888.678.7282    Get SUPPORT

Strata Information Technology Blog

ALERT: Meltdown/Spectre Vulnerability Can Affect Your Business’ Critical Infrastructure

ALERT: Meltdown/Spectre Vulnerability Can Affect Your Business’ Critical Infrastructure

Intel has had publicity problems in the past, but now things are getting critical. An issue was reported that could potentially cause the processing power of their chips to diminish. What are being known as the Meltdown or Spectre vulnerabilities, have businesses scrambling around looking for ways to protect their data and infrastructure from what is seemingly an oversight that affects most of today’s CPU architectures; namely those that rely on virtual memory.

This means that a bug has been discovered that alters the way that different programs communicate with the CPU. Typically, a CPU has two modes: kernel and user. “Kernel” provides users access to the computer and “user” which is typically thought of as the safe mode. The vulnerability that the user who goes by the moniker Python Sweetness discovered was one that allowed users working in user mode, to access kernel mode. This presents a number of potential problems, including creating a gateway for malicious action to be taken against your network.

Fortunately for users a patch has been developed that won’t seriously hinder system performance, a fear shared by some security professionals. In fact, the fix will only cause a minimal dip of around 2 percent. Initially, there were concerns that systems would come out of this much slower as entire processes would effectively be altered between user mode and kernel mode.

For PCs with Windows 10 installed and an antivirus that supports the patch, the fix should already be in place. However, to confirm this, go to Settings > Update & Security to see if there are any updates waiting to be installed. If not, check your update history for Security Update for Windows (KB4056892) or check with your antivirus provider to find out when it will be supported, the patch will not install until it sees that the antivirus has been updated to a version that the vendor verifies supports this patch.

Two days later, an update for Android devices was pushed out to users. Most mobile platforms running Android, should now be protected. To be sure, check regularly. Google Chrome is scheduled to be updated on January 23. In the meantime, consider asking your IT administrator to help you achieve Site Isolation to assist in keeping your network secure.

Other devices (like NAS devices, smart appliances, networking equipment, media equipment, etc.) may also be at risk, as they are using similar hardware. It’s really important for business owners to have their entire infrastructure reviewed and audited.

If you don’t have a comprehensive IT administrator, chances are you are on your own. By having a company like Strata Information Technology looking out for you, you will be able to benefit from having conscientious IT professionals helping you keep your computing infrastructure, network, and data secure, no matter what is thrown at it.
To find out how Strata Information Technology can help your organization with network security, call us at 888.678.7282.

Tip of the Week: Five Ways to Use Your Android Pho...
Improperly Disposing of a Hard Drive Can Threaten ...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, November 21 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Business Computing Technology Managed IT Services Privacy Cloud Best Practices Network Security Internet Cybersecurity Malware Hackers Tech Term Communications Outsourced IT Software Backup VoIP Ransomware Passwords IT Support Productivity Smartphones Alert Business Management Microsoft Communication Efficiency Browser User Tips Social Media Business Windows 10 Data Network Small Business Data Backup Save Money Productivity Hosted Solutions Users Phishing Hardware Data Recovery Google Cloud Computing Email Twitter Vulnerability Apps Microsoft Office Internet of Things Mobile Device Smartphone Miscellaneous Saving Money IT Services Android Data Breach App Bandwidth Patch Management Excel Government Company Culture Politics Networking Settings Office 365 Law Enforcement Innovation Business Continuity Access Control Applications BDR Workplace Tips Blockchain Employer-Employee Relationship Mobile Device Management Compliance Workers Remote Monitoring Scam Collaboration Wi-Fi Cybercrime Computer Automation Managing Stress SaaS Marketing Information Managed IT Service Windows Dark Web Chrome Website Antivirus Virus Connectivity Word Entertainment Facebook Holiday Virtual Assistant Recovery Maintenance Password Spam Wireless How To Education Retail Office Vendor Management Computers Personal Information BYOD Content Filtering Outlook Disaster Recovery e-waste HIPAA Regulation Hard Drives Artificial Intelligence Router Trends DDoS SSD Live Streaming Voice over Internet Protocol Tech Support Gaming Console IT budget PowerPoint Tablet Troubleshooting Files Analytics Digital Telephone Systems Internet Explorer Data Protection Touchscreen Safety A.I. Gmail Managed Service The Internet of Things Dark Data disposal Remote Support Hard Drive Reporting Scalability Phone System Avoiding Downtime Inventory WhatsApp Wireless Charging Plug-In Gadgets Budget Video Games Google Maps IT Management Sports Knowledge VoIPMyths Worker Cortana Dongle IaaS Edge Remote Control Threat Microsoft Office 365 Movies Profitability Television Information Technology Unified Threat Management Spyware Value Processors Medical IT Credit Cards Smart Technology Amazon Lead Generation Proactive IT Staffing Managed Service Provider Cost Management Tech Terms Comparison VoIPSavings Printer Emergency Bring Your Own Device Telephony HaaS Printer Server Managed IT Authentication Data loss Eliminating Downtime Biometrics Botnet VPN HP Apple GDPR Gadget Hiring/Firing Employer Employee Relationship Update Business Intelligence News Remote Monitoring and Management Multi-Factor Security Streaming Media Specifications Battery Data Management Technology Tips Licensing Hybrid Cloud Voice over IP Cleaning Printers Encryption Email Management Authorization Automobile Staff RAM Wireless Internet Leadership Access Document Management Database iPhone Storage Current Events Shortcut Technology Efficiently Mobile Devices Synergy Telephone System WannaCry Downloads Yahoo Backup and Disaster Recovery Travel Cables Two-factor Authentication Computer Care Sales CrashOverride Websites Physical Security Microsoft Teams Help Desk Paperless Office Tactics WiFi Error Net Neutrality Augmented Reality Hosted Solution Online Shopping Search Scheduling Wireless Technology 5G Server Millennials IBM Machine Learning Emoji Hacker Copy Instagram Google Drive Windows 10 Samsung IT Support G Suite Customer Relationship Management Money File Sharing Competition Telecommute User Tip Big Data IP Address VoIP Paste Mobile Security Customer Service Laptop Spam Blocking Printing User Security Unified Communications Tip of the week Upgrade Mobile Office Domains Operating System Managed IT Services Network Attached Storage Fun Paper Business Technology Remote Computing Public Speaking Environment Server Management Conferencing eCommerce Ink Quick Tips Presentation Virtualization Telecommuting Autocorrect Lithium-ion battery

Newsletter Sign Up