Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

ALERT: Make Sure Your Business is Safe from Meltdown and Spectre

ALERT: Make Sure Your Business is Safe from Meltdown and Spectre

Intel recently found itself (once again) in hot water, mere months after many flaws were discovered in the firmware that enables all of their chips to do their job. This time, the issue could have potentially caused a permanent dip in the CPU’s capacity to function properly. This has come to be known as the Meltdown vulnerability.

This issue was first reported in a blog maintained by an unknown user identified only as Python Sweetness, who summed up what they described as “an embargoed security bug impacting apparently all contemporary CPU architectures that implement virtual memory, requiring hardware changes to fully resolve.”

In other words, a bug had been discovered that messed with how different programs could interact with the CPU. Normally, the CPU has two modes: kernel, which allows complete, carte blanche access to the computer itself, and user, which is supposed to be the ‘safe’ mode. The issue that Python Sweetness discovered was that the bug allowed programs that were run in user mode to access kernel mode. This could potentially open the door for malicious programs and malware to access a user’s hardware itself and see anything that’s going on in protected memory space, meaning programs could gain access to memory being used by other programs, or in the case of virtual machines they could cross-talk between VMs as well.

Fortunately, a fix has been developed that will likely only cause a 2% dip in system performance, a greatly lesser sacrifice than what was initially expected. Originally, it was assumed that entire processes would be shifted from user mode to kernel mode and back again, slowing the entire system down considerably. There has since been a Windows update to mitigate the CPU issue, despite the expectation that it would take a hardware change to implement it.

For PCs with Windows 10 installed, and an antivirus that supports the patch, the fix should already be in place. However, to confirm this, go to Settings > Update & Security to see if there are any updates waiting to be installed. If not, check your update history for Security Update for Windows (KB4056892), or check with your antivirus provider to find out when it will be supported, the patch will not install until it sees that the antivirus has been updated to a version that the vendor verifies supports this patch.

If you have an Android device, there was an update on January 5 that provided mitigations, with the promise of further updates to add to these protections. Google-branded phones, including the Nexus and Pixel lines, should have already received the patches, and other Android phones may have as well. It is something that you should check, and if you haven’t received an update yet, reach out to your carrier and ask why (posting publicly can get you extra points).

An update to Google Chrome is expected on January 23, with other browsers following suit, that will also include mitigations. In the meantime, ask your IT resource to help you activate Site Isolation to help keep a malicious website from accessing your data from another tab.

Other devices (like NAS devices, smart appliances, networking equipment, media equipment, etc.) may also be at risk, as they are using similar hardware. It’s really important for business owners to have their entire infrastructure reviewed and audited.

Issues like these are exactly why businesses need a managed service provider looking out for them. An MSP, like Voyage Technology, would have heard about this issue and its associated update (or any issue/update, for that matter) and taken the actions needed to resolve it.

This is all done without the business needing to worry about handling any of it, freeing its internal staff to complete projects that generate profit, rather than work to maintain operations and security.
For more ways that an MSP can benefit your crew, reach out to us at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 08 December 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Backup Passwords Quick Tips Productivity Saving Money Communication Cybersecurity Managed Service Data Backup Smartphone Android Upgrade Data Recovery VoIP Business Management AI Smartphones Disaster Recovery Mobile Devices communications Windows Browser Social Media Microsoft Office Managed IT Services Current Events Tech Term Network Internet of Things Remote Automation Artificial Intelligence Facebook Miscellaneous Information Training Gadgets Covid-19 Cloud Computing Holiday Server Managed Service Provider Remote Work Outsourced IT Compliance IT Support Encryption Spam Employee/Employer Relationship Office Windows 10 Business Continuity Data Management Government Business Technology Bandwidth Windows 10 Virtualization Blockchain Wi-Fi Two-factor Authentication Mobile Office Data Security Apps Vendor Tip of the week Chrome Managed Services Voice over Internet Protocol Mobile Device Management Budget Gmail Apple Networking App Employer-Employee Relationship BYOD Hacker Access Control Avoiding Downtime Office 365 Marketing Conferencing How To WiFi BDR HIPAA Computing Applications Information Technology Computers 2FA Health Help Desk Analytics Website Office Tips Augmented Reality Retail Healthcare Storage Password Bring Your Own Device Managed IT Services Big Data Operating System Router Risk Management Virtual Private Network Printer Windows 11 Paperless Office Infrastructure Monitoring Excel Document Management Remote Workers Firewall Telephone Scam Data loss Free Resource Project Management The Internet of Things Cooperation Windows 7 Microsoft 365 Social Going Green Patch Management Save Money Remote Monitoring Solutions End of Support Vulnerability Vendor Management Cybercrime Physical Security Customer Service Display Processor Presentation Holidays Computer Repair Mobile Security Data Storage Virtual Desktop Data storage LiFi Wireless Technology Supply Chain Video Conferencing Managed Services Provider Smart Technology Outlook Virtual Machines Professional Services Machine Learning Money Saving Time Humor Word Managed IT Service Maintenance iPhone Sports Downloads Antivirus Mouse Licensing Vulnerabilities Data Privacy Safety Entertainment Administration Images 101 Multi-Factor Authentication Mobility Robot Telephone System Cost Management Settings Wireless Printing Employees Content Filtering IT Management Customer Relationship Management Integration YouTube Meetings VPN Cryptocurrency Modem Hacking User Tip Google Docs Reviews Unified Communications Database Experience Medical IT User Transportation Small Businesses Bitcoin Network Management Development Running Cable Tech Support IT Technicians Cookies Hypervisor Displays Monitors Cyber Monday Google Wallet Proxy Server Shopping Tactics Optimization Hotspot PowerPoint Employer/Employee Relationships Outsourcing Windows 8 IP Address Laptop Websites Mirgation PCI DSS Nanotechnology Navigation Drones SharePoint Gig Economy Addiction Electronic Medical Records Language Workplace Recovery Teamwork Hiring/Firing Management Internet Service Provider Halloween Chatbots Lenovo Regulations Compliance Screen Reader Hard Drives Writing Distributed Denial of Service Evernote Paperless Service Level Agreement Domains Memes Virtual Reality Computing Infrastructure Co-managed IT Scary Stories Private Cloud Identity SQL Server Technology Care Hacks Server Management Net Neutrality Superfish Bookmark Financial Data Identity Theft Smart Tech Refrigeration History Fun Business Communications Smartwatch Deep Learning Download Public Speaking IT Twitter Alerts Scams Error Azure Hybrid Work Lithium-ion battery Procurement Browsers Telework Education Connectivity Cyber security Social Engineering Break Fix Entrepreneur Tech Human Resources CES Upload Communitications Remote Computing Cables Multi-Factor Security Mobile Computing Social Network Supply Chain Management FinTech Tablet IoT Undo Search Dark Web Term Google Apps Best Practice Trends IT Assessment Alert IT Maintenance Buisness File Sharing Regulations Value Business Intelligence Dark Data Google Calendar Managed IT Customer Resource management Flexibility Legal Data Analysis Organization IT solutions Star Wars How To Microsoft Excel Shortcuts Digital Security Cameras Business Growth Gamification Smart Devices Notifications Staff Ransmoware Travel Social Networking Application Memory Vendors Legislation Remote Working Techology Fileless Malware Google Maps Data Breach Cortana Google Play Be Proactive Videos Alt Codes Content IBM Electronic Health Records Wearable Technology Workforce Downtime Unified Threat Management Motherboard Wasting Time Threats Comparison Health IT Unified Threat Management Directions Hosted Solution Assessment Trend Micro Permissions Security Cameras Workplace Strategies Typing Software as a Service Meta Managing Costs Amazon Network Congestion Specifications Google Drive User Error Microchip Internet Exlporer Competition eCommerce Knowledge Fraud SSID Username Surveillance Virtual Assistant Outsource IT Point of Sale Virtual Machine Environment 5G Black Friday Media

Blog Archive