ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Surveying the Damage of Meltdown and Spectre

Surveying the Damage of Meltdown and Spectre

At the time of this writing, it has only been about a half a year since the Meltdown and Spectre exploits became public knowledge. Fortunately, patches were swiftly rolled out to mitigate the problems that these exploits could cause, but that doesn’t mean that these exploits are dead and buried. Let’s look back at Meltdown and Spectre to help us establish where we stand today.

What Do They Do?
Both Meltdown and Spectre affect the processor of the targeted system. The accurately-named Meltdown virtually melts away the barriers that a processor has between application processes and the system memory, which is not a good thing. Spectre works differently, in that it can ‘fool’ the processor into accessing parts of a system’s memory that it shouldn’t. Either of these results could quite easily allow a greater threat to access a user’s system.

The worst thing about Spectre and Meltdown is that they are so widespread, with the capability to influence almost every computer chip manufactured in the past 20 years. This could potentially put any data at risk, regardless of how well it was otherwise protected.

How They Were “Fixed”
Unfortunately, there is no singular, magic bullet fix for Meltdown and Spectre. However, patches were quickly released and have continued to roll out, as these exploits are repeatedly updated. When first discovered and mitigated, developers warned that patching against Meltdown and Spectre may cause a dip in performance as high as thirty percent.

While these patches do influence performance, the influence they have is currently much less significant than initially advertised. While the actual numbers vary based on a few circumstances that can be found below, the average use case showed much smaller affects, topping out at around five percent. This may change as later patches are released. However, it is also important to remember that in these kinds of situations, the initial patches usually have the greatest effects.

What Influences Performance
As mentioned above, there are other circumstances that will make the patches for Meltdown and Spectre more of a burden on your system, thereby causing a slight dip in your performance.

Use
Depending on your intended usage of your system, Meltdown and Spectre could have greater or lesser effect. A good rule of thumb to keep in mind is that applications and uses that lean more heavily on processing power will be more affected than others. So, if you rely heavily on virtualization, or have made investments into cryptocurrency mining, you may be disappointed to find your performance suffer.

Patch Used
A variety of companies have put out patches, which means that different patches are going to have different effects on the systems that they are applied to.

Device Configuration
Both your system’s hardware and software are going to influence how you may find your technology to be impacted by these patches. For instance, a newer processor will most likely be more resilient against the adverse effects of the patches, and a more up-to-date operating system, like Windows 10, will be impacted less than 7 or 8.

Our Best Advice
In order to fend off Meltdown and Spectre, we recommend that you follow a few basic best practices, including regularly installing updates to your software and being generally more security-minded as you utilize your technology. Additionally, it is probably also in your best interest, if you were considering a hardware refresh/update, to wait a while. There are currently efforts being made to develop processors that are resistant to these threats, but there is still no indication of when this hardware will be made available.

In the meantime, keep checking back to our blog for IT best practices, tips, and more.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 05 May 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Privacy Network Security Data Cloud Business User Tips IT Support Internet Hardware Innovation Email Hosted Solutions Malware Efficiency Workplace Tips Computer Google Microsoft Collaboration Android Business Management Cybersecurity Phishing IT Services Backup Ransomware Data Backup communications Smartphone Microsoft Office Upgrade Smartphones Small Business Network Mobile Devices Data Recovery Communication Managed IT Services Productivity Quick Tips Social Media VoIP Users Mobile Device Tech Term Automation Business Continuity Facebook Windows 10 Passwords Holiday Disaster Recovery Covid-19 Managed Service Windows 10 IT Support Browser Apps Cloud Computing Outsourced IT Miscellaneous Data Management Managed Service Provider Internet of Things Remote Work Saving Money Operating System Government Artificial Intelligence Networking Managed IT services Windows Workplace Strategy Gadgets App Virtualization Business Technology Blockchain Spam WiFi Mobile Device Management Server Bandwidth Information Remote Encryption History Gmail Office Two-factor Authentication Budget Office 365 Apple Employee/Employer Relationship Information Technology BDR Big Data Health Wi-Fi Analytics Conferencing Access Control Data Security Cybercrime Remote Monitoring Document Management Employer-Employee Relationship Help Desk Voice over Internet Protocol Save Money Hacking IT Management Remote Computing Training Hacker Cost Management Compliance Patch Management Vendor IBM Legal Search... Best Practice Project Management Website Vulnerabilities Data storage Retail Alert Mobile Office Hiring/Firing Managed Services Outlook Password Data loss BYOD Money Computing Vendor Management Customer Service Hard Drive Unified Threat Management Firewall Augmented Reality Word Applications Maintenance Printer Windows 11 Router Storage Monitoring Healthcare The Internet of Things Websites YouTube Remote Workers Travel Mobility Virtual Reality Meetings Social Engineering Windows 7 Cryptocurrency User Free Resource Black Market Laptop Google Maps Cleaning Scam Robot How To Chrome VPN Update Social Sports DDoS SaaS Mobile Computing Twitter Data Breach iPhone Cortana Paperless Office Marketing Education Antivirus Law Enforcement End of Support Running Cable Content Filtering Co-Managed IT Video Conferencing Physical Security Entertainment Virtual Machines Processors Hack Computer Repair Identity Theft Notifications Multi-factor Authentication Start Menu Professional Services Unified Communications Downloads Computer Care Google Docs Bluetooth Vulnerability Saving Time Distributed Denial of Service Software as a Service Managed Services Provider Office Tips Data Protection Computers Memory Bitcoin HIPAA Private Cloud Wireless Technology Virtual Private Network Telephone eWaste Current Events Downtime Politics Safety Machine Learning Settings Excel Solutions Tech Terms Images 101 Solid State Drive Integration Virtual Desktop Experience Display Managed IT Digital Virtual Assistant PowerPoint Chromebook Drones Administration Employees Automobile Taxes Avoiding Downtime Presentation Disaster Specifications Holidays IT Consultant Processor How To Microchip Lithium-ion battery Cooperation Customer Relationship Management Flexibility Navigation 2FA In Internet of Things Cache Addiction Entrepreneur email scam Teamwork LiFi Computer Accessories Documents Unified Threat Management Data Storage Application Hacks Workers Mobile Security Hypervisor Network Congestion Legislation Business Intelligence Writing News Medical IT User Tip Shopping Reliable Computing Printing Evernote Paperless Network Management CCTV SQL Server Securty Touchscreen PCI DSS Licensing Emails Humor Computer Malfunction Fake News Supply Chain Emergency Proxy Server Gig Economy Domains Scalability Business Communications Administrator Vendor Mangement Service Level Agreement Internet Service Provider Text Messaging Computing Infrastructure Azure Proactive IT Management Regulations Compliance Bring Your Own Device Samsung Device security Managed IT Service Uninterrupted Power Supply Wireless Headphones Memes Webcam Microsoft Excel Workplace Tech Human Resources Business Mangement Going Green Net Neutrality Business Cards Music Troubleshooting Error Financial Data Public Speaking Tablets IT Scams Streaming Media Bookmark Risk Management Google Calendar Term Google Apps Botnet Download Keyboard Supercomputer Piracy Virus Telework Hard Drives Rental Service HTML Micrsooft Nanotechnology Communitications intranet Flash Motion Sickness Microsoft 365 Cables Browsers Smartwatch Comparison Google Play Wireless Google Drive Upload Procurement Shortcut Telephone Systems Software License Business Growth Business Owner Social Network FinTech Heating/Cooling Environment Corporate Profile Screen Reader IT Assessment Social Networking Point of Sale Windows XP Knowledge Data Analysis CES Television Security Cameras Telephony Trends Supply Chain Management Banking Employer Employee Relationship Mobile Technology Value Google Wallet Deep Learning Shortcuts Customer Resource management Organization Messenger Cabling Devices Cyber security Fileless Malware Tablet Smart Devices G Suite Tip of the week Mouse VoIP Gamification Remote Working Business Metrics Tracking Company Culture Hosted Solution Inbound Marketing Regulations Trend Micro Be Proactive Telephone System AI Books Directions Digital Security Cameras Backup and Disaster Recovery Electronic Health Records Language Web Server Transportation Society SharePoint Staffing Content Digital Payment Desktop Wasting Time Worker Accountants eCommerce Monitors Electronic Payment Modem Workplace Strategies Visible Light Communication Electronic Medical Records IP Address Reading Videos Access Database Surveillance Windows 8 Time Management Public Cloud Managing Costs Equifax Displays SSID Advertising Phone System Health IT Relocation Audit Media Spyware Tactics Development Work/Life Balance Hard Drive Disposal Employer/Employee Relationships Tech Support Recovery Username Competition File Sharing Virtual Machine Startup Optimization Freedom of Information Smart Technology Redundancy Reviews

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?