ACP CreativIT logo
Camera Corner Connecting Point logo
  • Solutions
    • Audio Visual
      • AV Consulting Services
      • Classrooms and Training Rooms
      • Digital Signage
      • Houses of Worship
      • Performance Spaces
      • Video Conferencing
      • Video Walls
    • Information Technology
      • Apple®
      • Cloud Solutions
      • Cyber Security
      • Data Center
      • Endpoint Hardware
      • HP Retail System
      • Logistics, Deployment and Warehousing
      • Modern Workplace
      • Network and Infrastructure
      • Personal Protection Equipment
    • Managed Services
      • Business Continuity and Data Recovery
      • Managed Cloud Services
      • Managed Remote Monitoring and Maintenance
      • Managed Security Services
    • Physical Security
      • Door Access
      • Process Line Monitoring
      • Vape Detectors
      • Video Surveillance Solutions
    • Unified Communications
      • Cloud Phone System
      • On-Premise Phone System
      • Video Conferencing
    • Verticals Served
      • Education
      • Enterprise Business
      • Government
      • Healthcare
      • Houses of Worship
      • Small-to-Medium Business
  • Our Company
    • About Us
    • Case Studies
    • Corporate Social Responsibility
    • Executive Team
    • News & Blog
  • Careers
  • Contact Us
  • Customer Portal
Menu Close
  • Solutions
    • Audio Visual
      • AV Consulting Services
      • Classrooms and Training Rooms
      • Digital Signage
      • Houses of Worship
      • Performance Spaces
      • Video Conferencing
      • Video Walls
    • Information Technology
      • Apple®
      • Cloud Solutions
      • Cyber Security
      • Data Center
      • Endpoint Hardware
      • HP Retail System
      • Logistics, Deployment and Warehousing
      • Modern Workplace
      • Network and Infrastructure
      • Personal Protection Equipment
    • Managed Services
      • Business Continuity and Data Recovery
      • Managed Cloud Services
      • Managed Remote Monitoring and Maintenance
      • Managed Security Services
    • Physical Security
      • Door Access
      • Process Line Monitoring
      • Vape Detectors
      • Video Surveillance Solutions
    • Unified Communications
      • Cloud Phone System
      • On-Premise Phone System
      • Video Conferencing
    • Verticals Served
      • Education
      • Enterprise Business
      • Government
      • Healthcare
      • Houses of Worship
      • Small-to-Medium Business
  • Our Company
    • About Us
    • Case Studies
    • Corporate Social Responsibility
    • Executive Team
    • News & Blog
  • Careers
  • Contact Us
  • Customer Portal
  • Solutions
    • Audio Visual
      • AV Consulting Services
      • Classrooms and Training Rooms
      • Digital Signage
      • Houses of Worship
      • Performance Spaces
      • Video Conferencing
      • Video Walls
    • Information Technology
      • Apple®
      • Cloud Solutions
      • Cyber Security
      • Data Center
      • Endpoint Hardware
      • HP Retail System
      • Logistics, Deployment and Warehousing
      • Modern Workplace
      • Network and Infrastructure
      • Personal Protection Equipment
    • Managed Services
      • Business Continuity and Data Recovery
      • Managed Cloud Services
      • Managed Remote Monitoring and Maintenance
      • Managed Security Services
    • Physical Security
      • Door Access
      • Process Line Monitoring
      • Vape Detectors
      • Video Surveillance Solutions
    • Unified Communications
      • Cloud Phone System
      • On-Premise Phone System
      • Video Conferencing
    • Verticals Served
      • Education
      • Enterprise Business
      • Government
      • Healthcare
      • Houses of Worship
      • Small-to-Medium Business
  • Our Company
    • About Us
    • Case Studies
    • Corporate Social Responsibility
    • Executive Team
    • News & Blog
  • Careers
  • Contact Us
  • Customer Portal

Cyber Security

Read more about the article Chrome, Safari, and Edge: A Comparison of the Cyber Security Built Into Our Default Browsers

Chrome, Safari, and Edge: A Comparison of the Cyber Security Built Into Our Default Browsers

  • Post published:April 25, 2022

The internet is a pervasive part of everyday life for nearly everyone now. It’s unavoidable (although there are times we wish it was), and oftentimes it’s easy to forget or…

Continue ReadingChrome, Safari, and Edge: A Comparison of the Cyber Security Built Into Our Default Browsers
Read more about the article What to Do When You Are the Victim of a Cyber Security Attack

What to Do When You Are the Victim of a Cyber Security Attack

  • Post published:April 14, 2022

The world is more connected than ever leading to more freedom when it comes to how we get our work done, however it has also led to more opportunities for…

Continue ReadingWhat to Do When You Are the Victim of a Cyber Security Attack
Read more about the article Never Trust and ALWAYS Verify (and Verify, and Verify)

Never Trust and ALWAYS Verify (and Verify, and Verify)

  • Post published:April 11, 2022

Although the phrase, “Trust, but verify” is frequently attributed to former US President Ronald Reagan, who used it on multiple occasions in the context of mid 80’s nuclear disarmament discussions…

Continue ReadingNever Trust and ALWAYS Verify (and Verify, and Verify)
Read more about the article Cyber Security Recap: 2021

Cyber Security Recap: 2021

  • Post published:January 31, 2022

With 2021 in the rearview mirror, we are given the opportunity to recap the cyber security trends and events it was littered with. Back in early February of 2021, we…

Continue ReadingCyber Security Recap: 2021
Read more about the article Cyber Security Framework: Breaking Down the Acronyms 

Cyber Security Framework: Breaking Down the Acronyms 

  • Post published:January 23, 2022

MDR. EPP. EDR. XDR. The list goes on for acronyms relating to cyber security. As hackers and internet crimes become more advanced, organizations have to adapt and implement quickly to protect…

Continue ReadingCyber Security Framework: Breaking Down the Acronyms 
Read more about the article Human Error: Your Weakest Link in the Fight Against Bad Actors

Human Error: Your Weakest Link in the Fight Against Bad Actors

  • Post published:January 17, 2022

The unintentional action, or lack of action, by users that results in the cause, spreading or allowing of a security breach is known as human error. Human error has been…

Continue ReadingHuman Error: Your Weakest Link in the Fight Against Bad Actors
Read more about the article Securing Your Top Threat Vector: Email

Securing Your Top Threat Vector: Email

  • Post published:January 11, 2022

Email will consistently find itself as a top threat vector since it’s a staple in the workplace that everyone uses. The attack surface presented by email is massive and it…

Continue ReadingSecuring Your Top Threat Vector: Email
Read more about the article Things To Consider When Deciding Between Popular Video Conferencing Platforms

Things To Consider When Deciding Between Popular Video Conferencing Platforms

  • Post published:September 14, 2021

Video conferencing has become a staple in the modern workplace as organizations are tasked with giving employees the ability to collaborate seamlessly with their colleagues who are often not in…

Continue ReadingThings To Consider When Deciding Between Popular Video Conferencing Platforms
Read more about the article Deploy Layered Protection with Multi-Factor Authentication

Deploy Layered Protection with Multi-Factor Authentication

  • Post published:August 20, 2021

Targets such as physical locations, computing devices, networks or databases become more difficult for unauthorized people to access thanks to the layered defense multi-factor authentication (MFA) provides. Even if one…

Continue ReadingDeploy Layered Protection with Multi-Factor Authentication
Read more about the article Types of Cyber Attacks to Watch Out For

Types of Cyber Attacks to Watch Out For

  • Post published:August 10, 2021

Cyber security is at the forefront of many businesses’ minds. With attacks constantly adapting and evolving you must always be armed with an effective strategy to combat bad actors. Cyber criminals…

Continue ReadingTypes of Cyber Attacks to Watch Out For
  • 1
  • 2
  • 3
  • Go to the next page

Archives

  • July 2022
  • June 2022
  • May 2022
  • April 2022
  • March 2022
  • February 2022
  • January 2022
  • December 2021
  • October 2021
  • September 2021
  • August 2021
  • July 2021
  • June 2021
  • May 2021
  • April 2021
  • March 2021
  • February 2021
  • December 2020
  • October 2020
  • September 2020
  • August 2020
  • July 2020
  • June 2020
  • May 2020
  • April 2020
  • March 2020
  • August 2019
  • June 2019
  • May 2019
  • April 2019
  • March 2019
  • January 2019
  • October 2018
  • June 2018
  • January 2018
  • December 2017
  • August 2017
  • June 2017
  • September 2016
  • May 2015
  • September 2014
  • April 2014

Categories

  • Apple
  • Blog
  • Company
  • Customers
  • Cyber Security
  • Information Technology
  • Managed IT Services
  • News
  • Press Release
  • Security
  • Uncategorized
  • Video Wall
  • VoIP

Company

  • About Us
  • Executive Team
  • ACP News
  • Contact
  • Privacy Policy
  • Accessibility Statement

Accessibility

Solutions

  • Audio Visual Solutions
  • Information Technology
  • Managed Services
  • Physical Security
  • Unified Communications

Illinois

851 Commerce Court

Buffalo Grove, IL 60089

Sales Office Location

8700 W. Bryn Mawr Dr., Ste 730S

Chicago, IL 60631

Mike Affeldt (Corporate Customers)

Senior Vice President of Commercial Sales

salesinfo@acpcreativit.com

1 (847) 541-6333

Jim Grass (Public Sector Customers)

VP/GM Public Sector

quotes@arlingtoncp.com

1 (224) 900-8175

Georgia

Stockbridge, GA 30281

Joel Thomas

Southeast Region Manager

jthomas@arlingtoncp.com

1 (678) 999-1641

Wisconsin

Green Bay, WI 54301

CCCP

Div. of ACP CreativIT

contactus@cccp.com

1 (920) 435-5353

Copyright © 2022 ACP CreativIT – All Rights Reserved