Carrier Services

What’s Next? Leaders Cite Top IT Priorities for 2H 2017

Today’s IT leaders are tasked with everything from daily run tasks like patching to more strategic business initiatives like migrating data to the cloud. But how successful do they feel they are in propelling their organizations toward transformation? Carousel surveyed more than 300 New England-based IT leaders across several verticals to find out the top […]

06.08.2017

Managed Services

IT Checklist for Planning an Office Move – Part 2

Click here to read Part 1 of this two-part series for the complete checklist. 7. Conduct a dry-run A few weeks before the final move, conduct a complete step-by-step run-through of the plan to test for any gaps or issues that may arise with transit, missing or backordered equipment, or vendors. Going through step-by-step of […]

06.06.2017

Managed Services

IT Checklist for Planning an Office Move – Part 1

Whether you’re downsizing, upgrading or just shifting spaces, an office move can be brutal for IT practitioners. To help ease the burden, we’ve put together this list to help you plan your next office move. 1. Allow for ample planning time An office move, expansion, or downsize can take significant time when it comes to […]

05.31.2017

Internet Cyber Security

Managed Services

3 Ways to Leverage Managed Services for Security

Modern IT leaders are tasked with driving strategic business initiatives, leaving them conflicted in determining when and how to devote time to basic security hygiene (what we all call “run tasks”). And news of WannaCry ransomware—and its variations—is evidence that victims who exercised consistent, basic security procedures could recover more quickly than any of their […]

05.22.2017

Security

WannaCry Ransomware Q&A

Late last week, businesses and organizations around the world in more than 150 countries were hit with a strain of ransomware known as Wanna Decryptor, WannaCrypt, WanaCrypt0r and WannaCry—and the ransomware shows no signs of stopping. According to a CNN article, the attack was so extreme that it “caused Britain’s NHS to cancel surgeries, a […]

05.15.2017

Mid section view of a businessman hand touching secure server words represent the concept of secure data storage. Protect your knowledge and business data.

Security

Ransomware and Things That Go Bump in the Night

In the treacherous world of cyber security—or cyber insecurity—things that go bump in the night are the things that can bring an organization to its knees. Unexpected new breach threats, employee errors, and poor data policies can destroy even the most iron-clad cyber security strategy. Here, we break down three things that keep security professionals […]

03.14.2017

young coworkers working

Cloud

Security, UC&C, Cloud: Think of the Influence You Can Make This Year

“We always overestimate the change that will occur in the next two years and underestimate the change that will occur in the next 10. Don’t let yourself be lulled into inaction.” – Bill Gates  As an IT leader, you most likely can recall a moment—or moments—in time in which you have lost influence. Perhaps it […]

02.08.2017

Cybersecurity

Security

Why Reading This Will Not Raise Your Security Game

I absolutely love the fact that information assurance and security is such a hot topic. It makes me ecstatic to know that an area so critical to organizations in nearly every sector is becoming a more top-of-mind conversation. People are consuming content, going to conferences and getting inspired to take action. But the truth is, […]

02.07.2017

Data Protection

Security

Assumption of Breach Part IV – Technology

We have reached the end of the line! After discussing the importance of a robust defined security policy in my last blog entry, in this post I’ll be tackling the third and final foundational element in an effective security program—technology. Security technology can be broken down a number of different ways, but at Carousel, we […]

02.04.2017

State House in Providence, Rhode Island

Security

Cyber Security Q&A with Rhode Island Congressman Jim Langevin

Last year, I had the honor to accompany longtime friend and Rhode Island Congressman Jim Langevin to the State of the Union Address as his guest. Congressman Langevin was gracious enough to extend the invite due in large part to our shared passion for cyber security and workforce development. As co-chair of the Congressional Cybersecurity […]

02.02.2017