Threats, Malware and Viruses

Helpdesk Solutions
January 17, 2018
Show all

Threats, Malware and Viruses

Safeguard from Meltdown and Spectre with Best Systems Admin

A severe design flaw in microprocessors that allows sensitive data, such as passwords and crypto-keys, to be stolen from memory is real – and its details have been revealed.

A blueprint blunder in CPUs could allow applications, malware, and JavaScript running in web browsers, to obtain the information they should not be allowed to access: the contents of the operating system kernel’s private memory areas. These zones often contain files cached from disk, a view onto the machine’s entire physical memory, and other secrets. This should be invisible to normal programs.

Thanks to this design flaw, that data is potentially accessible, meaning bad websites and malware can attempt to rifle through the computer’s memory looking for credentials, RNG seeds, personal information, and more.

This threat affects both Mac and Windows, so make sure your computers are patched and updated to protect against these threats.

If you are already on a Datum 360 fully managed plan, your devices have been proactively patched. Reactive is always more costly than the proactive IT, as these threats can be mitigated with updates and patches before problems arise.  Contact us here at Best Systems Admin for information regarding proactively managed options to help keep you and your business safe.

We recommend that you be extra vigilant, with security top of mind and Think Before You Click.  Bad guys are using this major event to try to trick you into downloading malware that claims to be a patch for the “Meltdown” and “Spectre” hardware issue. Don’t fall for it!

If you have Best Systems Admins fully managed IT service, take advantage of the free phishing and cybersecurity training.

forget about IT.. focus on growing your business

Proactive Training Offered by Best Systems Admins
Contact us for details or referrals 602-882-8048

Leave a Reply

Your email address will not be published. Required fields are marked *