Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

ALERT: Make Sure Your Business is Safe from Meltdown and Spectre

ALERT: Make Sure Your Business is Safe from Meltdown and Spectre

Intel recently found itself (once again) in hot water, mere months after many flaws were discovered in the firmware that enables all of their chips to do their job. This time, the issue could have potentially caused a permanent dip in the CPU’s capacity to function properly. This has come to be known as the Meltdown vulnerability.

This issue was first reported in a blog maintained by an unknown user identified only as Python Sweetness, who summed up what they described as “an embargoed security bug impacting apparently all contemporary CPU architectures that implement virtual memory, requiring hardware changes to fully resolve.”

In other words, a bug had been discovered that messed with how different programs could interact with the CPU. Normally, the CPU has two modes: kernel, which allows complete, carte blanche access to the computer itself, and user, which is supposed to be the ‘safe’ mode. The issue that Python Sweetness discovered was that the bug allowed programs that were run in user mode to access kernel mode. This could potentially open the door for malicious programs and malware to access a user’s hardware itself and see anything that’s going on in protected memory space, meaning programs could gain access to memory being used by other programs, or in the case of virtual machines they could cross-talk between VMs as well.

Fortunately, a fix has been developed that will likely only cause a 2% dip in system performance, a greatly lesser sacrifice than what was initially expected. Originally, it was assumed that entire processes would be shifted from user mode to kernel mode and back again, slowing the entire system down considerably. There has since been a Windows update to mitigate the CPU issue, despite the expectation that it would take a hardware change to implement it.

For PCs with Windows 10 installed, and an antivirus that supports the patch, the fix should already be in place. However, to confirm this, go to Settings > Update & Security to see if there are any updates waiting to be installed. If not, check your update history for Security Update for Windows (KB4056892), or check with your antivirus provider to find out when it will be supported, the patch will not install until it sees that the antivirus has been updated to a version that the vendor verifies supports this patch.

If you have an Android device, there was an update on January 5 that provided mitigations, with the promise of further updates to add to these protections. Google-branded phones, including the Nexus and Pixel lines, should have already received the patches, and other Android phones may have as well. It is something that you should check, and if you haven’t received an update yet, reach out to your carrier and ask why (posting publicly can get you extra points).

An update to Google Chrome is expected on January 23, with other browsers following suit, that will also include mitigations. In the meantime, ask your IT resource to help you activate Site Isolation to help keep a malicious website from accessing your data from another tab.

Other devices (like NAS devices, smart appliances, networking equipment, media equipment, etc.) may also be at risk, as they are using similar hardware. It’s really important for business owners to have their entire infrastructure reviewed and audited.

Issues like these are exactly why businesses need a managed service provider looking out for them. An MSP, like Voyage Technology, would have heard about this issue and its associated update (or any issue/update, for that matter) and taken the actions needed to resolve it.

This is all done without the business needing to worry about handling any of it, freeing its internal staff to complete projects that generate profit, rather than work to maintain operations and security.
For more ways that an MSP can benefit your crew, reach out to us at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 26 July 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud Network Security User Tips Efficiency Hardware Internet Malware IT Support Privacy Google Computer Email Workplace Tips Phishing Hosted Solutions IT Services Users Collaboration Mobile Device Workplace Strategy Ransomware Quick Tips Small Business Cybersecurity Microsoft Backup Passwords Communication Data Backup Saving Money Smartphone Android Managed Service VoIP Smartphones Business Management Mobile Devices communications Upgrade Disaster Recovery Data Recovery Social Media Productivity Browser Microsoft Office Windows Managed IT Services Current Events AI Network Remote Tech Term Internet of Things Automation Artificial Intelligence Facebook Gadgets Covid-19 Cloud Computing Holiday Miscellaneous Information Remote Work Training Server Managed Service Provider Outsourced IT Encryption Spam Employee/Employer Relationship Compliance Office Windows 10 Government Data Management Business Continuity Blockchain Wi-Fi Business Technology IT Support Windows 10 Bandwidth Virtualization Data Security Apps Vendor Two-factor Authentication Mobile Office App Employer-Employee Relationship BYOD Mobile Device Management Managed Services Chrome Voice over Internet Protocol Gmail Budget Apple Networking How To BDR HIPAA Applications Computing Hacker Information Technology Avoiding Downtime Marketing Access Control Office 365 Tip of the week Conferencing WiFi Router Operating System Computers Virtual Private Network Risk Management Website Health Help Desk Office Tips Analytics Augmented Reality Healthcare Retail Storage Password Bring Your Own Device Big Data Managed IT Services Social Windows 7 Microsoft 365 Going Green Patch Management Save Money Remote Monitoring Solutions Vulnerability End of Support Vendor Management Customer Service Cybercrime Physical Security Display Printer Windows 11 2FA Paperless Office Monitoring Infrastructure Excel Firewall Document Management Remote Workers Telephone The Internet of Things Scam Data loss Cooperation Free Resource Project Management Images 101 Telephone System Multi-Factor Authentication Mobility Cost Management Robot Customer Relationship Management Settings Printing Wireless Content Filtering Employees Hacking IT Management Integration Presentation VPN YouTube Meetings User Tip Modem Cryptocurrency Processor Mobile Security Wireless Technology Computer Repair Holidays Virtual Desktop Data Storage Data storage Smart Technology Supply Chain LiFi Video Conferencing Managed Services Provider Word Saving Time Virtual Machines Outlook Professional Services Machine Learning Money Humor Managed IT Service Downloads Safety iPhone Maintenance Licensing Antivirus Sports Mouse Entertainment Vulnerabilities Data Privacy Administration Alert Data Analysis Star Wars IT Assessment Microsoft Excel IT Maintenance Application Best Practice Staff Value Business Intelligence Managed IT Buisness File Sharing Dark Data Gamification Flexibility Organization Social Networking IBM Legal Legislation Shortcuts IT solutions How To Business Growth Notifications Fileless Malware Digital Security Cameras Smart Devices Ransmoware Wearable Technology Memory Vendors Travel Content Remote Working Cortana Health IT Motherboard Data Breach Techology Comparison Google Play Be Proactive Google Maps Alt Codes Directions Videos Assessment Electronic Health Records Permissions Workforce Wasting Time Threats Competition Downtime Unified Threat Management Trend Micro Unified Threat Management Specifications Security Cameras Workplace Strategies Hosted Solution Typing Microchip Internet Exlporer Software as a Service Fraud Meta Managing Costs Amazon Network Congestion Username Knowledge eCommerce Google Drive User Error Black Friday SSID User Database Surveillance Virtual Assistant Outsource IT IT Technicians Virtual Machine Environment Media Point of Sale 5G Experience Proxy Server Reviews Cookies IP Address Google Docs Cyber Monday Medical IT Unified Communications Bitcoin Network Management Running Cable Tech Support Tactics Development Hotspot Transportation Small Businesses Mirgation Hypervisor Displays Google Wallet Monitors Shopping Nanotechnology Optimization PowerPoint Recovery Hard Drives Windows 8 Laptop Websites Addiction Language Employer/Employee Relationships Outsourcing Management PCI DSS Chatbots Domains Drones Navigation Electronic Medical Records Gig Economy Screen Reader SharePoint Distributed Denial of Service Workplace Computing Infrastructure Teamwork Hiring/Firing Refrigeration Halloween Service Level Agreement Internet Service Provider Regulations Compliance Identity Public Speaking Lenovo Evernote Paperless Writing Virtual Reality Bookmark Smart Tech Memes Lithium-ion battery Co-managed IT Alerts SQL Server Technology Care Hacks Server Management Entrepreneur Scary Stories Private Cloud Download Net Neutrality Financial Data History Superfish Business Communications Identity Theft Fun Twitter Browsers Smartwatch Connectivity IT Break Fix Scams Deep Learning Azure Hybrid Work Undo Error Upload Procurement Social Network Telework Cyber security Multi-Factor Security Tech Human Resources Education Social Engineering Remote Computing CES IoT Communitications Dark Web Cables Mobile Computing Trends Supply Chain Management Customer Resource management FinTech Regulations Google Calendar Term Google Apps Tablet Search

Blog Archive