Carousel Responds to COVID-19
At Carousel, we care deeply for the well-being of our employees, customers, communities, partners, and business ecosystem network. We are in this together, and remain fixated on ensuring your business's health and resilience during this unprecedented event. Need to connect with a Carousel representative on COVID-19 considerations or concerns? Email or call 800-285-2502.
Featured Blog Post

A Cisco calling solution for every business

Read More

Announcements

NWN Acquires Carousel Industries Delivering Improved Cloud Communications

We are excited to announce that Carousel Industries, a National leading IT and Managed Services firm is now a part of the NWN family. NWN pursued this acquisition to deliver more complete solutions to our customers and the wider market. Together, NWN and Carousel will form a new kind of cloud communications services provider that’s […]

05.12.2021

Security

MDR services and managing cybersecurity within your business

No matter the size, industry, or location, nearly every company today has a cybersecurity strategy. But there are many methodologies your organization can use to protect its digital assets and determining the right approach for your business means balancing your desired cybersecurity posture against your resource availability of staff and money. Given the evolving threat […]

04.19.2021

Get Carousel Blog updates delivered to your inbox.

Cloud computing

Announcements

Partner News: RingCentral, Carousel Strategic Partnership to Bring Enterprises into the Cloud

This post is authored by RingCentral and originally appeared on their blog. 2017 has kicked off to be a busy year! We’re seeing more and more enterprise clients driving demand for cloud communications, which means the opportunity for channel partners is HUGE. Increasingly, I hear customers say that going forward they will be “cloud first” […]

02.09.2017

young coworkers working

Cloud

Security, UC&C, Cloud: Think of the Influence You Can Make This Year

“We always overestimate the change that will occur in the next two years and underestimate the change that will occur in the next 10. Don’t let yourself be lulled into inaction.” – Bill Gates  As an IT leader, you most likely can recall a moment—or moments—in time in which you have lost influence. Perhaps it […]

02.08.2017

Cybersecurity

Security

Why Reading This Will Not Raise Your Security Game

I absolutely love the fact that information assurance and security is such a hot topic. It makes me ecstatic to know that an area so critical to organizations in nearly every sector is becoming a more top-of-mind conversation. People are consuming content, going to conferences and getting inspired to take action. But the truth is, […]

02.07.2017

Video conference meeting

UC&C

Simple Ways to Increase Adoption of UC Tools – Part 1

This is part one in a two-part series. To read the second installment, please click here. Unified communications and collaboration (UC&C) solutions have been top-of-mind for IT and business leaders for years, as they look for ways to increase productivity and efficiency. And based on recent research, the UC&C market is showing no signs of […]

02.06.2017

Data Protection

Security

Assumption of Breach Part IV – Technology

We have reached the end of the line! After discussing the importance of a robust defined security policy in my last blog entry, in this post I’ll be tackling the fourth and final foundational element in an effective security program—technology. Security technology can be broken down a number of different ways, but at Carousel, we […]

02.04.2017

State House in Providence, Rhode Island

Security

Cyber Security Q&A with Rhode Island Congressman Jim Langevin

Last year, I had the honor to accompany longtime friend and Rhode Island Congressman Jim Langevin to the State of the Union Address as his guest. Congressman Langevin was gracious enough to extend the invite due in large part to our shared passion for cyber security and workforce development. As co-chair of the Congressional Cybersecurity […]

02.02.2017

Risk Management

Security

How to Be a Risk-Ready CISO

Today’s information security leaders are quickly maturing into strategic business thinkers, growing beyond the traditional technical purpose of initiatives like implementing the latest firewalls or malware detection tools. The days of the CISO who is exclusively a highly-qualified network engineer have come to an end. Instead, the effective modern-day CISO has that strong technology foundation, […]

01.31.2017

Business People Planning Strategy Analysis Office Concept

Security

Assumption of Breach Part III—Policy and Process

In my last blog entry, I discussed the first of three foundational elements for a security program: all of the people who interact with your organization’s systems and data. In this post we’ll tackle the next element of cyber security—policy and process. For the purposes of this post, I am going to use these two […]

01.30.2017