Our Most Popular Managed Services

If you need help deciding what services are best for your business let us know.


 Popular Services
 (347) 830-7322



Tekie Geek Blogs

Surveying the Damage of Meltdown and Spectre

Surveying the Damage of Meltdown and Spectre

At the time of this writing, it has only been about a half a year since the Meltdown and Spectre exploits became public knowledge. Fortunately, patches were swiftly rolled out to mitigate the problems that these exploits could cause, but that doesn’t mean that these exploits are dead and buried. Let’s look back at Meltdown and Spectre to help us establish where we stand today.

What Do They Do?
Both Meltdown and Spectre affect the processor of the targeted system. The accurately-named Meltdown virtually melts away the barriers that a processor has between application processes and the system memory, which is not a good thing. Spectre works differently, in that it can ‘fool’ the processor into accessing parts of a system’s memory that it shouldn’t. Either of these results could quite easily allow a greater threat to access a user’s system.

The worst thing about Spectre and Meltdown is that they are so widespread, with the capability to influence almost every computer chip manufactured in the past 20 years. This could potentially put any data at risk, regardless of how well it was otherwise protected.

How They Were “Fixed”
Unfortunately, there is no singular, magic bullet fix for Meltdown and Spectre. However, patches were quickly released and have continued to roll out, as these exploits are repeatedly updated. When first discovered and mitigated, developers warned that patching against Meltdown and Spectre may cause a dip in performance as high as thirty percent.

While these patches do influence performance, the influence they have is currently much less significant than initially advertised. While the actual numbers vary based on a few circumstances that can be found below, the average use case showed much smaller affects, topping out at around five percent. This may change as later patches are released. However, it is also important to remember that in these kinds of situations, the initial patches usually have the greatest effects.

What Influences Performance
As mentioned above, there are other circumstances that will make the patches for Meltdown and Spectre more of a burden on your system, thereby causing a slight dip in your performance.

Depending on your intended usage of your system, Meltdown and Spectre could have greater or lesser effect. A good rule of thumb to keep in mind is that applications and uses that lean more heavily on processing power will be more affected than others. So, if you rely heavily on virtualization, or have made investments into cryptocurrency mining, you may be disappointed to find your performance suffer.

Patch Used
A variety of companies have put out patches, which means that different patches are going to have different effects on the systems that they are applied to.

Device Configuration
Both your system’s hardware and software are going to influence how you may find your technology to be impacted by these patches. For instance, a newer processor will most likely be more resilient against the adverse effects of the patches, and a more up-to-date operating system, like Windows 10, will be impacted less than 7 or 8.

Our Best Advice
In order to fend off Meltdown and Spectre, we recommend that you follow a few basic best practices, including regularly installing updates to your software and being generally more security-minded as you utilize your technology. Additionally, it is probably also in your best interest, if you were considering a hardware refresh/update, to wait a while. There are currently efforts being made to develop processors that are resistant to these threats, but there is still no indication of when this hardware will be made available.

In the meantime, keep checking back to our blog for IT best practices, tips, and more.

Your Backup Needs to Meet Some Prerequisites
Tip of the Week: What You’ll Need to Leverage BYOD


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, July 20, 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Worker Disaster Recovery Conferencing Windows 8 tech support Staten Isalnd Vendor Mangement Virtual Assistant Workstations Augmented Reality Flash managed IT services NYC IT support New York City Privacy Upgrade Government Computers Virtualization Accountants Laptop Training Wireless Headphones Tip of the Week Multi-Factor Security Save Money Unified Threat Management Cybersecurity Taxes Vulnerability Telephone Systems Travel Language Windows Regulations Excel Staffing Upload Data Protection today ’s organizations Education Network Congestion Information Nanotechnology Piracy Phishing Hackers Processors Scam Websites Webcam Office Tips WiFi Customer Service Google Drive Digital Desktop Google Screen Reader Chromebook Operating System Cache Drones Best Practices datto Safety Budget Hacker Access Control Legislation Devices Malware Tech Support Hard Drive Disposal Powerful Technology Solutions Google Calendar Outlook Staten Island IT consulting CryptoLocker Networking Politics Browser SharePoint Private Cloud Robot CCTV Solid State Drive Automobile data recovery IT consulting firms Technology Data Management Supercomputer computer services Staten Island Update YouTube Disaster Hiring/Firing Motion Sickness Web Server end-user files Productivity malware Hard disk Apple Quick Tips Monitors Employer Employee Relationship Workplace Tips Identity Theft IT services Staten Island Business Mangement Digital Payment Wi-Fi Maintenance Tech Terms Company Culture Cleaning IT consulting firm IT services NYC Staten Island tech support Samsung Mobile Technology Small Business Physical Security Law Enforcement Uninterrupted Power Supply Mobile Device Computer IT support NYC Automation managed services Staten Island Business Metrics Redundancy Mobile Devices Workers Network Management Specifications Bandwidth Multi-factor Authentication Banking Firewall managed services Administration How To Encryption Staten Island IT support IT consulting company Mouse Settings User Tips Bring Your Own Device Tech Term Cryptocurrency Television Rental Service Managed IT Work/Life Balance PDF Paperless Office Computing Artificial Intelligence Recovery Comparison Access Business Cards Scalability Facebook Time Management Going Green malware worms Download Android eWaste Microsoft Excel Communication computer support firms Managed IT Services Managed IT Services Cortana Big Data Business Continuity Miscellaneous Notifications VoIP Remote Monitoring Public Cloud Two-factor Authentication Managing Stress Tactics Applications IT Services Gamification Data storage Reliable Computing SaaS managed it services Information Technology Bluetooth Sports Software as a Service Freedom of Information CrashOverride Device security Software License Streaming Media Microchip Mobile Security Text Messaging Google Wallet Internet Mobility Cybercrime Data Security Smartphone Windows 10 History computer repair Staten Island Project Management The Internet of Things Hardware Knowledge Lenovo VPN IT consulting Staten Island Office 365 IT support Alert Machine Learning Productivity Backup Tablet Congratulations Holiday Email Spyware Data Backup Twitter Hacks Passwords In Internet of Things ransomware attacks Gmail Saving Money Content Filtering Experience Cabling Website Search Emails Cloud Computing Printer Social Engineering Internet of Things Unified Threat Management Server Addiction Society G Suite computer support Staten Island Writing Accidental deletion Word computer repair IT consulting email scam Legal Downloads computer services Unified Communications News Network Wireless Technology Proactive IT Data Cost Management Telephony it support Touchscreen IT support Staten Island Document Management Hosted Solutions Cloud Audit Antivirus Employer-Employee Relationship tech support Advertising Password IT services New York City Wireless tech support Staten Island Virtual Reality Security Business Technology Best Practice DDoS Domains Securty Black Market Deep Learning Collaboration Ransomware Social IT Support Virtual Desktop Backup and Disaster Recovery Hardware Solutions Business Computing Health Laptops Content staten island managed services Smartphones Emergency BYOD computer support Vendor Management IBM Google Docs Analytics Vulnerabilities Displays Money Social Media Spam Visible Light Communication Business Hard Drive End of Support Tip of the week Memory communications Start Menu data loss Google Maps computer support NYC Hosted Solution Documents Office File Sharing VoIP data recovery Staten Island Patch Management Administrator IT support Staten Islans Database Remote Computing Service Level Agreement Innovation LiFi Tablets Business Management Computing Infrastructure Business Growth BDR Help Desk Hacking Startup Bitcoin App Windows 10 Trends Retail Windows XP Printing Username Thank You Meetings Efficiency IT consulting Staten island Distributed Denial of Service IT consulting NYC Virus Apps 3D Printing Botnet Equifax Software Staten Island computer support Flexibility Hack IT Management Network Security Music Outsourced IT Compliance Computer Care Tracking Gadgets managed IT services staten island Downtime Data Breach Mobile Device Management Microsoft Office Relocation Corporate Profile HTML IT support firms Running Cable Cloud computing Staten Island Computer Malfunction Blockchain Microsoft IT Consultant Managed Service Provider Fake News Lithium-ion battery

Newsletter Sign Up