888.678.7282    Get SUPPORT

Strata Information Technology Blog

ALERT: Meltdown/Spectre Vulnerability Can Affect Your Business’ Critical Infrastructure

ALERT: Meltdown/Spectre Vulnerability Can Affect Your Business’ Critical Infrastructure

Intel has had publicity problems in the past, but now things are getting critical. An issue was reported that could potentially cause the processing power of their chips to diminish. What are being known as the Meltdown or Spectre vulnerabilities, have businesses scrambling around looking for ways to protect their data and infrastructure from what is seemingly an oversight that affects most of today’s CPU architectures; namely those that rely on virtual memory.

This means that a bug has been discovered that alters the way that different programs communicate with the CPU. Typically, a CPU has two modes: kernel and user. “Kernel” provides users access to the computer and “user” which is typically thought of as the safe mode. The vulnerability that the user who goes by the moniker Python Sweetness discovered was one that allowed users working in user mode, to access kernel mode. This presents a number of potential problems, including creating a gateway for malicious action to be taken against your network.

Fortunately for users a patch has been developed that won’t seriously hinder system performance, a fear shared by some security professionals. In fact, the fix will only cause a minimal dip of around 2 percent. Initially, there were concerns that systems would come out of this much slower as entire processes would effectively be altered between user mode and kernel mode.

For PCs with Windows 10 installed and an antivirus that supports the patch, the fix should already be in place. However, to confirm this, go to Settings > Update & Security to see if there are any updates waiting to be installed. If not, check your update history for Security Update for Windows (KB4056892) or check with your antivirus provider to find out when it will be supported, the patch will not install until it sees that the antivirus has been updated to a version that the vendor verifies supports this patch.

Two days later, an update for Android devices was pushed out to users. Most mobile platforms running Android, should now be protected. To be sure, check regularly. Google Chrome is scheduled to be updated on January 23. In the meantime, consider asking your IT administrator to help you achieve Site Isolation to assist in keeping your network secure.

Other devices (like NAS devices, smart appliances, networking equipment, media equipment, etc.) may also be at risk, as they are using similar hardware. It’s really important for business owners to have their entire infrastructure reviewed and audited.

If you don’t have a comprehensive IT administrator, chances are you are on your own. By having a company like Strata Information Technology looking out for you, you will be able to benefit from having conscientious IT professionals helping you keep your computing infrastructure, network, and data secure, no matter what is thrown at it.
To find out how Strata Information Technology can help your organization with network security, call us at 888.678.7282.

Tip of the Week: Five Ways to Use Your Android Pho...
Improperly Disposing of a Hard Drive Can Threaten ...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, February 15 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Business Computing Technology Best Practices Managed IT Services Privacy Cloud Network Security Malware Internet Hackers Communications User Tips Cybersecurity Tech Term Software Productivity Ransomware Backup IT Support Microsoft Passwords Business Management Smartphones Outsourced IT Efficiency VoIP Email Productivity Data Alert Business Hardware Communication Small Business Data Recovery Browser IT Services Innovation Network Google Data Backup Social Media Windows 10 Cloud Computing Mobile Device Smartphone Microsoft Office Holiday Phishing Collaboration Users Save Money Hosted Solutions Business Continuity Apps Data Breach Vulnerability Android Miscellaneous App Saving Money Bandwidth Twitter Access Control Internet of Things Computer Compliance BDR Applications Facebook Law Enforcement Workplace Tips Blockchain Patch Management Workers Settings Employer-Employee Relationship Office 365 Personal Information Excel Remote Monitoring Scam Company Culture Cybercrime Networking Politics Government Wireless Mobile Device Management Mobile Devices Wi-Fi Connectivity How To Entertainment Recovery Antivirus Maintenance Password Marketing Retail Office Data Security Computers Website Education BYOD Medical IT Automation Managed IT Service Vendor Management Dark Web Managing Stress Chrome SaaS Virus Spam Information Remote Monitoring and Management Word Windows Virtual Assistant Tech Terms Staffing Technology Efficiently Licensing Voice over IP Amazon Smart Technology instant Messaging Email Management Cortana Bring Your Own Device Printer iPhone HaaS Printer Server Data loss Gadget Help Desk Telephone System WannaCry Unified Threat Management HP Tech Support Biometrics Error Streaming Media Safety Outlook Travel Business Intelligence Regulation Vulnerabilities Sales Managed Service Provider Cost Management Troubleshooting Physical Security Technology Tips Hybrid Cloud The Internet of Things Healthcare WiFi Managed IT Cleaning Printers Router Content Filtering Hiring/Firing Employer Employee Relationship Staff RAM Current Events Shortcut Certification HIPAA Botnet VPN Document Management Database Gadgets Budget Leadership Access Touchscreen Downloads Managed Service Live Streaming Reporting Tablet VoIPMyths Files Battery Data Management Backup and Disaster Recovery Cables Plug-In Telephone Systems Data Protection Encryption Computer Care Gmail Automobile Websites Microsoft Teams Net Neutrality CrashOverride Mobility Remote Support Hard Drive Paperless Office Tactics Microsoft Office 365 Artificial Intelligence Trends Profitability WhatsApp Wireless Charging Synergy e-waste Disaster Recovery Knowledge Gaming Console VoIPSavings Yahoo SSD Voice over Internet Protocol Upgrade Proactive IT E-Commerce Remote Control IT budget PowerPoint Authentication Training Processors Digital Internet Explorer Analytics A.I. Scalability Phone System Eliminating Downtime Lead Generation disposal GDPR Comparison Hard Drives Video Games Google Maps Update Emergency Telephony DDoS Inventory Payment IT Management Sports Authorization Dongle Worker Security Cameras Apple Edge Threat IaaS Avoiding Downtime Movies Credit Cards Wireless Internet News Dark Data Spyware Value Two-factor Authentication Television Information Technology Storage Multi-Factor Security Specifications Lithium-ion battery Mobile Security Paste Business Technology Instagram Quick Tips Remote Computing Samsung Augmented Reality Wearables Money Laptop Printing Conferencing Unified Communications Wireless Technology 5G Network Attached Storage Managed IT Services eCommerce Operating System IBM Telecommuting Paper Hacker Server Management Competition Online Shopping Environment Customer Relationship Management Cryptocurrency Millennials Big Data Fun Ink IP Address Customer Service Google Drive IT Support Hosted Solution File Sharing Mobile Office User Tip Virtualization Domains Autocorrect Machine Learning Copy Spam Blocking User Security Search Scheduling Tip of the week Server G Suite Public Speaking Windows 10 Telecommute Presentation VoIP Emoji

Newsletter Sign Up