Carolinas IT
Carolinas IT
Blog Post
  • Carolinas IT is pleased to welcome the following employees to our Managed Services team: Chris Kornak is a Technical Support Specialist. He previously worked as an L1 and L2 Analyst, work force management, and as a backup and main Service Desk lead. Outside of work, he enjoys PC gaming and naps. Frans-Ley Louis is a Technical Support Specialist. His previous experience includes ... Read More The ...

Carolinas IT
Carolinas IT
Blog Post
  • The recent articles on CVE-2017-5715, 5753 and 5754, more recently known as Spectre and Meltdown, focus on flaws or vulnerabilities in a modern processor technique known as Speculative Execution and Branch Prediction. This impacts a wide range of devices including Windows PCs, Apple MacOS, iOS, Linux, Android phones, and tablets. Which systems are affected by Meltdown and Spectre? Desktop, laptop,...

Carolinas IT
Carolinas IT
Blog Post
  • Krista Cathey is an Account Executive, focusing on State and Local Government accounts as part of our SLED team. She has been with Carolinas IT for a year and a half. “I enjoy building relationships with our clients all over the state,” she says. In fact, her favorite memory at Carolinas IT involves traveling with a co-worker to visit some ... Read More The post Employee Spotlight – Krista Cathey...

Carolinas IT
Carolinas IT
Blog Post
  • Carolinas IT is pleased to welcome Jasper Kumo and Robert Mellish to our team! Jasper Kumo is a part-time intern on our Managed Services team. He has two years of hands-on experience providing technical customer support. He has experience troubleshooting and resolving software and hardware issues. He is CCNA certified in routing and switching options and just completed his comp ... Read More The ...

Carolinas IT
Carolinas IT
Blog Post
  • Carolinas IT announced the opening of their second office location in Morrisville, NC at 5150 McCrimmon Parkway, Suite #425. The office features over 4,700 square feet of working area with two conference rooms and a break area. “As we continue to execute our multi-year plan for growth, we determined that an additional location would provide us with the flexibility, redundancy, ... Read More The p...

Carolinas IT
Carolinas IT
Blog Post
  • Carolinas IT is known for supporting clients in North and South Carolina. But did you know that we support clients all over the United States and even a few worldwide? We have clients in 19 states as well as Austria, the United Kingdom, and China. Our Audit and Compliance team recently completed several engagements in the Midwest and even California. ... Read More The post “Carolinas” IT With a G...

Carolinas IT
Carolinas IT
Blog Post
  • Carolinas IT is pleased to welcome two new employees to our team! Will Calhoun is a Technical Support Specialist. He has previously worked as a Help Desk Manager and Network Administrator, along with other technical roles. Outside of the office, Will enjoys photography, graphic design, and is an aquarium enthusiast. Scott Parrish joins Carolinas IT as an Account Manager serving ... Read More The ...

Carolinas IT
Carolinas IT
Blog Post
  • Tyler Booker started as an intern in the Audit and Compliance department of Carolinas IT in December of 2015. After graduating in 2016 from NC State, Tyler joined Carolinas IT full-time as an Associate Auditor. “I’m pleased to be part of a team that is growing and procuring new opportunities at an accelerated rate,” he says. Tyler was born in ... Read More The post Employee Spotlight – Tyler Book...

Carolinas IT
Carolinas IT
Blog Post
  • Part 1 – The Basics Part 2 – How do you Manage? Part 3 – Tracking Changes, Patching, and Endpoint Security Part 4 – Identifying and Classifying Data, Encryption Strategy, Backup and Disaster Recovery Part 5 – Securing Groups, Assigning Permissions, and Web Monitoring Part 6 – Protecting the Inside of Your Network Part 7 – Risk Management, Security, and ... Read More The post Cybersecurity Checkli...

Carolinas IT
Carolinas IT
Blog Post
  • Part 1 – The Basics Part 2 – How do you Manage? Part 3 – Tracking Changes, Patching, and Endpoint Security Part 4 – Identifying and Classifying Data, Encryption Strategy, Backup and Disaster Recovery Part 5 – Securing Groups, Assigning Permissions, and Web Monitoring Part 6 – Protecting the Inside of Your Network This week’s blog continues to focus on ... Read More The post Cybersecurity Checklis...

Carolinas IT
Carolinas IT
Blog Post
  • Part 1 – The Basics Part 2 – How do you Manage? Part 3 – Tracking Changes, Patching, and Endpoint Security Part 4 – Identifying and Classifying Data, Encryption Strategy, Backup and Disaster Recovery Part 5 – Securing Groups, Assigning Permissions, and Web Monitoring Over the past few weeks, we’ve shown you how to think of your network as a ... Read More The post Cybersecurity Checklist Part 6 – ...

Carolinas IT
Carolinas IT
Blog Post
  • As the number of data breaches increases, it’s important that users implement as many security controls as possible. Many organizations are moving to multi-factor authentication as an added security measure. What is multi-factor authentication? Multi-factor authentication (also known as two-factor authentication or two-step verification) is a computer access control in which users are granted acce...

Carolinas IT
Carolinas IT
Blog Post
  • Carolinas IT welcomes Jennifer Fralick to our Managed Services team as a Service Desk Coordinator. In her role, she will be assigning tickets to engineers for service requests while providing customer service to our clients. She has over 20 years of experience including Project Management, Operations management, and web design. Before moving to North Carolina 8 years ago, she worked ... Read More...

Carolinas IT
Carolinas IT
Blog Post
  • Part 1 – The Basics Part 2 – How do you Manage? Part 3 – Tracking Changes, Patching, and Endpoint Security Part 4 – Identifying and Classifying Data, Encryption Strategy, Backup and Disaster Recovery In this week’s blog, we focus on how you can designate access for groups and users within your networks. Network Segmentation – Network segmentation allows your ... Read More The post Cybersecurity C...

Carolinas IT
Carolinas IT
Blog Post
  • Technology is helping to save lives in emergency situations. This year, Americans have witnessed an almost non-stop wave of disastrous events. Back-to-back hurricanes in Texas, Florida and Puerto Rico, the recent mass-shooting in Las Vegas, wildfires that scorched the earth and decimated neighborhoods in California and here at home, in North Carolina, a recent wave of flash-floods and tornados dam...

Carolinas IT
Carolinas IT
Blog Post
  • Part 1 – The Basics Part 2 – How do you Manage? Part 3 – Tracking Changes, Patching, and Endpoint Security Now that you have set up a management system, a process for tracking changes, and developed your endpoint security, it’s time to take a closer look at the data you have so you can best secure it. Identifying and ... Read More The post Cybersecurity Checklist Part 4 – Identifying and Classify...

Carolinas IT
Carolinas IT
Blog Post
  • The post Employee Spotlight – Jon Smith appeared first on Carolinas IT - Private Cloud Hosting, Managed Services, Advanced Technologies and Healthcare/Regulated Environments..

Carolinas IT
Carolinas IT
Blog Post
  • Reliable Internet access and digital technologies are critical to helping students navigate the modern world. Digital technologies are changing the face of modern education but in some areas, a lack of reliable Internet access and funding is limiting opportunities, and future job prospects. Education Super Highway, a non-profit focused on eliminating what has been dubbed the ‘digital divide’, has ...

Carolinas IT
Carolinas IT
Blog Post
  • Part 1 – The Basics Part 2 – How do you Manage? You’ve started to protect the perimeter of your environment with the basics of security and managing your assets and vendors. Now it’s time to track the changes that occur in your environment to mitigate risks and solve problems that may occur. Configuration Management – Configuration management involves the ... Read More The post Cybersecurity Chec...

Carolinas IT
Carolinas IT
Blog Post
  • You’ve arrived at a coffee shop for a meeting 10 minutes early. You decide to kill some time while you wait for the person you’re meeting. You pull out your laptop and connect to the Wi-Fi network the coffee shop offers after you’ve entered the password that was provided to you by the manager. While you wait, you decide to ... Read More The post The Dangers of Public Wi-Fi appeared first on Carol...

Carolinas IT
Carolinas IT
Blog Post
  • The adoption of new technologies in healthcare has made the industry a prime target for cybercriminals. Mainstream media outlets spend a good amount of time discussing the cyber vulnerabilities of small businesses and individuals but largely ignore the looming threat hackers present to healthcare organizations—and that’s a mistake. The healthcare sector has been affected by more data breaches than...

Carolinas IT
Carolinas IT
Blog Post
  • In last week’s blog, we discussed the most basic layer of security you can implement as you build your defense. This week, we explore the different controls you can put in place to manage your assets, users, and vendors. Asset Management – Every piece of hardware and software in your business is an asset. Tracking those assets is essential to ... Read More The post Cybersecurity Checklist – Part ...

Carolinas IT
Carolinas IT
Blog Post
  • Collaboration technologies and the BYOD revolution have permanently altered the workplace—here’s how. From our phones and mobile devices to our healthcare, homes and now even cars, innovations in technology are changing every aspect of our lives—including how we work. The BYOD revolution has blurred the lines between work and personal time and today most professionals consider themselves accessibl...

Carolinas IT
Carolinas IT
Blog Post
  • Every business is a target for a cyberattack these days. It’s important to have a list of best practices to keep your environment and network secure. Over the next 8 weeks, we’ll share with you the items that should be part of your cybersecurity checklist to help you build a layered defense. This week we focus on the most basic ... Read More The post Cybersecurity Checklist – Part 1 appeared firs...

Carolinas IT
Carolinas IT
Blog Post
  • Collaboration technologies improve the experience for both patients and healthcare providers. Digital transformation is an often-discussed topic in tech circles but the conversation is rarely focused on healthcare. Digital technologies, specifically those related to collaboration, are helping to transform and improve the experience for both patients and healthcare providers nationwide. The future ...

Carolinas IT
Carolinas IT
Blog Post
  • Carolinas IT is pleased to welcome Tyler Hunt! Tyler joins Carolinas IT as an intern on the Managed Services team. Originally from Greensboro, NC, Tyler is new to the IT industry. He currently has an A+ certification and is working on his Network+ and Security+ certifications. Tyler is part of the TechHire Program that is sponsored jointly by NC Works ... Read More The post Carolinas IT Welcomes ...

Carolinas IT
Carolinas IT
Blog Post
  • Kelly Booker is our Purchasing and Facilities Manager at Carolinas IT. The longest-tenured employee besides CEO Mark Cavaliero, Kelly has been with Carolinas IT for 18 years. “I was here when we had about 5 engineers and they hand wrote service tickets,” she said. “It’s been great to see how much we have grown with all the departments that have ... Read More The post Employee Spotlight – Kelly Bo...

Carolinas IT
Carolinas IT
Blog Post
  • Social engineering, the art of manipulating people to give up confidential information, has become a more prevalent practice among hackers today. Hackers can obtain personal information or sensitive data through various actions. Here are the five social engineering attacks you should be wary of: Phishing – The most common form of social engineering, phishing attacks solicit sensitive information s...

Out-Market Your Competitors?

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account Log in

By signing up, you agree to the Terms of Service and Privacy Policy.

Out-Market Your Competitors

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account

Already a user?  Log in

By signing up, you agree to the Terms of Service and Privacy Policy.