Our Most Popular Managed Services

If you need help deciding what services are best for your business let us know.

Logo

 
 Popular Services
 (347) 830-7322

Logo

 

Tekie Geek Blogs

Surveying the Damage of Meltdown and Spectre

Surveying the Damage of Meltdown and Spectre

At the time of this writing, it has only been about a half a year since the Meltdown and Spectre exploits became public knowledge. Fortunately, patches were swiftly rolled out to mitigate the problems that these exploits could cause, but that doesn’t mean that these exploits are dead and buried. Let’s look back at Meltdown and Spectre to help us establish where we stand today.

What Do They Do?
Both Meltdown and Spectre affect the processor of the targeted system. The accurately-named Meltdown virtually melts away the barriers that a processor has between application processes and the system memory, which is not a good thing. Spectre works differently, in that it can ‘fool’ the processor into accessing parts of a system’s memory that it shouldn’t. Either of these results could quite easily allow a greater threat to access a user’s system.

The worst thing about Spectre and Meltdown is that they are so widespread, with the capability to influence almost every computer chip manufactured in the past 20 years. This could potentially put any data at risk, regardless of how well it was otherwise protected.

How They Were “Fixed”
Unfortunately, there is no singular, magic bullet fix for Meltdown and Spectre. However, patches were quickly released and have continued to roll out, as these exploits are repeatedly updated. When first discovered and mitigated, developers warned that patching against Meltdown and Spectre may cause a dip in performance as high as thirty percent.

While these patches do influence performance, the influence they have is currently much less significant than initially advertised. While the actual numbers vary based on a few circumstances that can be found below, the average use case showed much smaller affects, topping out at around five percent. This may change as later patches are released. However, it is also important to remember that in these kinds of situations, the initial patches usually have the greatest effects.

What Influences Performance
As mentioned above, there are other circumstances that will make the patches for Meltdown and Spectre more of a burden on your system, thereby causing a slight dip in your performance.

Use
Depending on your intended usage of your system, Meltdown and Spectre could have greater or lesser effect. A good rule of thumb to keep in mind is that applications and uses that lean more heavily on processing power will be more affected than others. So, if you rely heavily on virtualization, or have made investments into cryptocurrency mining, you may be disappointed to find your performance suffer.

Patch Used
A variety of companies have put out patches, which means that different patches are going to have different effects on the systems that they are applied to.

Device Configuration
Both your system’s hardware and software are going to influence how you may find your technology to be impacted by these patches. For instance, a newer processor will most likely be more resilient against the adverse effects of the patches, and a more up-to-date operating system, like Windows 10, will be impacted less than 7 or 8.

Our Best Advice
In order to fend off Meltdown and Spectre, we recommend that you follow a few basic best practices, including regularly installing updates to your software and being generally more security-minded as you utilize your technology. Additionally, it is probably also in your best interest, if you were considering a hardware refresh/update, to wait a while. There are currently efforts being made to develop processors that are resistant to these threats, but there is still no indication of when this hardware will be made available.

In the meantime, keep checking back to our blog for IT best practices, tips, and more.

Your Backup Needs to Meet Some Prerequisites
Tip of the Week: What You’ll Need to Leverage BYOD
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, November 19, 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

IT Consultant Collaboration IT support New York City Help Desk Outsourced IT Apple CrashOverride Computing Electronic Medical Records Saving Time IT consulting NYC Managed IT Services Virtual Assistant Best Practices Error Blockchain Users Television Reliable Computing Tech Term managed IT services staten island Proactive IT Vendor Data Security Productivity Supercomputer Going Green Backup Computer Malfunction Networking Equifax Passwords Staten Island tech support Automobile Health IT Music Social Engineering IT Support Data storage Managed IT Machine Learning Downloads File Sharing Web Server Internet of Things Navigation End of Support Technology Regulations Windows 10 data loss Lenovo Hack Hacks Laptop Staten Island IT support Vendor Mangement managed services Staten Island Business Metrics Virtual Desktop Google Wallet Sports Scam Patch Management Unified Communications Processors Mobile Technology Quick Tips Safety Multi-factor Authentication Save Money managed IT services NYC Download Bitcoin Device security Email Augmented Reality CryptoLocker Best Practice Mouse Hackers Memory Scalability Lithium-ion battery Word Upload Processor Operating System Gamification Visible Light Communication Domains Microsoft Office Microchip IT consulting data recovery Managed Service Provider Malware Document Management Innovation Accountants Downtime How To Workers Data Breach Comparison User Tips Motion Sickness Specifications Cabling Telephone System Piracy Travel Entertainment Spyware Security ransomware attacks Tip of the Week Virtualization Windows 10 Big Data Saving Money Congratulations Server Bookmark Backup and Disaster Recovery Managing Stress Windows 8 Disaster Recovery Data Protection Managed IT Services Windows XP Holiday Business Cards Upgrade Black Market Remote Monitoring Touchscreen Two-factor Authentication Mobile Device Windows IT support Staten Islans Management Google Maps Antivirus Computing Infrastructure Devices Google Drive Webcam Excel Trends Business Growth Settings Bring Your Own Device Taxes 3D Printing Company Culture Update Legal Hardware Printing Customer Resource management Cybercrime Service Level Agreement Network Paperless Office Nanotechnology Encryption Displays Facebook Tracking Samsung Law Enforcement Workplace Tips DDoS Training Access Firewall Tablet Office 365 Drones Business Mangement tech support Staten Island Business Gadgets Artificial Intelligence Virtual Reality IT consulting firms Freedom of Information Distributed Denial of Service malware Hard disk IT services Staten Island IT support Staten Island Website Government User Tip Telephone History Hosted Solutions Tactics Hard Drive Notifications Browser CCTV Project Management Fake News computer support NYC Cloud Telephony Data Analysis communications Flash App Microsoft computer support firms staten island managed services Screen Reader tech support Staten Isalnd Network Congestion Running Cable Banking Smartphone Gmail Emergency IT support NYC end-user files Cloud computing Staten Island Directions Emails Hacker tech support Wireless Technology Content Filtering Miscellaneous Education Physical Security IBM Flexibility Experience Worker Information Technology computer support Staten Island managed services Data Unified Threat Management Securty Regulation Tech Terms Smartphones WiFi Vendor Management Start Menu Administration LiFi Digital Payment Telephone Systems Mobile Security today ’s organizations computer support VPN Conferencing Microsoft Excel Wireless In Internet of Things IT support Hiring/Firing managed it services Uninterrupted Power Supply Disaster Laptops datto Recovery IT consulting company Communication Mobility BDR Google Calendar Internet VoIP Time Management it support Bandwidth Privacy Network Security Audit computer repair Staten Island SaaS Deep Learning Language Robot IT consulting firm Cost Management Startup Social Network Computers Computer Care Mobile Device Management Username Hardware Solutions Politics email scam Software License Efficiency Business Computing Business Continuity Staffing SharePoint Mobile Devices Employer-Employee Relationship Corporate Profile Health Password Access Control Remote Computing Bluetooth Public Cloud The Internet of Things Cortana VoIP Computer Cryptocurrency Society Workstations IT consulting Staten island Data Management Thank You Outlook Maintenance Business Technology Hosted Solution PDF Writing Office Tips Documents Network Management Cache Small Business Alert Knowledge computer repair Analytics Multi-Factor Security Information Printer IT support firms IT Services Vulnerabilities Managed Service Evernote Monitoring YouTube Customer Service Database Powerful Technology Solutions Legislation Printers Chromebook Monitors Google Docs News Business Management Employer Employee Relationship HTML eWaste Redundancy Rental Service Applications Desktop Unified Threat Management Vulnerability Websites Google Twitter Social Media Meetings G Suite Search Social Budget Automation Software as a Service Work/Life Balance Addiction Advertising Hacking Private Cloud computer services Relocation Virus Cloud Computing Compliance Solid State Drive Retail computer services Staten Island Tech Support Botnet Hard Drive Disposal Wireless Headphones IT services NYC Accidental deletion Digital Productivity Data Backup Money Browsers Cybersecurity Administrator Ransomware Wi-Fi Spam Fileless Malware Content Cleaning Streaming Media IT services New York City Apps Proxy Server BYOD Software Android Tip of the week Text Messaging IT Management data recovery Staten Island Staten Island computer support Identity Theft Office Phishing malware worms IT consulting Staten Island Tablets Staten Island IT consulting

Newsletter Sign Up