Recent press reports talk about a newly discovered form of security threat that involves attackers exploiting common features of modern microprocessors (aka chips) that power our computers, tablets, smartphones, and other gadgets. These attacks, known as “Meltdown” and “Spectre”, are getting a lot of attention. What is it? Should you be concerned?
Meltdown and Spectre work on personal computers, servers, mobile devices, and in the cloud. First, watch this video from, RedHat, to help better understand this vulnerability.
Understanding Meltdown and Spectre in three minutes
Now that you understand the vulnerability, should you be concerned?
The good new is, this vulnerability has been known privately to hardware and software manufactures for a while, they have been quietly working in the background to address these exploits and minimize the risk of potential attacks before they released the news publicly. Updates and patches have been developed to mitigate the potential threat.
However, you should be concerned, as this vulnerability effects you at work, your personal computers and mobile devices, or basically anything with a processor.
How can you be sure your company network is protected from this vulnerability?
If you have a Managed Service or Security-as-a-service with Kappa, you are covered. We have been working around the clock to update your PC's, network and servers as they release these critical patches and updates.
If you have a Cloud Hosted Server with Kappa, you are covered as well. We have already taken the measures necessary to protect your data from any vulnerability.
If you are not sure what service you have with us, please call us 407-331-5921 or email us Support@kappaservices.com with your questions and to find out if you are covered or need us to help in any way.
What can you do to ensure you are not affected personally?
As of now, there is no way of telling if you have been compromised. Making sure the updates and patches released for this vulnerability are installed on all your devices, including your cell phone, is the only way to ensure you are protected.
Please use this valuable link to help you understand more and to find a list of manufactures that have released updates and patches to this vulnerability.