Rear view of two partially unrecognizable men sitting in front of a computer. One of them is pointing at a screen where are several lines of computer code.

Security

Assumption of Breach, Part I: A New Approach to Cyber Security

Several large enterprises have been victimized by catastrophic cyber security incidents over the past few years. They’re so severe, they even caused executives to resign and profits to disappear. In the wake of these high-profile incidents, the media’s message has been clear: if organizations with nearly unlimited resources can be compromised, data breaches are inevitable […]

12.12.2017

Events

Technology: It’s Always On

This article was originally featured on Medium.com. I had the honor of joining a distinguished panel of tech industry leaders to discuss topics in cybersecurity at the AlwaysOn Technology Symposium (AOTS) in Providence. This one-day event is a resource for IT professionals from across the country and is hosted by Carousel Industries, a leader in […]

12.07.2017

Security

7 Tips for Safe Online Shopping

The holiday season is in full swing, which means online shopping deals (especially on Cyber Monday) are here to entice you. E-commerce businesses have geared up to rake in the dough with more people than ever turning to the web and mobile apps to do their holiday shopping. While patrons and businesses are grateful for […]

11.27.2017

Security

A Culture of Cyber Resilience

As National Cyber Security Awareness Month (NCSAM) 2017 came to a close in October, we at Carousel continue to work diligently on raising awareness about the importance of building Cyber Resilience—at all levels our organizations, all year long. As a National Cyber Security Alliance designated partner and champion, we are dedicated to promoting a safer, more […]

11.09.2017

Internet Cyber Security

Security

The Right Technology and Services Partners Can Bring IoT From Vision To Reality

I believe the Internet of Things (IoT) has reached a tipping point where we will soon see the pace of connected devices accelerate. I say this because when I talk to organizations about their digital initiatives, they are connecting “things” without ever saying “IoT” or thinking about it as a separate thing. Markets hit mass […]

10.24.2017

Security

Four Steps to Staying Secure

On Thursday, October 19, Carousel will be hosting its third annual AlwaysOn Technology Symposium (AOTS), a one-day event that helps IT leaders better educate and teach their business about existing and imminent trends so the business can hear about them from IT first. Throughout the event, speakers dive deep into mega trends that are impacting […]

10.03.2017

Carrier Services

What’s Next? Leaders Cite Top IT Priorities for 2H 2017

Today’s IT leaders are tasked with everything from daily run tasks like patching to more strategic business initiatives like migrating data to the cloud. But how successful do they feel they are in propelling their organizations toward transformation? Carousel surveyed more than 300 New England-based IT leaders across several verticals to find out the top […]

06.08.2017

Managed Services

IT Checklist for Planning an Office Move – Part 2

Click here to read Part 1 of this two-part series for the complete checklist. 7. Conduct a dry-run A few weeks before the final move, conduct a complete step-by-step run-through of the plan to test for any gaps or issues that may arise with transit, missing or backordered equipment, or vendors. Going through step-by-step of […]

06.06.2017

Managed Services

IT Checklist for Planning an Office Move – Part 1

Whether you’re downsizing, upgrading or just shifting spaces, an office move can be brutal for IT practitioners. To help ease the burden, we’ve put together this list to help you plan your next office move. 1. Allow for ample planning time An office move, expansion, or downsize can take significant time when it comes to […]

05.31.2017

Internet Cyber Security

Managed Services

3 Ways to Leverage Managed Services for Security

Modern IT leaders are tasked with driving strategic business initiatives, leaving them conflicted in determining when and how to devote time to basic security hygiene (what we all call “run tasks”). And news of WannaCry ransomware—and its variations—is evidence that victims who exercised consistent, basic security procedures could recover more quickly than any of their […]

05.22.2017