Carolinas IT Opens Second Office in Research Triangle Park Area

Jennifer Noto News Leave a Comment

Carolinas IT announced the opening of their second office location in Morrisville, NC at 5150 McCrimmon Parkway, Suite #425. The office features over 4,700 square feet of working area with two conference rooms and a break area. “As we continue to execute our multi-year plan for growth, we determined that an additional location would provide us with the flexibility, redundancy, …

“Carolinas” IT With a Global Footprint

Jennifer Noto Operations Leave a Comment

Carolinas IT is known for supporting clients in North and South Carolina. But did you know that we support clients all over the United States and even a few worldwide? We have clients in 19 states as well as Austria, the United Kingdom, and China. Our Audit and Compliance team recently completed several engagements in the Midwest and even California. …

Welcome Will Calhoun, Scott Parrish, and Jay Thornsberry!

Jennifer Noto News Leave a Comment

Carolinas IT is pleased to welcome two new employees to our team! Will Calhoun is a Technical Support Specialist. He has previously worked as a Help Desk Manager and Network Administrator, along with other technical roles. Outside of the office, Will enjoys photography, graphic design, and is an aquarium enthusiast. Scott Parrish joins Carolinas IT as an Account Manager serving …

Employee Spotlight – Tyler Booker

Jennifer Noto News Leave a Comment

Tyler Booker started as an intern in the Audit and Compliance department of Carolinas IT in December of 2015. After graduating in 2016 from NC State, Tyler joined Carolinas IT full-time as an Associate Auditor. “I’m pleased to be part of a team that is growing and procuring new opportunities at an accelerated rate,” he says. Tyler was born in …

Cybersecurity Checklist Part 8 – Improving Compliance in Your Organization

Jennifer Noto Security Leave a Comment

Part 1 – The Basics Part 2 – How do you Manage? Part 3 – Tracking Changes, Patching, and Endpoint Security Part 4 – Identifying and Classifying Data, Encryption Strategy, Backup and Disaster Recovery Part 5 – Securing Groups, Assigning Permissions, and Web Monitoring Part 6 – Protecting the Inside of Your Network Part 7 – Risk Management, Security, and …

Cybersecurity Checklist Part 7 – Risk Management, Security, and Metrics Reporting

Jennifer Noto Security Leave a Comment

Part 1 – The Basics Part 2 – How do you Manage? Part 3 – Tracking Changes, Patching, and Endpoint Security Part 4 – Identifying and Classifying Data, Encryption Strategy, Backup and Disaster Recovery Part 5 – Securing Groups, Assigning Permissions, and Web Monitoring Part 6 – Protecting the Inside of Your Network This week’s blog continues to focus on …

The Importance of Multi-Factor Authentication

Jennifer Noto Security Leave a Comment

As the number of data breaches increases, it’s important that users implement as many security controls as possible. Many organizations are moving to multi-factor authentication as an added security measure. What is multi-factor authentication? Multi-factor authentication (also known as two-factor authentication or two-step verification) is a computer access control in which users are granted access only after successfully providing several …

Welcome Jennifer Fralick!

Jennifer Noto News Leave a Comment

Carolinas IT welcomes Jennifer Fralick to our Managed Services team as a Service Desk Coordinator. In her role, she will be assigning tickets to engineers for service requests while providing customer service to our clients. She has over 20 years of experience including Project Management, Operations management, and web design. Before moving to North Carolina 8 years ago, she worked …

Cybersecurity Checklist Part 5 – Securing Groups, Assigning Permissions, and Web Monitoring

Jennifer Noto Security Leave a Comment

Part 1 – The Basics Part 2 – How do you Manage? Part 3 – Tracking Changes, Patching, and Endpoint Security Part 4 – Identifying and Classifying Data, Encryption Strategy, Backup and Disaster Recovery In this week’s blog, we focus on how you can designate access for groups and users within your networks. Network Segmentation – Network segmentation allows your …