888.678.7282    Get SUPPORT

Strata Information Technology Blog

Strata Information Technology has been serving the Encino area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

ALERT: Meltdown/Spectre Vulnerability Can Affect Your Business’ Critical Infrastructure

ALERT: Meltdown/Spectre Vulnerability Can Affect Your Business’ Critical Infrastructure

Intel has had publicity problems in the past, but now things are getting critical. An issue was reported that could potentially cause the processing power of their chips to diminish. What are being known as the Meltdown or Spectre vulnerabilities, have businesses scrambling around looking for ways to protect their data and infrastructure from what is seemingly an oversight that affects most of today’s CPU architectures; namely those that rely on virtual memory.

This means that a bug has been discovered that alters the way that different programs communicate with the CPU. Typically, a CPU has two modes: kernel and user. “Kernel” provides users access to the computer and “user” which is typically thought of as the safe mode. The vulnerability that the user who goes by the moniker Python Sweetness discovered was one that allowed users working in user mode, to access kernel mode. This presents a number of potential problems, including creating a gateway for malicious action to be taken against your network.

Fortunately for users a patch has been developed that won’t seriously hinder system performance, a fear shared by some security professionals. In fact, the fix will only cause a minimal dip of around 2 percent. Initially, there were concerns that systems would come out of this much slower as entire processes would effectively be altered between user mode and kernel mode.

For PCs with Windows 10 installed and an antivirus that supports the patch, the fix should already be in place. However, to confirm this, go to Settings > Update & Security to see if there are any updates waiting to be installed. If not, check your update history for Security Update for Windows (KB4056892) or check with your antivirus provider to find out when it will be supported, the patch will not install until it sees that the antivirus has been updated to a version that the vendor verifies supports this patch.

Two days later, an update for Android devices was pushed out to users. Most mobile platforms running Android, should now be protected. To be sure, check regularly. Google Chrome is scheduled to be updated on January 23. In the meantime, consider asking your IT administrator to help you achieve Site Isolation to assist in keeping your network secure.

Other devices (like NAS devices, smart appliances, networking equipment, media equipment, etc.) may also be at risk, as they are using similar hardware. It’s really important for business owners to have their entire infrastructure reviewed and audited.

If you don’t have a comprehensive IT administrator, chances are you are on your own. By having a company like Strata Information Technology looking out for you, you will be able to benefit from having conscientious IT professionals helping you keep your computing infrastructure, network, and data secure, no matter what is thrown at it.
To find out how Strata Information Technology can help your organization with network security, call us at 888.678.7282.

Tip of the Week: Five Ways to Use Your Android Pho...
Improperly Disposing of a Hard Drive Can Threaten ...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, 28 May 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Business Computing Privacy Managed IT Services Cloud Technology Best Practices Ransomware Hackers Malware Cybersecurity Internet Productivity Communications Backup Outsourced IT Alert VoIP Software Phishing Business Save Money Microsoft Passwords Business Management Smartphones Hardware Network Security IT Support Smartphone Data Breach Android Social Media Windows 10 IT Services App Vulnerability Twitter Email Miscellaneous User Tips Scam Google Politics Bandwidth Government Settings Business Continuity Data Backup Microsoft Office Workers Cloud Computing Office 365 Remote Monitoring Saving Money Cybercrime Mobile Device Management Excel Data Small Business Law Enforcement Productivity Browser Data Recovery Education Employer-Employee Relationship BDR Efficiency Wi-Fi Virus Computer Communication Entertainment Recovery Word Antivirus Maintenance Mobile Device How To Holiday Applications Office Personal Information Website Patch Management Password Vendor Management Retail Internet of Things Spam Windows Blockchain Chrome Hosted Solutions Computers Access Control Facebook Apps Licensing Networking Current Events Voice over IP The Internet of Things HP Budget VPN iPhone Gadgets Botnet Hiring/Firing disposal Sports IT Management Computer Care Data Management Travel Gadget Dongle Net Neutrality Disaster Recovery Innovation WiFi Users Value Connectivity Automation Tech Terms Gaming Console Content Filtering Router Yahoo Live Streaming Shortcut Data Protection Telephone Systems Tech Term Wireless Video Games Gmail WhatsApp CrashOverride Technology Tips Worker Wireless Charging Information Technology Document Management Television Remote Control Database Avoiding Downtime Dark Web Backup and Disaster Recovery Printer Lead Generation Tactics Biometrics Paperless Office Cortana Google Maps News Managed Service Provider SSD Virtual Assistant Internet Explorer Access Digital Leadership Marketing Managed IT Email Management Staffing Employer Employee Relationship WannaCry Telephone System Inventory Battery Threat BYOD Edge Sales Encryption Physical Security Network Automobile HIPAA Synergy Company Culture Analytics SaaS Tablet Files Data loss Scalability Hard Drive Remote Support Collaboration Hard Drives DDoS IaaS Knowledge Mobile Devices Staff Credit Cards Managed IT Service Smart Technology Processors Two-factor Authentication Dark Data Printer Server HaaS Comparison Emergency Phone System Websites Telephony Spyware Tech Support Unified Threat Management Apple e-waste PowerPoint Printers Safety IT budget Cleaning Specifications Cost Management Multi-Factor Security VoIP Paste Conferencing Competition Fun eCommerce Big Data Business Intelligence Online Shopping Upgrade Autocorrect Virtualization Streaming Media Network Attached Storage Search File Sharing Server Downloads Server Management User Tip Presentation User Security Money Spam Blocking Trends 5G Artificial Intelligence Tip of the week Wireless Technology Windows 10 IBM Hacker Business Technology Machine Learning Remote Computing Customer Relationship Management IP Address Managed IT Services Telecommute Telecommuting Customer Service Mobile Security Printing Mobile Office Laptop Millennials Domains Operating System Paper Scheduling Google Drive IT Support Public Speaking Emoji Hosted Solution Environment Ink Lithium-ion battery Instagram Samsung Augmented Reality Copy

Newsletter Sign Up