Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

ALERT: Make Sure Your Business is Safe from Meltdown and Spectre

ALERT: Make Sure Your Business is Safe from Meltdown and Spectre

Intel recently found itself (once again) in hot water, mere months after many flaws were discovered in the firmware that enables all of their chips to do their job. This time, the issue could have potentially caused a permanent dip in the CPU’s capacity to function properly. This has come to be known as the Meltdown vulnerability.

This issue was first reported in a blog maintained by an unknown user identified only as Python Sweetness, who summed up what they described as “an embargoed security bug impacting apparently all contemporary CPU architectures that implement virtual memory, requiring hardware changes to fully resolve.”

In other words, a bug had been discovered that messed with how different programs could interact with the CPU. Normally, the CPU has two modes: kernel, which allows complete, carte blanche access to the computer itself, and user, which is supposed to be the ‘safe’ mode. The issue that Python Sweetness discovered was that the bug allowed programs that were run in user mode to access kernel mode. This could potentially open the door for malicious programs and malware to access a user’s hardware itself and see anything that’s going on in protected memory space, meaning programs could gain access to memory being used by other programs, or in the case of virtual machines they could cross-talk between VMs as well.

Fortunately, a fix has been developed that will likely only cause a 2% dip in system performance, a greatly lesser sacrifice than what was initially expected. Originally, it was assumed that entire processes would be shifted from user mode to kernel mode and back again, slowing the entire system down considerably. There has since been a Windows update to mitigate the CPU issue, despite the expectation that it would take a hardware change to implement it.

For PCs with Windows 10 installed, and an antivirus that supports the patch, the fix should already be in place. However, to confirm this, go to Settings > Update & Security to see if there are any updates waiting to be installed. If not, check your update history for Security Update for Windows (KB4056892), or check with your antivirus provider to find out when it will be supported, the patch will not install until it sees that the antivirus has been updated to a version that the vendor verifies supports this patch.

If you have an Android device, there was an update on January 5 that provided mitigations, with the promise of further updates to add to these protections. Google-branded phones, including the Nexus and Pixel lines, should have already received the patches, and other Android phones may have as well. It is something that you should check, and if you haven’t received an update yet, reach out to your carrier and ask why (posting publicly can get you extra points).

An update to Google Chrome is expected on January 23, with other browsers following suit, that will also include mitigations. In the meantime, ask your IT resource to help you activate Site Isolation to help keep a malicious website from accessing your data from another tab.

Other devices (like NAS devices, smart appliances, networking equipment, media equipment, etc.) may also be at risk, as they are using similar hardware. It’s really important for business owners to have their entire infrastructure reviewed and audited.

Issues like these are exactly why businesses need a managed service provider looking out for them. An MSP, like Voyage Technology, would have heard about this issue and its associated update (or any issue/update, for that matter) and taken the actions needed to resolve it.

This is all done without the business needing to worry about handling any of it, freeing its internal staff to complete projects that generate profit, rather than work to maintain operations and security.
For more ways that an MSP can benefit your crew, reach out to us at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 29 October 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Hackers Cloud Network Security Hardware User Tips Efficiency Internet Malware IT Support Privacy Google Workplace Tips Computer Phishing Email Collaboration IT Services Hosted Solutions Users Workplace Strategy Ransomware Microsoft Mobile Device Small Business Quick Tips Passwords Backup Saving Money Communication Cybersecurity Data Backup Managed Service Smartphone Productivity Android Upgrade Business Management VoIP Smartphones Data Recovery Mobile Devices communications Windows Disaster Recovery AI Browser Social Media Microsoft Office Managed IT Services Current Events Network Remote Tech Term Internet of Things Information Automation Artificial Intelligence Facebook Holiday Training Covid-19 Miscellaneous Gadgets Cloud Computing Server Managed Service Provider Remote Work Outsourced IT IT Support Employee/Employer Relationship Encryption Spam Compliance Office Windows 10 Data Management Business Continuity Government Blockchain Business Technology Windows 10 Bandwidth Virtualization Wi-Fi Two-factor Authentication Mobile Office Vendor Data Security Apps Mobile Device Management Tip of the week Chrome Gmail Budget Apple Networking Managed Services Voice over Internet Protocol App Employer-Employee Relationship BYOD Information Technology Avoiding Downtime HIPAA Access Control Marketing Office 365 Applications WiFi Conferencing How To BDR Computing Hacker Virtual Private Network Risk Management Website Health Router Analytics Office Tips Augmented Reality Retail Storage 2FA Help Desk Password Bring Your Own Device Big Data Managed IT Services Healthcare Operating System Computers Display Microsoft 365 Printer Paperless Office Solutions Infrastructure Firewall Document Management Windows 11 Monitoring The Internet of Things Scam Excel Data loss Social Remote Workers Telephone Going Green Patch Management Save Money Remote Monitoring Vulnerability End of Support Cooperation Free Resource Customer Service Vendor Management Cybercrime Project Management Windows 7 Physical Security Telephone System Multi-Factor Authentication Mobility Cryptocurrency Wireless Technology Cost Management Computer Repair Virtual Desktop Data storage LiFi Employees Word Integration Outlook Machine Learning User Tip Modem Money Processor Mobile Security Humor Holidays Data Storage Safety Maintenance Sports Smart Technology Supply Chain Antivirus Mouse Video Conferencing Managed Services Provider Saving Time Virtual Machines Professional Services Administration Managed IT Service Downloads Robot iPhone Licensing Customer Relationship Management Settings Printing Entertainment Wireless Vulnerabilities Data Privacy Content Filtering Hacking IT Management Presentation VPN YouTube Meetings Images 101 Organization Social Networking Legislation Shortcuts Point of Sale Fileless Malware Digital Security Cameras 5G Smart Devices Ransmoware Wearable Technology Memory Vendors IP Address Google Docs Unified Communications Experience Content Remote Working Running Cable Tech Support Health IT Motherboard Data Breach Comparison Google Play Be Proactive Bitcoin Network Management Google Wallet Directions Videos Monitors Assessment Electronic Health Records Permissions Workforce Wasting Time Threats Recovery Laptop Websites Trend Micro Specifications Security Cameras Workplace Strategies Hard Drives Windows 8 Domains Drones Microchip Internet Exlporer Software as a Service Fraud Meta Managing Costs Amazon SharePoint Electronic Medical Records Username Halloween eCommerce Black Friday SSID Refrigeration Public Speaking Lenovo Writing Database Surveillance Virtual Assistant Outsource IT IT Technicians Virtual Machine Environment Lithium-ion battery Media Virtual Reality Entrepreneur Scary Stories Private Cloud Proxy Server Reviews Cookies Cyber Monday Medical IT Hacks Server Management Hotspot Transportation Small Businesses Superfish Identity Theft Fun Tactics Development Mirgation Hypervisor Displays Deep Learning Twitter Error Shopping Nanotechnology Optimization PowerPoint Undo Language Employer/Employee Relationships Outsourcing Education Social Engineering Addiction Management PCI DSS Chatbots Navigation Remote Computing Gig Economy Screen Reader Distributed Denial of Service Workplace Mobile Computing Computing Infrastructure Teamwork Hiring/Firing Tablet Search Service Level Agreement Internet Service Provider Regulations Compliance Identity Evernote Paperless Application Best Practice Alert Managed IT Buisness File Sharing Bookmark Dark Data Smart Tech Memes Co-managed IT Alerts SQL Server Technology Care IBM Legal IT solutions How To Download Net Neutrality Notifications Financial Data History Business Communications Business Growth Travel Browsers Smartwatch Connectivity IT Break Fix Scams Azure Hybrid Work Techology Google Maps Cortana Upload Procurement Social Network Telework Cyber security Multi-Factor Security Tech Human Resources Alt Codes Competition Downtime Unified Threat Management CES IoT Communitications Dark Web Cables Unified Threat Management Hosted Solution Trends Supply Chain Management Customer Resource management FinTech Regulations Google Calendar Term Google Apps Typing Data Analysis Network Congestion Star Wars IT Assessment Microsoft Excel IT Maintenance Staff Value Business Intelligence Google Drive User Error User Knowledge Gamification Flexibility

Blog Archive