ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

ALERT: Your Business’ Infrastructure May Be Susceptible to Meltdown/Spectre Vulnerability

ALERT: Your Business’ Infrastructure May Be Susceptible to Meltdown/Spectre Vulnerability

You’d think that Intel would make sure their firmware is of sound integrity, but unfortunately, a recently discovered vulnerability has revealed that it’s not as secure as previously thought. The issue involving Intel’s chips could potentially lead to a permanent nosedive for your CPU’s capacity to perform as intended, which could have disastrous implications for your business.

An unknown blogger calling themselves Python Sweetness describes the issue as “an embargoed security bug impacting apparently all contemporary CPU architectures that implement virtual memory, requiring hardware changes to fully resolve.”

The bug found complicated the way that various programs interacted with the CPU. Ordinarily, your CPU will have two modes. Kernel offers a complete “carte blanche” access to the computer or user. This is supposed to be considered the safe mode for your CPU, but Python Sweetness has found that this bug lets programs run through user mode access kernel mode. What this ultimately allows for is the potential for malicious programs to access a user’s hardware--a scary thought indeed.

A fix has been developed that mitigates the issue to a small dip in system performance (approximately 2 percent), which is a much smaller price to pay compared to allowing hackers to influence your hardware itself. Originally, it was thought that the processes would be placed on the kernel mode, then shift back to the user mode as needed, but this process slowed down the system. A new Windows update has resolved the CPU problems, even though most professionals thought that a hardware change was the only way to solve it.

If you have a PC with Windows 10 and an antivirus that supports the patch, you should already have the fix implemented. You should make sure to confirm this by navigating to Settings > Update & Security. Once you’ve done so, make sure you also review your update history and find Security Update for Windows (KB4056892), or check with your antivirus provider to find out when it will be supported, the patch will not install until it sees that the antivirus has been updated to a version that the vendor verifies supports this patch.

Android device users should have had this issue mitigated by an update pushed on January 5, with other updates incoming to strengthen these protections. Phones that fall under the Google brand, including the Nexus and Pixel phones, should have received patches already, with other Android devices soon to be patched as well. You should check your phone to see, and if you haven’t received one, put pressure on your carrier on a visible forum.

Google Chrome should be updated on January 23, and the other browsers should soon follow, with additional mitigations. Until then, you should ask IT to activate Site Isolation to keep potentially malicious sites from harvesting your data from your other browser tabs.

Other devices (like NAS devices, smart appliances, networking equipment, media equipment, etc.) may also be at risk, as they are using cursory hardware. It’s really important for business owners to have their entire infrastructure reviewed and audited.

These types of problems are one of the best reasons to have a managed service provider as part of your IT management and maintenance infrastructure. ClearView IT keeps a close eye on the latest in network security, including any new threats to your business’s data or patches that need to be implemented. We’ll do whatever it takes to keep your business’s technology as secure and up to date as possible.

Your business won’t have to worry about any aspect of IT maintenance, and we can even help your internal team with implementation projects or technology support aspects of running your organization. To learn more, reach out to us at 866-326-7214.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 05 May 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Network Security Privacy Data Cloud Business User Tips IT Support Internet Hardware Innovation Email Hosted Solutions Malware Efficiency Workplace Tips Computer Google Microsoft Collaboration Android Business Management Phishing Cybersecurity IT Services Backup Data Backup Ransomware communications Smartphone Microsoft Office Upgrade Smartphones Small Business Mobile Devices Network Data Recovery Managed IT Services Communication Productivity Quick Tips Users Social Media VoIP Mobile Device Automation Tech Term Facebook Business Continuity Windows 10 Covid-19 Disaster Recovery Passwords Holiday Windows 10 Managed Service IT Support Apps Browser Cloud Computing Outsourced IT Miscellaneous Data Management Remote Work Internet of Things Managed Service Provider Government Saving Money Operating System Networking Gadgets Windows Artificial Intelligence Managed IT services Workplace Strategy Blockchain App Virtualization Server Spam Information Remote Mobile Device Management WiFi Bandwidth Business Technology Encryption Information Technology Gmail Office History Two-factor Authentication Office 365 Employee/Employer Relationship Budget Apple Big Data Conferencing Access Control Data Security Health Wi-Fi Analytics BDR Cybercrime Help Desk Document Management Hacking Employer-Employee Relationship Save Money Patch Management Vendor Hacker Remote Monitoring Remote Computing Compliance Voice over Internet Protocol Cost Management IT Management Training Website Data loss Legal Search... Best Practice Data storage Retail Alert Applications Hiring/Firing Money Project Management Outlook BYOD Customer Service Password Vulnerabilities Unified Threat Management Computing Firewall Vendor Management Hard Drive Augmented Reality Mobile Office Word IBM Managed Services Law Enforcement End of Support Router Marketing How To Windows 11 Printer VPN Running Cable The Internet of Things Update YouTube Storage Travel Laptop Virtual Reality Social Engineering Data Breach Cryptocurrency Paperless Office Antivirus Black Market Maintenance Cleaning User Robot Social Sports DDoS SaaS Monitoring Websites Chrome Healthcare Mobility Meetings iPhone Remote Workers Cortana Education Google Maps Twitter Windows 7 Content Filtering Scam Free Resource Mobile Computing Microchip IT Consultant Flexibility Current Events Processors Customer Relationship Management Excel Solutions Tech Terms Co-Managed IT Hack Identity Theft Entertainment Images 101 Notifications Managed IT Integration Display Digital Unified Communications Google Docs Virtual Assistant Wireless Technology Bluetooth Taxes eWaste Employees Distributed Denial of Service Avoiding Downtime Office Tips Private Cloud Memory Holidays Downtime Safety HIPAA Processor Physical Security Cooperation Politics Video Conferencing Virtual Desktop Machine Learning Experience Settings Virtual Machines Start Menu Computer Repair Solid State Drive Downloads Multi-factor Authentication Computer Care Professional Services Vulnerability Disaster Drones Saving Time Chromebook Software as a Service Data Protection PowerPoint Automobile Managed Services Provider Administration Lithium-ion battery Computers Bitcoin Presentation Virtual Private Network Telephone How To Specifications Business Intelligence Phone System Browsers Smartwatch Nanotechnology Communitications Microsoft 365 Knowledge Software License Corporate Profile Google Play Upload Procurement Social Network FinTech In Internet of Things Television Securty Telephony Employer Employee Relationship Network Congestion Cabling Data Analysis CES Screen Reader IT Assessment Hacks Domains Reliable Computing Mobile Technology Value Writing Tablet G Suite Security Cameras Trends Supply Chain Management Customer Resource management Organization Mouse Devices Cyber security VoIP Supply Chain Tracking Computer Accessories Fileless Malware Smart Devices Tip of the week Scalability Company Culture Web Server Gamification Remote Working Telephone System AI Administrator SharePoint Regulations Trend Micro Text Messaging Workplace Public Speaking Proactive IT Digital Payment Worker Directions Digital Security Cameras Backup and Disaster Recovery Electronic Health Records Streaming Media Bring Your Own Device Transportation Content Desktop Wasting Time Access Keyboard Electronic Medical Records Accountants eCommerce Time Management Modem Scams Hard Drives Music Public Cloud intranet Videos Database Surveillance Audit Managing Costs Wireless Spyware Shortcut Troubleshooting Environment Health IT Botnet Equifax SSID Cables Heating/Cooling File Sharing Hard Drive Disposal Employer/Employee Relationships Micrsooft Social Networking Media Tactics Development Windows XP Rental Service Redundancy Username Virtual Machine Flash Cache Reviews Startup Optimization Telephone Systems Unified Threat Management Freedom of Information Point of Sale Business Growth Workers email scam Teamwork Navigation 2FA Addiction Data Storage Printing Mobile Security Hypervisor Shortcuts Business Owner CCTV Google Wallet User Tip Shopping Legislation Banking Touchscreen News Medical IT Messenger Emergency SQL Server Deep Learning Computer Malfunction Evernote Paperless Network Management PCI DSS Licensing Staffing Vendor Mangement Be Proactive Hosted Solution Samsung Proxy Server Gig Economy Emails Humor Business Metrics Fake News IP Address Books Computing Infrastructure Azure Uninterrupted Power Supply Webcam Business Communications Service Level Agreement Internet Service Provider Management Regulations Compliance Device security Managed IT Service Language Business Mangement Workplace Strategies Inbound Marketing Society Tablets Wireless Headphones Memes Microsoft Excel Reading Business Cards Monitors Visible Light Communication Tech Human Resources Going Green Net Neutrality Error Financial Data Google Calendar Recovery Competition Windows 8 Supercomputer Bookmark Risk Management IT Virus Electronic Payment Relocation Piracy Displays Entrepreneur Advertising Motion Sickness Term Google Apps Download LiFi Telework Comparison HTML Documents Work/Life Balance Google Drive Smart Technology Application Tech Support

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?