Our Most Popular Managed Services

If you need help deciding what services are best for your business let us know.

Logo

 
 Popular Services
 (347) 830-7322

Logo

 

Tekie Geek Blogs

Surveying the Damage of Meltdown and Spectre

Surveying the Damage of Meltdown and Spectre

At the time of this writing, it has only been about a half a year since the Meltdown and Spectre exploits became public knowledge. Fortunately, patches were swiftly rolled out to mitigate the problems that these exploits could cause, but that doesn’t mean that these exploits are dead and buried. Let’s look back at Meltdown and Spectre to help us establish where we stand today.

What Do They Do?
Both Meltdown and Spectre affect the processor of the targeted system. The accurately-named Meltdown virtually melts away the barriers that a processor has between application processes and the system memory, which is not a good thing. Spectre works differently, in that it can ‘fool’ the processor into accessing parts of a system’s memory that it shouldn’t. Either of these results could quite easily allow a greater threat to access a user’s system.

The worst thing about Spectre and Meltdown is that they are so widespread, with the capability to influence almost every computer chip manufactured in the past 20 years. This could potentially put any data at risk, regardless of how well it was otherwise protected.

How They Were “Fixed”
Unfortunately, there is no singular, magic bullet fix for Meltdown and Spectre. However, patches were quickly released and have continued to roll out, as these exploits are repeatedly updated. When first discovered and mitigated, developers warned that patching against Meltdown and Spectre may cause a dip in performance as high as thirty percent.

While these patches do influence performance, the influence they have is currently much less significant than initially advertised. While the actual numbers vary based on a few circumstances that can be found below, the average use case showed much smaller affects, topping out at around five percent. This may change as later patches are released. However, it is also important to remember that in these kinds of situations, the initial patches usually have the greatest effects.

What Influences Performance
As mentioned above, there are other circumstances that will make the patches for Meltdown and Spectre more of a burden on your system, thereby causing a slight dip in your performance.

Use
Depending on your intended usage of your system, Meltdown and Spectre could have greater or lesser effect. A good rule of thumb to keep in mind is that applications and uses that lean more heavily on processing power will be more affected than others. So, if you rely heavily on virtualization, or have made investments into cryptocurrency mining, you may be disappointed to find your performance suffer.

Patch Used
A variety of companies have put out patches, which means that different patches are going to have different effects on the systems that they are applied to.

Device Configuration
Both your system’s hardware and software are going to influence how you may find your technology to be impacted by these patches. For instance, a newer processor will most likely be more resilient against the adverse effects of the patches, and a more up-to-date operating system, like Windows 10, will be impacted less than 7 or 8.

Our Best Advice
In order to fend off Meltdown and Spectre, we recommend that you follow a few basic best practices, including regularly installing updates to your software and being generally more security-minded as you utilize your technology. Additionally, it is probably also in your best interest, if you were considering a hardware refresh/update, to wait a while. There are currently efforts being made to develop processors that are resistant to these threats, but there is still no indication of when this hardware will be made available.

In the meantime, keep checking back to our blog for IT best practices, tips, and more.

Your Backup Needs to Meet Some Prerequisites
Tip of the Week: What You’ll Need to Leverage BYOD
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, September 24, 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Business Computing Document Management Mobility Domains Social Engineering Hardware Solutions Digital Project Management Botnet Update Accidental deletion Collaboration IT support Staten Island In Internet of Things Thank You Digital Payment Compliance Innovation Technology SharePoint Outlook Managed Service Multi-Factor Security Software tech support Staten Island Workplace Tips LiFi Cortana IT support Staten Islans ransomware attacks Content Administrator Vulnerability Public Cloud Telephony Web Server Best Practice Blockchain managed IT services staten island Workers Tech Support Google Drive data recovery Rental Service computer services Staten Island Miscellaneous Office Unified Communications Staten Island computer support Monitoring Hacks Upload Health User Tip Office Tips Small Business IT Management Website Worker Visible Light Communication Windows Upgrade Mobile Technology Employer-Employee Relationship Virtual Desktop computer support NYC it support Bring Your Own Device managed it services managed services Hacking Corporate Profile Data storage IT services New York City Mobile Device Management Business Technology Emergency Hackers Backup and Disaster Recovery Downtime Hosted Solutions Administration IT support firms Email Scam malware worms Managed IT Services tech support Staten Isalnd Memory computer support datto Emails Trends Two-factor Authentication Documents Audit Lithium-ion battery Data Breach Desktop Running Cable Apple DDoS Android IT consulting NYC Meetings Supercomputer Big Data Productivity Network Congestion Solid State Drive Data Security Download Internet of Things Data Backup Cost Management Ransomware Work/Life Balance Malware Identity Theft malware Hard disk Business Mangement Electronic Medical Records Excel computer support firms Social Media Data Protection IT consulting firm Disaster Recovery Unified Threat Management Touchscreen Smartphone Microsoft Office Notifications Safety Access Control Unified Threat Management Security Virtual Assistant Knowledge CCTV BYOD Cybersecurity Processors Google Docs Cloud computing Staten Island Spyware Monitors computer repair Staten Island Going Green Managed IT Business Cards Music IT support New York City Deep Learning Fake News Black Market Language Hiring/Firing Cloud Computing Windows 8 Business Metrics Managed IT Services Laptops Government Law Enforcement Patch Management Banking Virus Virtual Reality Machine Learning Nanotechnology Windows XP today ’s organizations Chromebook Recovery Staten Island IT support Spam Software as a Service Backup Google Database Business Management Hard Drive Disposal Sports Retail Powerful Technology Solutions History Twitter Firewall Computing data loss Staten Island tech support Mouse Operating System Company Culture Laptop Computer Malfunction Tip of the week Cloud Word Tablet VoIP Password Health IT Vulnerabilities Best Practices The Internet of Things Disaster Vendor Management VPN Network Management BDR Tech Term Addiction Office 365 Virtualization Computer Care Regulation Flash Windows 10 Cache managed services Staten Island Hacker CrashOverride Telephone WiFi Tracking Webcam tech support Reliable Computing Scalability Bitcoin Vendor Mangement end-user files Maintenance Business Management Network Security Employer Employee Relationship Hosted Solution Websites Information Technology computer repair Motion Sickness Writing Communication Budget IT Consultant Software License staten island managed services Cryptocurrency Tablets End of Support Wi-Fi Phishing IT services NYC Tip of the Week Staffing How To Data Google Calendar VoIP Telephone Systems Robot Artificial Intelligence PDF Microchip Cybercrime Remote Monitoring Computer Proxy Server Privacy File Sharing Save Money Freedom of Information Staten Island IT consulting Microsoft Content Filtering Paperless Office Browser Education Text Messaging Data Management Customer Service Downloads Hardware Quick Tips Experience Start Menu Service Level Agreement IT consulting company Hard Drive Gadgets IT consulting Staten Island Taxes Workstations IT services Staten Island Lenovo Bandwidth Holiday Relocation IT support NYC Printers YouTube IBM IT consulting Business Growth Advertising computer support Staten Island News Securty Network Society Passwords Remote Computing Mobile Devices Physical Security eWaste Analytics Access SaaS Windows 10 Comparison Mobile Security Settings Efficiency Time Management Smartphones Outsourced IT Politics Internet Customer Resource management Wireless User Tips Networking G Suite Business Continuity Conferencing Equifax 3D Printing Telephone System Redundancy Printer Social Devices Television Wireless Technology email scam Google Maps Legal Managing Stress Printing Distributed Denial of Service Piracy Error Flexibility Computers HTML Productivity Google Wallet Specifications Private Cloud Screen Reader Applications computer services Samsung CryptoLocker Mobile Device Training Encryption Drones Apps Facebook Gamification Cabling Travel Managed Service Provider IT consulting firms Server Multi-factor Authentication Microsoft Excel Device security Help Desk Search Tactics IT support Gmail Automation App Money Automobile Information communications Accountants Augmented Reality Regulations Vendor Wireless Headphones Hack Alert IT Support Congratulations Tech Terms Saving Money IT Services Displays Social Network Computing Infrastructure Cleaning Uninterrupted Power Supply Streaming Media Proactive IT Legislation data recovery Staten Island Antivirus IT consulting Staten island Username managed IT services NYC Bluetooth Startup

Newsletter Sign Up