Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

ALERT: Make Sure Your Business is Safe from Meltdown and Spectre

ALERT: Make Sure Your Business is Safe from Meltdown and Spectre

Intel recently found itself (once again) in hot water, mere months after many flaws were discovered in the firmware that enables all of their chips to do their job. This time, the issue could have potentially caused a permanent dip in the CPU’s capacity to function properly. This has come to be known as the Meltdown vulnerability.

This issue was first reported in a blog maintained by an unknown user identified only as Python Sweetness, who summed up what they described as “an embargoed security bug impacting apparently all contemporary CPU architectures that implement virtual memory, requiring hardware changes to fully resolve.”

In other words, a bug had been discovered that messed with how different programs could interact with the CPU. Normally, the CPU has two modes: kernel, which allows complete, carte blanche access to the computer itself, and user, which is supposed to be the ‘safe’ mode. The issue that Python Sweetness discovered was that the bug allowed programs that were run in user mode to access kernel mode. This could potentially open the door for malicious programs and malware to access a user’s hardware itself and see anything that’s going on in protected memory space, meaning programs could gain access to memory being used by other programs, or in the case of virtual machines they could cross-talk between VMs as well.

Fortunately, a fix has been developed that will likely only cause a 2% dip in system performance, a greatly lesser sacrifice than what was initially expected. Originally, it was assumed that entire processes would be shifted from user mode to kernel mode and back again, slowing the entire system down considerably. There has since been a Windows update to mitigate the CPU issue, despite the expectation that it would take a hardware change to implement it.

For PCs with Windows 10 installed, and an antivirus that supports the patch, the fix should already be in place. However, to confirm this, go to Settings > Update & Security to see if there are any updates waiting to be installed. If not, check your update history for Security Update for Windows (KB4056892), or check with your antivirus provider to find out when it will be supported, the patch will not install until it sees that the antivirus has been updated to a version that the vendor verifies supports this patch.

If you have an Android device, there was an update on January 5 that provided mitigations, with the promise of further updates to add to these protections. Google-branded phones, including the Nexus and Pixel lines, should have already received the patches, and other Android phones may have as well. It is something that you should check, and if you haven’t received an update yet, reach out to your carrier and ask why (posting publicly can get you extra points).

An update to Google Chrome is expected on January 23, with other browsers following suit, that will also include mitigations. In the meantime, ask your IT resource to help you activate Site Isolation to help keep a malicious website from accessing your data from another tab.

Other devices (like NAS devices, smart appliances, networking equipment, media equipment, etc.) may also be at risk, as they are using similar hardware. It’s really important for business owners to have their entire infrastructure reviewed and audited.

Issues like these are exactly why businesses need a managed service provider looking out for them. An MSP, like Voyage Technology, would have heard about this issue and its associated update (or any issue/update, for that matter) and taken the actions needed to resolve it.

This is all done without the business needing to worry about handling any of it, freeing its internal staff to complete projects that generate profit, rather than work to maintain operations and security.
For more ways that an MSP can benefit your crew, reach out to us at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 04 February 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support IT Services Privacy Google Email Workplace Tips Computer Phishing Collaboration Hosted Solutions Workplace Strategy Users Small Business Ransomware Mobile Device Productivity Microsoft Backup Managed Service Quick Tips Communication Passwords Saving Money Cybersecurity Smartphone Data Backup Data Recovery Android AI Disaster Recovery VoIP Upgrade Business Management Smartphones Mobile Devices communications Windows Browser Social Media Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Facebook Miscellaneous Holiday Automation Artificial Intelligence Information Gadgets Cloud Computing Training Covid-19 Remote Work Compliance Server Managed Service Provider Outsourced IT IT Support Employee/Employer Relationship Encryption Spam Office Windows 10 Business Continuity Government Data Management Virtualization Wi-Fi Blockchain Business Technology Windows 10 Bandwidth Data Security Apps Two-factor Authentication Mobile Office Vendor WiFi Apple Networking App Employer-Employee Relationship Managed Services Voice over Internet Protocol BYOD Mobile Device Management Tip of the week Chrome Gmail Budget Applications How To BDR Conferencing Computing Hacker Information Technology Avoiding Downtime Access Control Marketing Office 365 HIPAA Storage Password Bring Your Own Device Managed IT Services Big Data 2FA Help Desk Operating System Healthcare Computers Risk Management Virtual Private Network Website Health Analytics Office Tips Augmented Reality Router Retail The Internet of Things Scam Data loss Windows 11 Monitoring Social Excel Going Green Patch Management Save Money Remote Monitoring End of Support Vulnerability Remote Workers Vendor Management Customer Service Telephone Cybercrime Physical Security Display Printer Cooperation Free Resource Project Management Paperless Office Windows 7 Infrastructure Microsoft 365 Firewall Document Management Solutions Safety Maintenance Modem Antivirus User Tip Sports Processor Mobile Security Mouse Holidays Administration Data Storage Smart Technology Supply Chain Video Conferencing Managed Services Provider Virtual Machines Robot Professional Services Saving Time Customer Relationship Management Settings Wireless Managed IT Service Printing Content Filtering Downloads Hacking IT Management YouTube Meetings iPhone Presentation VPN Licensing Cryptocurrency Vulnerabilities Wireless Technology Entertainment Computer Repair Data Privacy Virtual Desktop Images 101 Data storage LiFi Mobility Telephone System Multi-Factor Authentication Word Cost Management Outlook Machine Learning Money Humor Employees Integration Deep Learning Username Twitter Managing Costs Amazon eCommerce Black Friday SSID Undo Error Education Database Surveillance Social Engineering Virtual Assistant Outsource IT Media Remote Computing IT Technicians Virtual Machine Environment Cookies Cyber Monday Medical IT Mobile Computing Proxy Server Reviews Tablet Tactics Development Search Hotspot Transportation Small Businesses Application Best Practice Alert Mirgation Hypervisor Displays Nanotechnology Optimization Dark Data PowerPoint Managed IT Shopping Buisness File Sharing IT solutions Addiction How To Language Employer/Employee Relationships Outsourcing IBM Legal Navigation Business Growth Management PCI DSS Notifications Chatbots Screen Reader Distributed Denial of Service Workplace Gig Economy Travel Google Maps Service Level Agreement Internet Service Provider Cortana Computing Infrastructure Teamwork Hiring/Firing Techology Evernote Paperless Alt Codes Regulations Compliance Identity Smart Tech Memes Co-managed IT Competition Bookmark Downtime Unified Threat Management Unified Threat Management Hosted Solution Download Net Neutrality Alerts SQL Server Technology Care Business Communications Typing Financial Data History Connectivity IT Network Congestion Break Fix Scams Browsers Smartwatch Google Drive User Error User Upload Procurement Knowledge Azure Hybrid Work Multi-Factor Security Tech Human Resources Social Network Telework Cyber security Point of Sale IoT Communitications 5G Dark Web Cables CES IP Address Google Docs Unified Communications Trends Supply Chain Management Experience Google Calendar Term Google Apps Bitcoin Network Management Customer Resource management FinTech Running Cable Tech Support Regulations Star Wars IT Assessment Monitors Microsoft Excel IT Maintenance Google Wallet Data Analysis Recovery Gamification Flexibility Staff Value Business Intelligence Legislation Shortcuts Hard Drives Windows 8 Organization Laptop Websites Social Networking Smart Devices Ransmoware Domains Drones Fileless Malware Digital Security Cameras SharePoint Content Remote Working Electronic Medical Records Wearable Technology Memory Vendors Comparison Google Play Be Proactive Refrigeration Health IT Halloween Motherboard Data Breach Directions Videos Assessment Electronic Health Records Writing Permissions Workforce Public Speaking Lenovo Lithium-ion battery Virtual Reality Wasting Time Threats Trend Micro Specifications Security Cameras Workplace Strategies Hacks Server Management Entrepreneur Scary Stories Private Cloud Microchip Identity Theft Internet Exlporer Software as a Service Fun Fraud Meta Superfish

Blog Archive