2011 - Carceron CEO Chad Massaker chairs the annual Flourish Awards, a KSU College of the Arts program to honor supporters of the arts in Metro Atlanta, raising over $80,000 dollars for art's scholarships.
2011 - Carceron hosts a special VIP reception and play viewing for clients and friends at Theatre in the Square. (Carceron is an annual sponsor of the Theatre)
2006 - Carceron awarded Top 25 Small Business of the Year by the Cobb County Chamber of Commerce for the second year in a row
2006 - Chad Massaker accepted into Leadership Cobb
2006 - Chad Massaker becomes the most recommended IT Consultant on Linkedin in Atlanta, third most in the United States. Combined with the recommendations of other Carceron employees, Carceron becomes the most customer recommended IT firm on Linkedin in Atlanta.
2005 - Carceron sponsors author and sports psycholgist Jack Llewellyn at the CRBA luncheon (photos)
2005 - Carceron assists the YWCA of North GA with housing and clothing for a women's sheltered that was displaced with Hurrican Katrina
2005 - Carceron is award a business community service award from the Cobb County Chamber of Commerce
2005 - Carceron awarded Top 25 Small Business of the Year by the Cobb County Chamber of Commerce
2004 - Carceron moves into commercial office space in Kennesaw, Georgia (photos)
2004 - Carceron & Elite Telecom Services sponsor Truett Cathy, CEO of Chic-fil-a at the Kennesaw Business Association Luncheon (photos)
2002 - Chad and Jeff reunite to form Carceron. Several clients are enrolled in Carceron's managed services program. The Carceron office is an apartment in Kennesaw, Georgia.
1999 - Chad goes to work as the IT director for Sentry Hospitality. Jeffrey goes on to form his own IT consulting firm.
The Internet is a great tool to use for business, but it’s also full of threats that could undermine your security if you’re careless. The main issue with cyber security is that it’s extraordinarily difficult to cover all of your bases, especially if you’re not tech-savvy. We’ll go over, in detail, some of the many security best practices that you can implement to keep your sensitive information a...