Security

7 Tips for Safe Online Shopping

The holiday season is in full swing, which means online shopping deals (especially on Cyber Monday) are here to entice you. E-commerce businesses have geared up to rake in the dough with more people than ever turning to the web and mobile apps to do their holiday shopping. While patrons and businesses are grateful for […]

11.27.2017

Security

A Culture of Cyber Resilience

As National Cyber Security Awareness Month (NCSAM) 2017 came to a close in October, we at Carousel continue to work diligently on raising awareness about the importance of building Cyber Resilience—at all levels our organizations, all year long. As a National Cyber Security Alliance designated partner and champion, we are dedicated to promoting a safer, more […]

11.09.2017

Internet Cyber Security

Security

The Right Technology and Services Partners Can Bring IoT From Vision To Reality

I believe the Internet of Things (IoT) has reached a tipping point where we will soon see the pace of connected devices accelerate. I say this because when I talk to organizations about their digital initiatives, they are connecting “things” without ever saying “IoT” or thinking about it as a separate thing. Markets hit mass […]

10.24.2017

Security

Four Steps to Staying Secure

On Thursday, October 19, Carousel will be hosting its third annual AlwaysOn Technology Symposium (AOTS), a one-day event that helps IT leaders better educate and teach their business about existing and imminent trends so the business can hear about them from IT first. Throughout the event, speakers dive deep into mega trends that are impacting […]

10.03.2017

Carrier Services

What’s Next? Leaders Cite Top IT Priorities for 2H 2017

Today’s IT leaders are tasked with everything from daily run tasks like patching to more strategic business initiatives like migrating data to the cloud. But how successful do they feel they are in propelling their organizations toward transformation? Carousel surveyed more than 300 New England-based IT leaders across several verticals to find out the top […]

06.08.2017

Managed Services

IT Checklist for Planning an Office Move – Part 2

Click here to read Part 1 of this two-part series for the complete checklist. 7. Conduct a dry-run A few weeks before the final move, conduct a complete step-by-step run-through of the plan to test for any gaps or issues that may arise with transit, missing or backordered equipment, or vendors. Going through step-by-step of […]

06.06.2017

Managed Services

IT Checklist for Planning an Office Move – Part 1

Whether you’re downsizing, upgrading or just shifting spaces, an office move can be brutal for IT practitioners. To help ease the burden, we’ve put together this list to help you plan your next office move. 1. Allow for ample planning time An office move, expansion, or downsize can take significant time when it comes to […]

05.31.2017

Internet Cyber Security

Managed Services

3 Ways to Leverage Managed Services for Security

Modern IT leaders are tasked with driving strategic business initiatives, leaving them conflicted in determining when and how to devote time to basic security hygiene (what we all call “run tasks”). And news of WannaCry ransomware—and its variations—is evidence that victims who exercised consistent, basic security procedures could recover more quickly than any of their […]

05.22.2017

Security

WannaCry Ransomware Q&A

Late last week, businesses and organizations around the world in more than 150 countries were hit with a strain of ransomware known as Wanna Decryptor, WannaCrypt, WanaCrypt0r and WannaCry—and the ransomware shows no signs of stopping. According to a CNN article, the attack was so extreme that it “caused Britain’s NHS to cancel surgeries, a […]

05.15.2017

Mid section view of a businessman hand touching secure server words represent the concept of secure data storage. Protect your knowledge and business data.

Security

Ransomware and Things That Go Bump in the Night

In the treacherous world of cyber security—or cyber insecurity—things that go bump in the night are the things that can bring an organization to its knees. Unexpected new breach threats, employee errors, and poor data policies can destroy even the most iron-clad cyber security strategy. Here, we break down three things that keep security professionals […]

03.14.2017