Archive for February, 2016

Avoid Cheap USB-C Cables – Or Risk Your Machine

Everybody’s always looking for new ways to save money. A little here, a little there, and before you know it, you can realize significant savings. The problem with that approach, however, is ...

Are Digital Assistants The Future Of Business?

If you use Microsoft products, you’ve no doubt made at least some use of Cortana, the company’s digital assistant function. If you’re in the Apple camp, then Siri has become an increasingly ...

Update Your iPhone To Reduce Your Risk Of Attack

Smartphones rule the world. Even a few years ago, a statement like that would seem silly, but today, silly has become fact. There are more smartphones in active service today than there ...

Thieves Are Buying And Selling Your Information On The Dark Web

Have you been hacked? Has your personal information been compromised? If so, what are you worth? What’s your information selling for? If you’re curious, take a trip to the Dark Web to ...

New Security Exploit Threatens Windows Machines

Have you heard of Hot Potato? It’s the latest security exploit that Windows-based machines are vulnerable to. Note that this doesn’t target a particular version of Windows, but rather, spans everything from ...

Meet Locky, Your New Worst Nightmare

Ransomware is shaping up to be the most significant threat from the hacker community in 2016. Over the last few days, Locky, a new piece of malware has been spreading like a ...

Microsoft Recalls Surface Pro Power Adapters

Do you own a Surface Pro, Surface Pro 2, or Surface Pro 3? If so, and if you made your purchase before March, 2015, you should know that Microsoft has just issued ...

Lost Hard Drives Contain Info On A Million Patients

A health insurer based in St. Louis, called Centene, has “misplaced” six hard drives. Normally that would not be a big deal, but these particular hard drives happened to contain the personal ...

If You’re Using Any Of These Passwords, Stop

Since 2011, a company called SplashDash has posted a “Worst Password List” based on data mined from hacks and data breaches. What’s remarkable about the annual list is how little it changes ...

New Service Automatically Replenishes Items for You

For many months, Amazon has been planning to take the retail game to the next level. Their ambitious plan first became visible with the inclusion of mysterious “Dash Buttons” on various classes ...

Blog

Biometric Breach Exposes Fingerprints, Facial Data And Personal Info

Biometric Breach Exposes Fingerprints, Facial Data And Personal Info

Do you employ a biometric security solution at your company to control building access? If your solution employs BioStar 2 technology[...]
New Charging Cables Could Hack Your Devices

New Charging Cables Could Hack Your Devices

A security researcher known as "_MG_" on Twitter has invented a modified Apple Lightning cable that could allow a hacker[...]
New Adware Uses Interesting Technique To Avoid Detection

New Adware Uses Interesting Technique To Avoid Detection

Being more of a nuisance than anything, adware doesn't see as many innovations as other forms of malware. Once in[...]

Locations

Maryville

508 W Broadway Ave
Maryville, TN 37801
(865) 977-1311

Mount Pleasant

1156 Bowman Rd, Suite 200
Mount Pleasant, SC 29464
(843) 800-8989

Knoxville

118 N Peters Rd, Suite 326
Knoxville, TN 37923
(865) 977-1311

Greenville

3620 Pelham Rd, Suite 40
Greenville, SC 29615
(843) 800-8989

Company

Since 2005, Cirrus IT Solutions has evolved to become a leading provider of IT support and consulting, focusing on small and medium-sized businesses in the Knoxville and Charleston areas. We have helped multiple businesses increase productivity and profitability by making IT a streamlined part of operations. We equip our clients with customized technology solutions for greater operational value and to reduce risk.

Proud Member of

The 20 Elite