ Rising costs related to IT maintenance, repairs, and replacements due to power-related damage ➡️ Not having conducted a power audit or assessment in the past few years. Reserve your power audit with a qualified expert today. We'll help you identify and address gaps that could negatively impact your bottom line. https://lnkd.in/dAMdPzGd
Free Onsite Power Audit
https://mapolce.com
-
M.A. Polce reposted this
Our partners at the Cybersecurity and Infrastructure Security Agency (CISA) have discovered over 22 known exploited vulnerabilities (KEVs) related to VPN compromises. These vulnerabilities in legacy VPN systems can be exploited by #cyber threat actors to harm your organization. Read this new report by the #FBI, CISA, and other partners to learn about how to reduce your risk by transitioning to modern network access solutions: https://lnkd.in/e_Xhpmjd
-
Yesterday, the Cybersecurity and Infrastructure Security Agency (#CISA) released three Industrial Control Systems (#ICS) advisories. ➡️ ICSA-24-172-01 Yokogawa CENTUM (CVSS v4 7.7) ➡️ ICSA-24-172-02 CAREL Boss-Mini (CVSS v4 9.3) ➡️ ICSA-24-172-03 Westermo L210-F2G (CVSS v4 8.7) ICS are integral to #criticalinfrastructure sectors such as energy, water, transportation, and manufacturing, and vulnerabilities in these systems can lead to severe consequences, including disruptions in essential services, economic losses, and threats to public safety. Individuals responsible for maintaining and operating industrial control systems need to be aware of these vulnerabilities to ensure their systems remain secure and operational. To safeguard your systems, click to see the advisories and related mitigation strategies. This guidance will help you understand how to address vulnerabilities effectively and reduce the likelihood of successful #cyberattacks. #CIP #Alerts https://lnkd.in/e2c6wmts
CISA Releases Three Industrial Control Systems Advisories | CISA
cisa.gov
-
Calling all New York State K-12 IT personnel, Data Privacy Officers, Superintendents and Business Officials! Is protecting your district from advanced cyber threats top of mind for you for the coming school year? If so, you don't want to miss this. Save the date for a virtual Lunch and Learn we're co-hosting with Blackpoint Cyber and join us for a panel-style discussion on the advantage of Blackpoint MDR for school districts. Every attendee will be given a $25 DoorDash gift card as a 'thank you' for participating, and can expect to learn about: ✅ What "Partnership" Means in an #MDR Engagement & the Difference it Makes ✅ How #Ransomware Actually Unfolds in an Environment & Why Lateral Movement Matters ✅ The Differences Between Managed EDR & True MDR ✅ Drawbacks of Budget Security Solutions #EdTech #K12cybersecurity https://lnkd.in/evD8jwCE
-
“You get what you pay for,” and this week’s scam is no exception. Cybercriminals are distributing a “free” pirated version of Microsoft Office across torrenting websites. The catch is that it’s actually malware. If you download and install it, the malware can begin harvesting your personal data. If you download the malicious Microsoft Office file, the installation process appears to be legitimate. The installer looks professional and even allows you to select the version of Microsoft Office you would like to install. However, if you run the file, malware will install on your computer. The malware is designed to avoid detection from most antivirus systems. Even if your antivirus software scans and removes it, this particular malware can re-install itself afterward. Follow these tips to avoid falling victim to a malware scam: ➡️ Never download software from unofficial sources. A pirated version of the software isn’t an official release, and it may contain malware. ➡️ If something is too good to be true, it probably is. Microsoft Office is a software that you would normally pay for, and a free version isn’t likely to be legitimate. ➡️ Be sure to follow your organization’s instructions regarding antivirus software and data backups. Having updated software and data backups can help to protect your machine from a malware infection.
-
When it comes to incident response, preparation is key. 🔑 Think you're ready just because you have a plan? Think again. Discover how you can use a Tabletop Exercise to test its effectiveness BEFORE a real incident does. https://zurl.co/xoa1
Incident Response Tabletop Exercises
https://mapolce.com
-
According to IBM, 35% of cloud security incidents occurred from attackers’ use of valid, compromised credentials... and 90% of assets for sale on dark web marketplaces consist of credentials. Are you curious about what's lurking on the #darkweb and what it means for your organization's security? This is your chance to find out. Join us during the Greater Rochester Chamber of Commerce's virtual #ROConTech event series on August 15th at 11 AM. Sign up today to gain valuable insights from M.A. Polce's Cybersecurity Manager as he explores the role that dark web monitoring plays in bolstering cybersecurity for organizations like yours. https://lnkd.in/et7ev4MB