Carolinas IT
Carolinas IT
Blog Post
  • Part 1 – The Basics Part 2 – How do you Manage? Part 3 – Tracking Changes, Patching, and Endpoint Security Part 4 – Identifying and Classifying Data, Encryption Strategy, Backup and Disaster Recovery Part 5 – Securing Groups, Assigning Permissions, and Web Monitoring Over the past few weeks, we’ve shown you how to think of your network as a ... Read More The post Cybersecurity Checklist Part 6 – ...

Carolinas IT
Carolinas IT
Blog Post
  • As the number of data breaches increases, it’s important that users implement as many security controls as possible. Many organizations are moving to multi-factor authentication as an added security measure. What is multi-factor authentication? Multi-factor authentication (also known as two-factor authentication or two-step verification) is a computer access control in which users are granted acce...

Carolinas IT
Carolinas IT
Blog Post
  • Carolinas IT welcomes Jennifer Fralick to our Managed Services team as a Service Desk Coordinator. In her role, she will be assigning tickets to engineers for service requests while providing customer service to our clients. She has over 20 years of experience including Project Management, Operations management, and web design. Before moving to North Carolina 8 years ago, she worked ... Read More...

Carolinas IT
Carolinas IT
Blog Post
  • Part 1 – The Basics Part 2 – How do you Manage? Part 3 – Tracking Changes, Patching, and Endpoint Security Part 4 – Identifying and Classifying Data, Encryption Strategy, Backup and Disaster Recovery In this week’s blog, we focus on how you can designate access for groups and users within your networks. Network Segmentation – Network segmentation allows your ... Read More The post Cybersecurity C...

Carolinas IT
Carolinas IT
Blog Post
  • Technology is helping to save lives in emergency situations. This year, Americans have witnessed an almost non-stop wave of disastrous events. Back-to-back hurricanes in Texas, Florida and Puerto Rico, the recent mass-shooting in Las Vegas, wildfires that scorched the earth and decimated neighborhoods in California and here at home, in North Carolina, a recent wave of flash-floods and tornados dam...

Carolinas IT
Carolinas IT
Blog Post
  • Part 1 – The Basics Part 2 – How do you Manage? Part 3 – Tracking Changes, Patching, and Endpoint Security Now that you have set up a management system, a process for tracking changes, and developed your endpoint security, it’s time to take a closer look at the data you have so you can best secure it. Identifying and ... Read More The post Cybersecurity Checklist Part 4 – Identifying and Classify...

Carolinas IT
Carolinas IT
Blog Post
  • The post Employee Spotlight – Jon Smith appeared first on Carolinas IT - Private Cloud Hosting, Managed Services, Advanced Technologies and Healthcare/Regulated Environments..

Carolinas IT
Carolinas IT
Blog Post
  • Reliable Internet access and digital technologies are critical to helping students navigate the modern world. Digital technologies are changing the face of modern education but in some areas, a lack of reliable Internet access and funding is limiting opportunities, and future job prospects. Education Super Highway, a non-profit focused on eliminating what has been dubbed the ‘digital divide’, has ...

Carolinas IT
Carolinas IT
Blog Post
  • Part 1 – The Basics Part 2 – How do you Manage? You’ve started to protect the perimeter of your environment with the basics of security and managing your assets and vendors. Now it’s time to track the changes that occur in your environment to mitigate risks and solve problems that may occur. Configuration Management – Configuration management involves the ... Read More The post Cybersecurity Chec...

Carolinas IT
Carolinas IT
Blog Post
  • You’ve arrived at a coffee shop for a meeting 10 minutes early. You decide to kill some time while you wait for the person you’re meeting. You pull out your laptop and connect to the Wi-Fi network the coffee shop offers after you’ve entered the password that was provided to you by the manager. While you wait, you decide to ... Read More The post The Dangers of Public Wi-Fi appeared first on Carol...

Carolinas IT
Carolinas IT
Blog Post
  • The adoption of new technologies in healthcare has made the industry a prime target for cybercriminals. Mainstream media outlets spend a good amount of time discussing the cyber vulnerabilities of small businesses and individuals but largely ignore the looming threat hackers present to healthcare organizations—and that’s a mistake. The healthcare sector has been affected by more data breaches than...

Carolinas IT
Carolinas IT
Blog Post
  • In last week’s blog, we discussed the most basic layer of security you can implement as you build your defense. This week, we explore the different controls you can put in place to manage your assets, users, and vendors. Asset Management – Every piece of hardware and software in your business is an asset. Tracking those assets is essential to ... Read More The post Cybersecurity Checklist – Part ...

Carolinas IT
Carolinas IT
Blog Post
  • Collaboration technologies and the BYOD revolution have permanently altered the workplace—here’s how. From our phones and mobile devices to our healthcare, homes and now even cars, innovations in technology are changing every aspect of our lives—including how we work. The BYOD revolution has blurred the lines between work and personal time and today most professionals consider themselves accessibl...

Carolinas IT
Carolinas IT
Blog Post
  • Every business is a target for a cyberattack these days. It’s important to have a list of best practices to keep your environment and network secure. Over the next 8 weeks, we’ll share with you the items that should be part of your cybersecurity checklist to help you build a layered defense. This week we focus on the most basic ... Read More The post Cybersecurity Checklist – Part 1 appeared firs...

Carolinas IT
Carolinas IT
Blog Post
  • Collaboration technologies improve the experience for both patients and healthcare providers. Digital transformation is an often-discussed topic in tech circles but the conversation is rarely focused on healthcare. Digital technologies, specifically those related to collaboration, are helping to transform and improve the experience for both patients and healthcare providers nationwide. The future ...

Carolinas IT
Carolinas IT
Blog Post
  • Carolinas IT is pleased to welcome Tyler Hunt! Tyler joins Carolinas IT as an intern on the Managed Services team. Originally from Greensboro, NC, Tyler is new to the IT industry. He currently has an A+ certification and is working on his Network+ and Security+ certifications. Tyler is part of the TechHire Program that is sponsored jointly by NC Works ... Read More The post Carolinas IT Welcomes ...

Carolinas IT
Carolinas IT
Blog Post
  • Kelly Booker is our Purchasing and Facilities Manager at Carolinas IT. The longest-tenured employee besides CEO Mark Cavaliero, Kelly has been with Carolinas IT for 18 years. “I was here when we had about 5 engineers and they hand wrote service tickets,” she said. “It’s been great to see how much we have grown with all the departments that have ... Read More The post Employee Spotlight – Kelly Bo...

Carolinas IT
Carolinas IT
Blog Post
  • Social engineering, the art of manipulating people to give up confidential information, has become a more prevalent practice among hackers today. Hackers can obtain personal information or sensitive data through various actions. Here are the five social engineering attacks you should be wary of: Phishing – The most common form of social engineering, phishing attacks solicit sensitive information s...

Carolinas IT
Carolinas IT
Blog Post
  • Cybersecurity is on the tip of every business leaders’ tongue yet most companies are still too slow to react. We’ve been talking about cybersecurity a lot this year and don’t plan to stop. Why? Because the vast majority of organizations still don’t’ get it. Most companies continue to make poor decisions when it comes to their cybersecurity. Even highly publicized ... Read More The post Why Your B...

Carolinas IT
Carolinas IT
Blog Post
  • Years ago, USB drives were the best thing since sliced bread. The USB drive offered the convenience of extra storage that also served as a means of quickly moving files from one computer to another. It was a game-changer in terms of storage and saving files. No more saving to floppy disks and burning to CDs; just stick in your ... Read More The post Sticking it to the Stick – The Danger of USB Dr...

Carolinas IT
Carolinas IT
Blog Post
  • Carolinas IT hosted Techstravaganza on September 14, 2017. The third annual event was held at the Park Alumni Center on the Centennial Campus at NC State University. Jerry Fralick, CSO of Lenovo, was the keynote speaker for the event. The message was simple: ask questions to ensure your products and services are secure. “You need to know where your data ... Read More The post Carolinas IT Hosts T...

Carolinas IT
Carolinas IT
Blog Post
  • We all know cybersecurity is important, yet most businesses get these 5 simple details wrong. Last week’s announcement of the massive data breach at Equifax has brought the topic of cybersecurity into focus for millions of Americans. The attack should serve as a reminder to us all that regardless of size, every organization can be susceptible to a data breach. ... Read More The post 5 Things Busi...

Carolinas IT
Carolinas IT
Blog Post
  • JR Welch is a Network and Voice Engineer on our Professional Services team. He has been with Carolinas IT for 7 years and was recently awarded the Top Gear Award for Q2. JR works countless hours on client projects for network upgrades and telephony. “Each and every day,” he says, “I get a chance to work with and be a ... Read More The post Employee Spotlight – JR Welch appeared first on Carolinas...

Carolinas IT
Carolinas IT
Blog Post
  • Cyber threats have the potential to cripple your business, but there can still be life after an attack. Cybersecurity is a popular topic of conversation and not just for those of us in the world of technology. Following large-scale events like the WannaCry attack that crippled organizations globally earlier this year and last week’s crypto-ransomware attack that targeted 20 million ... Read More ...

Carolinas IT
Carolinas IT
Blog Post
  • Ellen Garcia joins CarolinasIT as a Project Manager on the Professional Services team. She will be assisting in planning, organizing and outlining responsibilities during the lifecycle of company projects. Ellen has 8 years of Project Management experience stemming from her time as an Officer in the United State Army. Ellen has lived in the Raleigh/Durham area for 4 years with ... Read More The p...

Carolinas IT
Carolinas IT
Blog Post
  • We have recently seen a rise in Apple users getting locked out of their devices. Hackers are getting into people’s personal iCloud accounts and marking their device as lost or stolen. This tells Apple to put a firmware password on the device which prevents the device from booting. The only way to disable this is to contact Apple and submit ... Read More The post Enable Two-Factor Authentication t...

Carolinas IT
Carolinas IT
Blog Post
  • Mike Schwarzbauer joins Carolinas IT as a Systems Engineer on our Professional Services team. He will be assisting our clients with infrastructure projects to improve security and productivity in their environments. Mike prides himself on creative, cost-effective solutions that are reliable and exceed customer expectations; In Mike’s spare time he enjoys traveling and flying his quadcopter. The po...

Carolinas IT
Carolinas IT
Blog Post
  • Ryan McCauley is an Associate Systems Engineer. He has worked at Carolinas IT for 5 years. “My favorite part of my job,” he says, “is telling someone their problem has been fixed. I can provide them peace of mind and they’re able to return to their work without that interruption.” Outside of work, Ryan enjoys reading and spending time with ... Read More The post Employee Spotlight – Ryan McCauley...

Out-Market Your Competitors?

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account Log in

By signing up, you agree to the Terms of Service and Privacy Policy.

Out-Market Your Competitors

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account

Already a user?  Log in

By signing up, you agree to the Terms of Service and Privacy Policy.