Carolinas IT’s Incident Response to Emotet Attacks

Jennifer Noto News Leave a Comment

Emotet is the latest malware that is causing massive infections. This type of malware is known for its worm-like features allowing it to rapidly propagate across the network stealthily with a very low detection rate.  Even worse, it’s difficult to remediate without completely re-imaging an infected machine. Furthermore, this type of malware is a known “dropper,” meaning that once it’s …

The Benefits of Security Training

Jennifer Noto News Leave a Comment

As phishing, malware, and ransomware attacks continue to rise, it’s imperative organizations improve their security strategy. Conducting periodic security training is helpful to ensure all users are familiar with current security trends and attack vectors that malicious entities will use. By being aware of these vectors, your network and data will be more secure and less likely to be breached …

Employee Spotlight – Soumitra Choudhury

Jennifer Noto News Leave a Comment

Soumitra Choudhury is a Technical Support Specialist. He has been with Carolinas IT for two and a half years. “My favorite part of my job,” he says “Is the moment you’ve corrected an issue for your client and everything returns to normal for them.” Soumitra is originally from Chicago and enjoys rooting for the Bears. He also roots for the …

Together We Win

Jennifer Noto News Leave a Comment

As Carolinas IT entered its 23rd year of business, CEO and Founder Mark Cavaliero wanted his team to have a motivational theme to focus on all year long. “I wanted our employees to have a cohesive statement to fall back on all year long as a reminder for who we are and what we do,” said Cavaliero. This year’s theme …

Improving Your Security Posture – The Benefits of a SIEM-SOC Solution

Jennifer Noto News Leave a Comment

Over the last few weeks, we’ve provided three tactics you can implement to improve your organization’s security posture. If you’ve already implemented these practices into your security strategy, congratulations! You’re already doing more than most organizations are. Let’s discuss how you can do even more to keep your network secure in this final post of this blog series. Security Information …

Employee Spotlight – Dave Shapiro

Jennifer Noto News Leave a Comment

Dave Shapiro is a Senior Systems Engineer who is part of our Professional Services team. He has been with Carolinas IT for almost six months. Dave is a rare original North Carolinian and really enjoys working for Carolinas IT. “The team is fantastic and very supportive,” he says. “I really appreciate and value that ‘Integrity’ is one of the core …

Improving Your Security Posture – Account Management

Jennifer Noto News Leave a Comment

Over the past few weeks, we’ve shared some tactics you can implement to improve the security posture of your organization, such as conducting a Security Risk Assessment or maintaining the security of your privileged accounts. This post explores the importance of best practices for user account management. All user accounts in your network should only be assigned to active staff …

Improving Your Security Posture-Privileged Access Management

Jennifer Noto News Leave a Comment

Last week we shared the importance of conducting Security Risk Assessments as part of our blog series dedicated to improving your security posture. This week we’re focusing on Privileged Access Management. What is Privileged Access Management (PAM)? PAM is a secure way to monitor all the privileged accounts across your organization. Ensuring that your users and the accounts on your …

Carolinas IT Announces New Partnership With InfusionPoints

Jennifer Noto News Leave a Comment

Carolinas IT is launching a new partnership with InfusionPoints to deliver a managed security solution for clients across all markets including health, government, education, and technology. The Security Information and Event Management (SIEM) solution provides a proactive approach to event monitoring with real-time alerts, trend analysis, and threat intelligence. A Security Operations Center (SOC) is a specialized group of cybersecurity …

Improving Your Security Posture – Security Risk Assessments

Jennifer Noto News Leave a Comment

Security is often an afterthought for many organizations until they experience a data breach incident. Security should be a primary consideration when conducting an operational review. Security should no longer be a bolt-on service or convenient use of remaining budgetary funds. Some businesses are unsure of where to begin. In this short series of blogs, we’ll explore some of easiest …