888.678.7282    Get SUPPORT

Strata Information Technology Blog

ALERT: Meltdown/Spectre Vulnerability Can Affect Your Business’ Critical Infrastructure

ALERT: Meltdown/Spectre Vulnerability Can Affect Your Business’ Critical Infrastructure

Intel has had publicity problems in the past, but now things are getting critical. An issue was reported that could potentially cause the processing power of their chips to diminish. What are being known as the Meltdown or Spectre vulnerabilities, have businesses scrambling around looking for ways to protect their data and infrastructure from what is seemingly an oversight that affects most of today’s CPU architectures; namely those that rely on virtual memory.

This means that a bug has been discovered that alters the way that different programs communicate with the CPU. Typically, a CPU has two modes: kernel and user. “Kernel” provides users access to the computer and “user” which is typically thought of as the safe mode. The vulnerability that the user who goes by the moniker Python Sweetness discovered was one that allowed users working in user mode, to access kernel mode. This presents a number of potential problems, including creating a gateway for malicious action to be taken against your network.

Fortunately for users a patch has been developed that won’t seriously hinder system performance, a fear shared by some security professionals. In fact, the fix will only cause a minimal dip of around 2 percent. Initially, there were concerns that systems would come out of this much slower as entire processes would effectively be altered between user mode and kernel mode.

For PCs with Windows 10 installed and an antivirus that supports the patch, the fix should already be in place. However, to confirm this, go to Settings > Update & Security to see if there are any updates waiting to be installed. If not, check your update history for Security Update for Windows (KB4056892) or check with your antivirus provider to find out when it will be supported, the patch will not install until it sees that the antivirus has been updated to a version that the vendor verifies supports this patch.

Two days later, an update for Android devices was pushed out to users. Most mobile platforms running Android, should now be protected. To be sure, check regularly. Google Chrome is scheduled to be updated on January 23. In the meantime, consider asking your IT administrator to help you achieve Site Isolation to assist in keeping your network secure.

Other devices (like NAS devices, smart appliances, networking equipment, media equipment, etc.) may also be at risk, as they are using similar hardware. It’s really important for business owners to have their entire infrastructure reviewed and audited.

If you don’t have a comprehensive IT administrator, chances are you are on your own. By having a company like Strata Information Technology looking out for you, you will be able to benefit from having conscientious IT professionals helping you keep your computing infrastructure, network, and data secure, no matter what is thrown at it.
To find out how Strata Information Technology can help your organization with network security, call us at 888.678.7282.

Tip of the Week: Five Ways to Use Your Android Pho...
Improperly Disposing of a Hard Drive Can Threaten ...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, August 21 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Business Computing Technology Managed IT Services Privacy Best Practices Cloud Malware Communications Cybersecurity Hackers Ransomware Backup Productivity Tech Term Software Alert Smartphones Outsourced IT Internet VoIP Network Security IT Support Passwords Business Management Social Media Data Phishing Business Hardware Save Money Microsoft Communication Small Business Data Recovery Microsoft Office Smartphone Data Breach Vulnerability IT Services Android Network App Google Data Backup Twitter Windows 10 Email Hosted Solutions Compliance Business Continuity BDR Apps Law Enforcement Productivity Cloud Computing Blockchain Browser Patch Management Workers Office 365 User Tips Miscellaneous Settings Employer-Employee Relationship Remote Monitoring Scam Excel Saving Money Company Culture Politics Bandwidth Cybercrime Mobile Device Management Government Internet of Things Computer Applications How To Entertainment Facebook Antivirus Recovery Maintenance Password Mobile Device Holiday Retail Office Collaboration Website Computers Users Innovation Education Personal Information Vendor Management Automation Managed IT Service Networking Managing Stress Chrome SaaS Spam Dark Web Virus Access Control Efficiency Wi-Fi Windows Word Virtual Assistant Licensing Voice over IP Amazon Smart Technology Email Management Tech Terms Connectivity Staffing Bring Your Own Device Printer iPhone HaaS Printer Server Tech Support Cortana Gadget Safety Telephone System WannaCry Unified Threat Management HP Biometrics Data loss Travel Workplace Tips Business Intelligence The Internet of Things Regulation Sales Managed Service Provider Cost Management Streaming Media Marketing Technology Tips Hybrid Cloud WiFi Managed IT Cleaning Printers Gadgets Budget Physical Security Current Events Shortcut HIPAA Botnet VPN Document Management Database Leadership Access Router Content Filtering Hiring/Firing Employer Employee Relationship Staff RAM Live Streaming Reporting Tablet Downloads Data Management Backup and Disaster Recovery Cables Plug-In Telephone Systems Data Protection Encryption Computer Care Files Battery Net Neutrality CrashOverride Remote Support Hard Drive Paperless Office Tactics BYOD Gmail Automobile Websites Microsoft Teams WhatsApp Wireless Charging Synergy e-waste Disaster Recovery Medical IT Knowledge Artificial Intelligence Trends Yahoo SSD Voice over Internet Protocol Proactive IT Remote Control IT budget PowerPoint Gaming Console Wireless Processors Digital Internet Explorer Analytics Lead Generation disposal GDPR Comparison Hard Drives A.I. Scalability Phone System DDoS Inventory Information Mobile Devices Remote Monitoring and Management IT Management Sports Video Games Google Maps Emergency Telephony Dongle Worker Apple Edge Threat IaaS Two-factor Authentication News Dark Data Spyware Value Television Information Technology Storage Multi-Factor Security Specifications Avoiding Downtime Movies Credit Cards Mobile Security Paste Augmented Reality Business Technology Instagram Wireless Technology 5G Money Laptop Printing Remote Computing Samsung IBM Error Conferencing Unified Communications eCommerce Operating System Network Attached Storage Managed IT Services Hacker Paper Telecommuting Competition Customer Relationship Management Online Shopping Environment Big Data Server Management IP Address Fun Ink Millennials Customer Service Upgrade Google Drive Mobile Office Hosted Solution Domains File Sharing IT Support Autocorrect User Tip Virtualization Machine Learning Copy Public Speaking Spam Blocking User Security Search Scheduling G Suite Windows 10 Presentation Tip of the week Server Lithium-ion battery Emoji Telecommute VoIP

Newsletter Sign Up