ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

ALERT: Your Business’ Infrastructure May Be Susceptible to Meltdown/Spectre Vulnerability

ALERT: Your Business’ Infrastructure May Be Susceptible to Meltdown/Spectre Vulnerability

You’d think that Intel would make sure their firmware is of sound integrity, but unfortunately, a recently discovered vulnerability has revealed that it’s not as secure as previously thought. The issue involving Intel’s chips could potentially lead to a permanent nosedive for your CPU’s capacity to perform as intended, which could have disastrous implications for your business.

An unknown blogger calling themselves Python Sweetness describes the issue as “an embargoed security bug impacting apparently all contemporary CPU architectures that implement virtual memory, requiring hardware changes to fully resolve.”

The bug found complicated the way that various programs interacted with the CPU. Ordinarily, your CPU will have two modes. Kernel offers a complete “carte blanche” access to the computer or user. This is supposed to be considered the safe mode for your CPU, but Python Sweetness has found that this bug lets programs run through user mode access kernel mode. What this ultimately allows for is the potential for malicious programs to access a user’s hardware--a scary thought indeed.

A fix has been developed that mitigates the issue to a small dip in system performance (approximately 2 percent), which is a much smaller price to pay compared to allowing hackers to influence your hardware itself. Originally, it was thought that the processes would be placed on the kernel mode, then shift back to the user mode as needed, but this process slowed down the system. A new Windows update has resolved the CPU problems, even though most professionals thought that a hardware change was the only way to solve it.

If you have a PC with Windows 10 and an antivirus that supports the patch, you should already have the fix implemented. You should make sure to confirm this by navigating to Settings > Update & Security. Once you’ve done so, make sure you also review your update history and find Security Update for Windows (KB4056892), or check with your antivirus provider to find out when it will be supported, the patch will not install until it sees that the antivirus has been updated to a version that the vendor verifies supports this patch.

Android device users should have had this issue mitigated by an update pushed on January 5, with other updates incoming to strengthen these protections. Phones that fall under the Google brand, including the Nexus and Pixel phones, should have received patches already, with other Android devices soon to be patched as well. You should check your phone to see, and if you haven’t received one, put pressure on your carrier on a visible forum.

Google Chrome should be updated on January 23, and the other browsers should soon follow, with additional mitigations. Until then, you should ask IT to activate Site Isolation to keep potentially malicious sites from harvesting your data from your other browser tabs.

Other devices (like NAS devices, smart appliances, networking equipment, media equipment, etc.) may also be at risk, as they are using cursory hardware. It’s really important for business owners to have their entire infrastructure reviewed and audited.

These types of problems are one of the best reasons to have a managed service provider as part of your IT management and maintenance infrastructure. ClearView IT keeps a close eye on the latest in network security, including any new threats to your business’s data or patches that need to be implemented. We’ll do whatever it takes to keep your business’s technology as secure and up to date as possible.

Your business won’t have to worry about any aspect of IT maintenance, and we can even help your internal team with implementation projects or technology support aspects of running your organization. To learn more, reach out to us at 866-326-7214.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 05 July 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Network Security Privacy Data Cloud Business User Tips IT Support Internet Hardware Innovation Malware Email Hosted Solutions Efficiency Workplace Tips Computer Google Microsoft Collaboration Android Phishing Business Management Cybersecurity IT Services Backup Ransomware Data Backup Smartphone communications Upgrade Smartphones Small Business Microsoft Office Mobile Devices Network Managed IT Services Communication Data Recovery Quick Tips Productivity Social Media VoIP Users Mobile Device Automation Tech Term Windows 10 Facebook Business Continuity Disaster Recovery Passwords Holiday Covid-19 Managed Service Windows 10 Apps IT Support Browser Miscellaneous Cloud Computing Outsourced IT Internet of Things Managed Service Provider Remote Work Data Management Government Saving Money Operating System Managed IT services Workplace Strategy Networking Windows Gadgets Artificial Intelligence Bandwidth WiFi Encryption Blockchain Mobile Device Management Remote Business Technology App Virtualization Spam Information Server Budget Employee/Employer Relationship Gmail Office Apple Two-factor Authentication Information Technology History Office 365 Data Security Analytics Cybercrime Wi-Fi BDR Big Data Conferencing Access Control Health Vendor Hacker Patch Management Save Money Remote Computing Remote Monitoring Compliance IT Management Help Desk Training Cost Management Hacking Employer-Employee Relationship Voice over Internet Protocol Document Management Alert Data storage Applications Money Managed Services Hiring/Firing Customer Service Unified Threat Management Vulnerabilities Firewall Outlook Password Project Management Augmented Reality Word BYOD IBM Computing Website Vendor Management Data loss Hard Drive Search... Best Practice Legal Mobile Office Retail Free Resource Paperless Office Travel Antivirus User Sports How To Social DDoS Virtual Reality SaaS Monitoring Maintenance Social Engineering Cryptocurrency Black Market Healthcare iPhone Cleaning Cortana Chrome Education Robot Websites Content Filtering Meetings Mobility Windows 11 Router Mobile Computing Google Maps Scam The Internet of Things Marketing YouTube Running Cable Twitter VPN Law Enforcement End of Support Laptop Storage Update Printer Remote Workers Data Breach Windows 7 Taxes Virtual Private Network Notifications Unified Communications Virtual Desktop Google Docs Experience Current Events HIPAA Bluetooth Distributed Denial of Service Solutions Office Tips Physical Security Multi-factor Authentication Private Cloud Memory Integration Images 101 Disaster Display Saving Time Start Menu Computer Care Downloads Politics Lithium-ion battery Bitcoin Machine Learning Settings Employees Computers Vulnerability Avoiding Downtime Telephone PowerPoint Holidays Administration Solid State Drive Software as a Service Processors Data Protection Presentation Excel Specifications Cooperation Video Conferencing IT Consultant Chromebook Drones Virtual Machines Automobile Computer Repair Customer Relationship Management Co-Managed IT Virtual Assistant Entertainment How To Professional Services Wireless Technology Tech Terms Microchip Flexibility eWaste Managed IT Digital Downtime Managed Services Provider Hack Identity Theft Processor Safety Google Apps Username Access Freedom of Information Troubleshooting Scalability Time Management Public Cloud Shortcuts Telework Startup Addiction Communitications email scam Administrator Microsoft 365 Text Messaging Proactive IT Navigation Smartwatch Procurement Mobile Security Audit Bring Your Own Device Spyware News File Sharing Be Proactive User Tip FinTech Legislation Network Management IT Assessment Redundancy Music Evernote CES Staffing Supply Chain Management Value Cache Fake News Business Owner Unified Threat Management Workers Workplace Strategies Proxy Server Organization IP Address Emails Cyber security Service Level Agreement Smart Devices Computing Infrastructure Botnet Micrsooft CCTV Management Remote Working Device security Printing Rental Service Microsoft Excel Touchscreen Flash AI Wireless Headphones Trend Micro Going Green Electronic Health Records Business Cards Emergency Transportation Telephone Systems Business Growth Tech Computer Malfunction Digital Security Cameras Recovery Error Competition Wasting Time Vendor Mangement Inbound Marketing Modem Samsung Smart Technology Bookmark eCommerce Videos Download Surveillance Entrepreneur Piracy Banking Uninterrupted Power Supply LiFi Google Wallet Term Webcam Deep Learning Documents Application HTML Managing Costs Messenger Business Mangement Business Intelligence SSID Tablets Browsers Nanotechnology Media Upload Development Software License Electronic Payment Employer/Employee Relationships Business Metrics Hosted Solution Google Play Supercomputer Securty Social Network Google Calendar Virtual Machine Books Optimization Virus Language Supply Chain Society Data Analysis Reviews Domains Screen Reader 2FA Trends Mobile Technology Teamwork Phone System Security Cameras Motion Sickness Google Drive Monitors Visible Light Communication Customer Resource management Data Storage Devices Comparison Hypervisor Reading Tip of the week Medical IT Workplace Windows 8 Fileless Malware Shopping Paperless Gamification Company Culture Knowledge SQL Server Corporate Profile Telephony Displays Employer Employee Relationship Advertising Telephone System PCI DSS Public Speaking Regulations Television Licensing Relocation Humor Computer Accessories Work/Life Balance Cabling Streaming Media Scams Tech Support Directions Gig Economy Backup and Disaster Recovery G Suite Business Communications Content Internet Service Provider Keyboard Desktop Azure Tablet VoIP Tracking Electronic Medical Records Regulations Compliance Hard Drives Accountants Mouse Managed IT Service Memes intranet In Internet of Things Cables Database Network Congestion Web Server Human Resources Wireless Net Neutrality Shortcut Hacks Reliable Computing Writing Digital Payment Health IT Financial Data Heating/Cooling Equifax SharePoint Environment Tactics IT Social Networking Hard Drive Disposal Worker Windows XP Point of Sale Risk Management

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?