Why Business Continuity Makes Sense for SMBs

Why Business Continuity Makes Sense for SMBs

Did you know that approximately 40 to 60 percent of small businesses that experience a total shutdown of operations never…

Read more
NextGen Managed Services: Break Free from Break/Fix 

NextGen Managed Services: Break Free from Break/Fix 

“We’ll just fix it when it breaks!”  Now there’s a mindset which looks completely out of place in a whole…

Read more
How I Got Hacked 

How I Got Hacked 

Written by Christopher Dean of Citon/ACP My teenage son plays varsity soccer for his local high school team. As fans…

Read more
Understanding the Cost of Downtime

Understanding the Cost of Downtime

Of all the different factors that can cause system downtime, including human error and natural disasters, ransomware sits atop the…

Read more
How Your Business Can Recover Quickly from Any Disaster

How Your Business Can Recover Quickly from Any Disaster

Far too many people rely solely on hope when it comes to avoiding a disaster that has the potential to…

Read more
Defining Managed Services

Defining Managed Services

Whether you’re plagued with persistent network problems, such as security vulnerabilities, poor performance, and a barrage of support requests, or…

Read more
Network Access Control for a Zero Trust Age

Network Access Control for a Zero Trust Age

Previously, we’ve written about the zero trust network security framework and separately, about network access control (NAC). But how do…

Read more
Securing Your IoT Devices

Securing Your IoT Devices

What is IoT (Internet of Things)?  The Internet of Things (IoT) describes the network of physical objects, hence the use…

Read more
The Importance of Network Access Control (NAC)

The Importance of Network Access Control (NAC)

Security teams are facing challenges when it comes to maintaining visibility across remote, in-office, and hybrid work environments as business…

Read more
Cloud Security & How It Impacts Your Insurance Policy

Cloud Security & How It Impacts Your Insurance Policy

According to a 2022 Cyber Threat Report released by SonicWall, ransomware is up 232% since 2019. For most organizations that…

Read more
Discovering the Latest Enhancements to HPE GreenLake (Pt. 2)

Discovering the Latest Enhancements to HPE GreenLake (Pt. 2)

Last week we gave an overview of all the upcoming enhancements that were announced at HPE Discover 2022 in June.…

Read more
Discovering the Latest Enhancements to HPE GreenLake (Pt. 1)

Discovering the Latest Enhancements to HPE GreenLake (Pt. 1)

GreenLake, HPE’s flagship offering, provides organizations the ability to modernize all their applications and data. A slew of announcements so…

Read more
HPE GreenLake for VDI:  A “Best of ALL Worlds” Approach?

HPE GreenLake for VDI: A “Best of ALL Worlds” Approach?

Virtual desktop infrastructure (VDI) is a desktop virtualization technology whereby a desktop operating system (typically Microsoft Windows) runs and is…

Read more
HPE GreenLake-Delivering a Paradigm Shift With IT Consumption Model

HPE GreenLake-Delivering a Paradigm Shift With IT Consumption Model

Talk on the topic of public cloud vs. on-premises IT and the pros and cons of each has been intensifying…

Read more
Uncovering Your Strongest Defense Against Gun Threats

Uncovering Your Strongest Defense Against Gun Threats

In order to mitigate threats and protect assets, security professionals have increasingly deployed a layered security strategy. The common “5…

Read more
Why the Cloud Makes Sense for Physical Security

Why the Cloud Makes Sense for Physical Security

Leveraging the cloud for physical security can result in a plethora of benefits. For instance, video footage in the cloud…

Read more
Is Your Business Protected? Use This Office Physical Security Audit to Find Out!

Is Your Business Protected? Use This Office Physical Security Audit to Find Out!

Burglars, breaches, and intruders all pose a threat to the safety of your workplace. Developing a clear understanding of the…

Read more
Physical Security Fundamentals

Physical Security Fundamentals

Lately, much of the customer outreach, consulting, and solutions provided by ACP, CCCP, and Citon has been focused on cyber…

Read more
Chrome, Safari, and Edge: A Comparison of the Cyber Security Built Into Our Default Browsers

Chrome, Safari, and Edge: A Comparison of the Cyber Security Built Into Our Default Browsers

The internet is a pervasive part of everyday life for nearly everyone now. It’s unavoidable (although there are times we…

Read more
What to Do When You Are the Victim of a Cyber Security Attack

What to Do When You Are the Victim of a Cyber Security Attack

The world is more connected than ever leading to more freedom when it comes to how we get our work…

Read more
Never Trust and ALWAYS Verify (and Verify, and Verify)

Never Trust and ALWAYS Verify (and Verify, and Verify)

Although the phrase, “Trust, but verify” is frequently attributed to former US President Ronald Reagan, who used it on multiple…

Read more
NFTs: Tips, Tricks, and Terms to Know

NFTs: Tips, Tricks, and Terms to Know

NFTs have been all the rage for the better part of the last year. Whether you’re already convinced that NFTs…

Read more
Are NFTs Here to Stay?

Are NFTs Here to Stay?

NFTs, recently named the 2021 word of the year by Collins Dictionary, will likely stick around and continue to play…

Read more
Factors to Consider Before Investing in NFTs

Factors to Consider Before Investing in NFTs

The current mania surrounding NFT’s will surely raise plenty of eyebrows. Before you dive headfirst into investing, be aware that…

Read more
What Are NFTs and How Do They Hold Value?

What Are NFTs and How Do They Hold Value?

Last month, millions of Americans sat down to watch Super Bowl 56, and even more tuned in to watch the…

Read more
Expand Your Knowledge on Microsoft Security

Expand Your Knowledge on Microsoft Security

Microsoft 365, as a service, contains numerous administration portals, options, and configuration settings centered on security. Azure Active Directory for…

Read more
Understanding Microsoft Intune

Understanding Microsoft Intune

Mobile device management (MDM) and mobile application management (MAM) are the focus of the cloud-based service Microsoft Intune. As part…

Read more
Microsoft NCE Changes

Microsoft NCE Changes

*Update: Microsoft has extended the March 1st deadline for renewals to June 30th, 2022 for Legacy CSP. You can renew…

Read more
Cyber Security Recap: 2021

Cyber Security Recap: 2021

With 2021 in the rearview mirror, we are given the opportunity to recap the cyber security trends and events it…

Read more
Cyber Security Framework: Breaking Down the Acronyms 

Cyber Security Framework: Breaking Down the Acronyms 

MDR. EPP. EDR. XDR. The list goes on for acronyms relating to cyber security. As hackers and internet crimes become…

Read more
Human Error: Your Weakest Link in the Fight Against Bad Actors

Human Error: Your Weakest Link in the Fight Against Bad Actors

The unintentional action, or lack of action, by users that results in the cause, spreading or allowing of a security…

Read more
Securing Your Top Threat Vector: Email

Securing Your Top Threat Vector: Email

Email will consistently find itself as a top threat vector since it’s a staple in the workplace that everyone uses.…

Read more
Understanding the Chip Shortage

Understanding the Chip Shortage

Microchips play a much more critical part in our lives than you may have ever imagined. Our phones, computers and…

Read more
Hewlett Packard Enterprise strengthens GreenLake offering with breakthrough analytics and data protection cloud services

Hewlett Packard Enterprise strengthens GreenLake offering with breakthrough analytics and data protection cloud services

HPE announced Sept. 28 its latest advances toward cloud offerings. The updates can be broken down into three subset categories:…

Read more
Collaboration in the Dynamic Work Environment 

Collaboration in the Dynamic Work Environment 

Once you have deciphered what platform best fits your organization’s needs you will need to figure out the logistics of…

Read more
Improved Training Experience Coming to InitiativeOne from Daktronics

Improved Training Experience Coming to InitiativeOne from Daktronics

New 1.9-millimeter LED video wall to aid with executive training BROOKINGS, S.D. – Sept. 23, 2021 – To enhance their…

Read more
Things To Consider When Deciding Between Popular Video Conferencing Platforms

Things To Consider When Deciding Between Popular Video Conferencing Platforms

Video conferencing has become a staple in the modern workplace as organizations are tasked with giving employees the ability to…

Read more
Deploy Layered Protection with Multi-Factor Authentication

Deploy Layered Protection with Multi-Factor Authentication

Targets such as physical locations, computing devices, networks or databases become more difficult for unauthorized people to access thanks to…

Read more
Types of Cyber Attacks to Watch Out For

Types of Cyber Attacks to Watch Out For

Cyber security is at the forefront of many businesses’ minds. With attacks constantly adapting and evolving you must always be…

Read more
15 Ways to Protect Your Business From a Cyber Attack

15 Ways to Protect Your Business From a Cyber Attack

No matter what size your organization is, what line of business you’re in, or who you serve, bad actors are targeting…

Read more
Why Apple™ Makes Sense for Your Organization 

Why Apple™ Makes Sense for Your Organization 

Apple’s™ reputation of going the extra mile will pay financial dividends for your business. Durable materials are used in the…

Read more
Apple™ Business Manager: Deployment Made Easy 

Apple™ Business Manager: Deployment Made Easy 

Deployment of Apple™ devices has never been easier thanks Apple Business Manager. This web-based portal provides IT with the luxury of…

Read more
Embracing an Employee Choice Program 

Embracing an Employee Choice Program 

Expansion of how companies embrace Apple™ in the workplace is occurring everywhere. It’s critical that employees are provided with the best tools…

Read more
Apple™’s M1 Chip Sets a New Standard

Apple™’s M1 Chip Sets a New Standard

Unlike previous chips powering Apple’s devices built on the x86 architecture, the new Apple Silicon M1 deploys an ARM-based architecture.…

Read more
Increasing School Safety Through the Power of a HALO

Increasing School Safety Through the Power of a HALO

Ingram Micro Success Story Vaping is an epidemic health experts are not talking about much these days but remains a…

Read more
Simplify the World of Work with Unified Communications

Simplify the World of Work with Unified Communications

Digital transformation has spurred a brand-new world of evolving technology. Work has become boundaryless with employees no longer refined to…

Read more

Camera Corner Connecting Point Named Vertiv 2020 Central United States Partner of the Year

Green Bay, Wis. [May 11, 2021] – Camera Corner Connecting Point, announced today that it has been named the Vertiv…

Read more
Enhance Your Microsoft Teams Experience with 8×8 Voice

Enhance Your Microsoft Teams Experience with 8×8 Voice

Take your Microsoft Teams experience to the next level with Direct Routing from 8x8. Organizations around the world use Teams…

Read more
What to Consider When Deciding on a Phone System

What to Consider When Deciding on a Phone System

Phone systems (VoIP) can be daunting to evaluate. We are here to make that process simple and easy for you…

Read more
Free your IT Staff with Managed Help Desk Services 

Free your IT Staff with Managed Help Desk Services 

Not every support issue can be called a catastrophe…until it prevents you or your team from being able to do your job. Outsourcing your…

Read more
The 5 Worst Data Breaches of All Time

The 5 Worst Data Breaches of All Time

No matter what type of information is being accessed, all data breaches are scary because they involve the release of…

Read more
Defining Managed Services

Defining Managed Services

Whether you’re plagued with persistent network problems, such as security vulnerabilities, poor performance, and a barrage of support requests, or…

Read more
The Case for Co-Managed Services with NetAssist

The Case for Co-Managed Services with NetAssist

No more frustrations and wasted time on technology issues. The flexible co-managed service offerings of ACP/CCCP's NetAssist division relieve your…

Read more
So You Went Remote, What Next? 

So You Went Remote, What Next? 

While there seemingly appears to be a light at the end of the COVID-19 tunnel, there are sure to be lasting…

Read more
How to Implement a Modern Workplace Initiative 

How to Implement a Modern Workplace Initiative 

The modern workplace can be described as a fluid and casual environment where a work-life balance is prioritized. The traditional…

Read more
Endpoint Protection Has Become a Priority

Endpoint Protection Has Become a Priority

Endpoints have ascended to the forefront of security information. If you are curious what an endpoint is, simply put, it’s…

Read more
The Growing Need for Modern Collaboration

The Growing Need for Modern Collaboration

The days where everyone always reports to an in-person physical workplace, such as a company headquarters or office, seem to be behind us. The typical nine-to-five schedules have become a rarity.…

Read more
“New Normal” Webinar Recap

“New Normal” Webinar Recap

During our regional cyber threat briefing webinar earlier this week we had an FBI special agent and leaders in the…

Read more
Why Choose ACP CreativIT/Camera Corner Connecting Point for Cyber Security?

Why Choose ACP CreativIT/Camera Corner Connecting Point for Cyber Security?

No matter what size your organization is, what line of business you’re in, or who you serve, hackers are targeting…

Read more
Modernizing Security with the Enforcement of CMMC Requirements

Modernizing Security with the Enforcement of CMMC Requirements

An unprecedented average of 1,300 complaints are fielded daily by the FBI regarding cyber security concerns. When the dust settled…

Read more
What Threats Litter the Cyber Security Landscape in 2021?

What Threats Litter the Cyber Security Landscape in 2021?

There is no arguing cyber security threats are on the rise. The COVID-19 pandemic has given hackers new opportunities and…

Read more

Technology Trends To Expect In 2021

The last six months has led to more digital transformation produced than the last decade due to the unpredictable COVID-19 pandemic and the…

Read more
Microsoft Reinforces The Move Towards Subscription-Based Microsoft 365

Microsoft Reinforces The Move Towards Subscription-Based Microsoft 365

Last week Microsoft reminded customers that Office 2010 and Office 2016 for Mac have received their final security updates. With…

Read more
Flexible Co-Managed Service Offerings From  NetAssist Relieve Your Day-To-Day IT Worries!

Flexible Co-Managed Service Offerings From NetAssist Relieve Your Day-To-Day IT Worries!

No more frustrations and wasted time on technology issues. The flexible co-managed service offerings of NetAssist relieve your day-to-day IT…

Read more

Pure Storage Helps You Innovate With A Modern Data Experience

Take advantage of your opportunity to get a modern data experience from the industry’s leading all-flash storage innovator: Pure Storage.…

Read more
ACP CreativIT Awarded Healthcare Specialist Certification

ACP CreativIT Awarded Healthcare Specialist Certification

ACP CreativIT has joined the elite group of Healthcare Specialists from Hewlett Packard Inc (HP). To become part of this…

Read more

The Powerful End-To-End Emergency Management Solution: HAVRION

In today's world, many organizations are looking for a powerful, end-to-end emergency management solution. Samsung recently partnered with HAVRION, a unified…

Read more

Microsoft Teams Is Committed To User Safety

With more end users working remotely than ever, privacy and security are becoming more critical for IT. Microsoft Teams has…

Read more
ACP CreativIT and CCCP Announced as Tech Elite 250

ACP CreativIT and CCCP Announced as Tech Elite 250

ACP CreativIT, formerly known as Arlington Computer Products, was selected as one of the top 250 technology integrators by CRN, a part of…

Read more

How do I decide on a premise-based, cloud-based, or hybrid phone system?

Phone systems (VoIP) can be daunting to evaluate. We are here to make that process simple and easy for you…

Read more

CCCP Efforts in Light of COVID-19

At ACP CreativIT and Camera Corner Connecting Point, the health and well-being of our customers, employees, and vendors is a…

Read more
One simple action you can take to prevent 99.9 percent of attacks on your accounts

One simple action you can take to prevent 99.9 percent of attacks on your accounts

-Written by Melanie Maynes, Senior Produt Manager, Microsoft Security. See original post here. There are over 300 million fraudulent sign-in…

Read more
Why Pay as You Go Works for SMBs

Why Pay as You Go Works for SMBs

September 26, 2018, by Michelle Fitzsimmons in Featured, Small & Medium Business (SMB). This article was originally posted here. You’ve…

Read more
A Small Part of Something Big

A Small Part of Something Big

Camera Corner, has grown tremendously in the last 65 years.  We’ve been known for our retail store and photo lab…

Read more
How to Have a Safe Cyber Summer

How to Have a Safe Cyber Summer

Originally posted on Fortinet Blog Written by Anthony Giandomenico | June 27, 2018 Summer means vacations and down time. People are…

Read more

Mitel Introduces Integrated Portfolio for the North American Market

Source: UC Today, click here for the original article Mitel, a global leader in the world of business communications responsible for…

Read more

Protect Your Bottom Line from Cyber Risks

Originally on Fortinet's blog here. Written by Drew Del Matto. As global cyberattacks persist, cybersecurity is becoming a main focus…

Read more
CCCP Adds 8×8 to VoIP Provider Portfolio

CCCP Adds 8×8 to VoIP Provider Portfolio

Camera Corner Connecting Point announced Nov. 30 it has added unified communications leader 8x8 to its portfolio of VoIP providers.…

Read more

Altrusa House of Green Bay

Camera Corner volunteers are picture-perfect! Check out this newsletter from Altrusa House featuring some of our employees. Click here for article.…

Read more
Congratulations to Mayville!

Congratulations to Mayville!

Congratulations to Mayville for winning the Quarterback Challenge at the Green Bay Packer’s game! We love being able to give…

Read more

Is Your IT Environment Ready For Emerging Technologies?

This article was originally featured on ShoreTel’s website here. WRITTEN BY KATIE KREGEL, DIRECTOR, GLOBAL CORPORATE MARKETING, SHORETEL IT teams…

Read more
Congratulations to Green Bay West High School!

Congratulations to Green Bay West High School!

Green Bay West High School was awarded $500 for winning the Quarterback Challenge at the Green Bay Packers' game! We…

Read more

Camera Corner Connecting Point Recognized for Donation to Beagle Freedom Project

  Camera Corner Connecting Point was recognized for its donation of more than $1,800 for the Beagle Freedom Project. Through…

Read more

Protect Your Mac

Macintosh computers are very secure and immune from the viruses and malware that affect Windows computers. If you want further…

Read more
Ashwaubenon High School awarded $500

Ashwaubenon High School awarded $500

Congrats to the Ashwaubenon High School Jaguars on winning the quarterback challenge at Lambeau Field! Through Camera Corner Connecting Point…

Read more
Preble High School Awarded $500

Preble High School Awarded $500

Today is an exciting day—we delivered a $500 check to Preble High School for its football program for winning the…

Read more
HPE/HP Symposium

HPE/HP Symposium

Green Bay—Camera Corner Connecting Point held a Symposium with Hewlett Packard Enterprise (HPE) and Hewlett Packard Inc. (HP) Nov. 1,…

Read more

VoIP Case Study of Festival Foods

Executing New Initiatives Required a Modern Telephony Solution Elevating the customer experience by treating store guests as part of the…

Read more

How a Strong Knowledge Base Supports Top-Notch Service Delivery

Written by Pam Bednarczyk, Content Marketing Manager at ShoreTel Want to increase customer loyalty and overall happiness? Help your customers…

Read more

5 Business Scenarios Where SIP Trunking Makes Sense

Written by Pam Bednarczyk, Content Marketing Manager at ShoreTel   Cost effective, easy to set-up and scale… if you’re already…

Read more

6 Ways Unified Communications Improves Efficiency & Profitability

Time is money. So, how much time / money do your employees spend in meetings? Chances are, it’s more than…

Read more

5 Questions To Ask Before Switching To A VoIP Phone System

Implementing a new VoIP phone system is a high-profile project that will impact every aspect of your organization. With stakes…

Read more

Customer Experience Management Through Digital Implementation

In today's world it is vital to implement technology in a business's customer experience management toolkit. A total of 88%…

Read more

School Security – Your “Must-Have” Checklist

Schools today face a vast assortment of threats, from violence to severe weather, school security needs to protect from all…

Read more
Home Invasions Rise with the Temperature

Home Invasions Rise with the Temperature

After the long, cold months of winter, most people look forward to the warm relief of summer. With vacations, festivals,…

Read more

Creating Better Customer Experiences One Call at a Time

If you make money using the phone, then your phone system needs to be one of your business solutions, not…

Read more

10 Ways Your Phone System Improves Your Customers’ Experience

Business competition in today’s economy is fierce. Your customers expect the highest level of customer care, and you and your…

Read more

A Phone System that Maximizes Your Control

You’ve realized that your current phone system is no longer working for your growing business. So you do what any…

Read more

How Your Phone System Hinders Business Growth

Here’s the good news. Business is booming and you’re ready to grow your employee base to meet the increasing level…

Read more

NetAssist Helps Save Lost Data

We love that our NetAssist team can help businesses so much! This is a testimonial from a client who was…

Read more

Beware the Latest Version of CryptoWall Malware

A new version of the CryptoWall Malware is making it an even bigger threat to your data. CryptoWall 4.0 has…

Read more

Ramping Up: Deploying a Phone System that Works for Remote Employees

What if you were challenged by your CEO to hire a significant number of new employees within the next 6…

Read more

The Future of Workforce Communication

When the London Business School hosted its annual Global Leadership Summit in June 2014, the school surveyed attendees about a…

Read more

CCCP Featured in Insight Business Magazine

Camera Corner Connecting Point was featured in the April 2014 edition of Insight Business magazine. In the article, CEO Rick…

Read more
A Day at Camera Corner Studio

A Day at Camera Corner Studio

It is 1 p.m. on a Tuesday afternoon and Ryan Chernick, Vice President of Camera Corner Connecting Point’s Managed Services…

Read more

Improve Business Transactions With Wireless Networking and Virtualization

CCCP Also Offers VoIP Sales to Enhance Business Communications Convenience and increased productivity due to the ease of mobility are…

Read more

Virtual Reality: How to easily establish consistent communications with anyone, anywhere

When the London Business School hosted its annual Global Leadership Summit in June 2014, the school surveyed attendees about a…

Read more

How One Business Survived a Potential Data Disaster

Data disaster doesn't always appear as a fire or a flood. The reality is that a greater risk is presented…

Read more

Remote Control: How a cloud based phone system prevents stifling remote employee productivity

Imagine for a moment that you’re a sales manager at a growing company and you’ve just been tasked with building…

Read more

CCCP’s Networking and Network Monitoring Solutions Invaluable

Company’s NetAssist Department Can Detect and Fix Vulnerable Areas A secure and reliable network is necessary for any business today…

Read more

Do You Need IT Consulting or IT Support?

Let Camera Corner Connecting Point's Experts Help Technology and computers are great. Until they're not. When problems arise, or you…

Read more

Disaster Recovery and Backup Services — Essential For Your Business

Consider Camera Corner Connecting Point Your Solution Have you ever stopped to think what would happen to your data if…

Read more

Problems With Your Network?

Camera Corner Connecting Point’s Managed IT Services Is the Solution If you’re not in the IT business, you know how…

Read more

CCCP is Proud to be an Apple and Verizon Dealer

Authorized Apple and Verizon Dealer Camera Corner Connecting Point began in 1953 dedicated to the photography needs of businesses and…

Read more

Anti-Fraud Tips From Camera Corner

Implementing anti-fraud measures are crucial for your personal and business safety. We recently had a customer visit our service department…

Read more
Meyer Theater Renovation Taking Place on Foundation of Original Camera Corner Location

Meyer Theater Renovation Taking Place on Foundation of Original Camera Corner Location

Exciting renovation plans are in the works for the site of the original Camera Corner Connecting Point - simply Camera…

Read more

CCCP is Trusted Technology Source for Green Bay Packers

Once again, Camera Corner Connecting Point is being utilized as a local quality technology center. The Green Bay Packers were…

Read more

6 iOS Keyboard Tips Sure To Save You Time

We are in the midst of our big #AppleDays2013 celebration, so I thought you may like a few quick tips…

Read more

Mobile Accessibility

[youtube OsMf-eV0VdY] Have you ever wondered what it would be like to work from the comfort of a sandy beach?…

Read more

iOS Multitasking Myths

One of the most useful features of iOS, the operating system the runs iPads, iPhones and the iPod Touch, is…

Read more

Thank You for 60 Great Years!

Let's take a trip back to 1953.  Dwight D. Eisenhower was in office, the New York Yankees won their fifth…

Read more