Archive for February, 2016

Avoid Cheap USB-C Cables – Or Risk Your Machine

Everybody’s always looking for new ways to save money. A little here, a little there, and before you know it, you can realize significant savings. The problem with that approach, however, is ...

Are Digital Assistants The Future Of Business?

If you use Microsoft products, you’ve no doubt made at least some use of Cortana, the company’s digital assistant function. If you’re in the Apple camp, then Siri has become an increasingly ...

Update Your iPhone To Reduce Your Risk Of Attack

Smartphones rule the world. Even a few years ago, a statement like that would seem silly, but today, silly has become fact. There are more smartphones in active service today than there ...

Thieves Are Buying And Selling Your Information On The Dark Web

Have you been hacked? Has your personal information been compromised? If so, what are you worth? What’s your information selling for? If you’re curious, take a trip to the Dark Web to ...

New Security Exploit Threatens Windows Machines

Have you heard of Hot Potato? It’s the latest security exploit that Windows-based machines are vulnerable to. Note that this doesn’t target a particular version of Windows, but rather, spans everything from ...

Meet Locky, Your New Worst Nightmare

Ransomware is shaping up to be the most significant threat from the hacker community in 2016. Over the last few days, Locky, a new piece of malware has been spreading like a ...

Microsoft Recalls Surface Pro Power Adapters

Do you own a Surface Pro, Surface Pro 2, or Surface Pro 3? If so, and if you made your purchase before March, 2015, you should know that Microsoft has just issued ...

Lost Hard Drives Contain Info On A Million Patients

A health insurer based in St. Louis, called Centene, has “misplaced” six hard drives. Normally that would not be a big deal, but these particular hard drives happened to contain the personal ...

If You’re Using Any Of These Passwords, Stop

Since 2011, a company called SplashDash has posted a “Worst Password List” based on data mined from hacks and data breaches. What’s remarkable about the annual list is how little it changes ...

New Service Automatically Replenishes Items for You

For many months, Amazon has been planning to take the retail game to the next level. Their ambitious plan first became visible with the inclusion of mysterious “Dash Buttons” on various classes ...

Blog

New Cryptomining Malware Targets Windows Computers

New Cryptomining Malware Targets Windows Computers

Since October 2018, Microsoft engineers have been tracking a new strain of malware specifically designed to target Windows machines. As malware[...]
Google’s Cloud Print May Be Discontinued

Google’s Cloud Print May Be Discontinued

Are you a fan of Google's Cloud Print service?  It's fantastic because it allows you to print from anywhere to[...]
New T-Mobile Data Breach Compromised Customer Info

New T-Mobile Data Breach Compromised Customer Info

Recently the US branch of the global telecom company T-Mobile disclosed a security breach that impacted a small percentage of[...]

Locations

Cirrus IT Solutions, LLC

110 Center Park Dr, Ste 102
Knoxville, TN 37922-2114
(865) 977-1311

Greenville

3620 Pelham Rd, Suite 40
Greenville, SC 29615
(843) 800-8989

Mount Pleasant

1156 Bowman Rd, Suite 200
Mount Pleasant, SC 29464
(843) 800-8989

Company

Since 2005, Cirrus IT Solutions has evolved to become a leading provider of IT support and consulting, focusing on small and medium-sized businesses in the Knoxville and Charleston areas. We have helped multiple businesses increase productivity and profitability by making IT a streamlined part of operations. We equip our clients with customized technology solutions for greater operational value and to reduce risk.

Proud Member of

The 20 Elite