Archive for August, 2017

Hackers Can Now Change Email Content With Exploit

Security researchers from firms around the web are warning of a new email exploit that hackers can use to modify the contents of an email, even after it has been sent and ...

Are LED Lights Going To Be The Next Wi-Fi?

Would modern life even be possible without Wi-Fi? There are many who don’t think so, and you may be one of them. One of the biggest problems with it, though, is that ...

Mac Adware Infection Requires Complete Reload For Removal

Mac users have a new strain of malware to be concerned about. It is dubbed “Mughthesec,” which seems to be a new, improved, and more robust design, based on an older piece ...

Locky Ransomware Just Won’t Go Away

For a time, Locky ransomware was the scourge of the internet and was considered by many security experts to be the most widely distributed form of malware on the internet. Things change, ...

Even After Wannacry, Many Companies Are Still Ignoring Network Security

Remember the global Wannacry ransomware attack? Remember the even more recent Petya attacks? You would think after either of these, IT professionals around the world would have stepped up and immediately implemented ...

Company Data Breach Costs Nationwide $5.5 Million In Settlement

Nationwide may be “on your side,” as their ads claim, but they’re not immune to data breaches, and in 2012, they suffered a serious one that impacted more than 1.2 million of ...

Majority Of Windows Users Allowing Full Collection In Privacy Settings

Microsoft’s increased transparency in recent years is winning it high marks and added trust among the company’s massive user base, at least according to the recent report offered by Marisa Rogers. Rogers ...

Attacks On Networks Continue Rise At Alarming Rate In 2017

This year is on track to win the dubious honor of seeing more hacking attacks than any year since statistics have been kept, and should handily beat out 2016’s total, which currently ...

Attack Finds Employee Personal Account Use, Password Security To Blame

Even cybersecurity companies struggle with data security. Case in point: FireEye, a well-known and well-respected player in the industry, has had this struggle. Recently, they fell victim to a successful hacking attack ...

Update Windows With Latest Patch To Fix Windows Search Bug

Microsoft just released its August 2017 security patch, as is customary on Patch Tuesday, which, by itself, is not news. The importance of this particular security update, however, is extremely newsworthy, and ...

Blog

Multi-Factor Authentication (MFA)

Multi-Factor Authentication (MFA)

All Two-Factor Authentication (2FA) is Multi-Factor Authentication (MFA), but not all MFA is 2FA. Multi-Factor Authentication works on the principle[...]
ISO Files Are Being Used To Deliver Malware

ISO Files Are Being Used To Deliver Malware

Researchers at Trustwave have observed a notable increase in the use of .ISO files to deliver malware. Hackers have relied[...]
Message Recall Feature May Be Added To Office 365

Message Recall Feature May Be Added To Office 365

For a while now, Microsoft Outlook users have enjoyed a highly popular addition to their email service. In a nutshell,[...]

Locations

Cirrus IT Solutions, LLC

110 Center Park Dr, Ste 102
Knoxville, TN 37922-2114
(865) 977-1311

Greenville

3620 Pelham Rd, Suite 40
Greenville, SC 29615
(843) 800-8989

Mount Pleasant

1156 Bowman Rd, Suite 200
Mount Pleasant, SC 29464
(843) 800-8989

Company

Since 2005, Cirrus IT Solutions has evolved to become a leading provider of IT support and consulting, focusing on small and medium-sized businesses in the Knoxville and Charleston areas. We have helped multiple businesses increase productivity and profitability by making IT a streamlined part of operations. We equip our clients with customized technology solutions for greater operational value and to reduce risk.

Proud Member of

The 20 Elite