More on Spectre and Meltdown Security.
Spectre and Meltdown Security Looking At The First Line Of Defence For Your Business; As the industry comes to terms with the logistics and scale of the Spectre and Meltdown issue we are starting to see some cracks in the wall from vendors on providing stable patches to counteract the potential stealing of sensitive data across the board.
If you’re not up to speed with the issue take a look at our previous post Spectre and Meltdown for a quick overview of the problem at hand.
Reports from bloggers and news articles on BSOD – Blue Screen Of Death issues after applying Microsoft patches – Microsoft halts Spectre/Meltdown patch roll out after AMD BSoD issues, VMware in the last few days has pulled its hypervisor patches as they are in a state of flux to work coherently with OS patching.
As a result, VMware is delaying new releases of microcode updates while it works with Intel to resolve microcode patch issues as quickly as possible. Intel Sightings in ESXi Bundled Microcode Patches for VMSA-2018-0004 (52345)
It all sounds like doom and gloom at the moment while the industry scrambles to plug the holes in their row boats but are quickly running out of fingers. So what’s the end game here? What are we as service providers, business and consumers meant to do in the face of all this disruption and potential thieving of data?
Spectre and Meltdown Security | First Line Of Defence Options
First things first and that’s not to panic. The second is applying some common sense approaches to the problem.
The first line of defence is usually the best way to stop these things from spreading. Let’s tackle some common sense approaches to the problem.
Some Great Options:
Use Web Security Software
We do have options and they are squarely in our hands to control. Let’s start with helping mitigate how these security flaws can be accessed; if you have Sophos or other web security software at hand make sure that you have the latest patches and updates installed. For the moment the only verified way for your machine to be infected is via Java Script which is automatically executed when visiting a hacked website.
Restrict Access To Websites
Clamp down on end users browsing cat videos from random websites and implement some web security protocols to block all unnecessary websites or sites that have been compromised for the time being. Your WEB security software will usually be up to speed on these malicious sites and will give a warning before allowing access or completely blocking access to such sites.
Increase Browser and Java Security Settings
These days the default settings for these applications on desktops are set to medium. Take a look at IE/ Edge/ FireFox etc and increase to High; same with your Java applications change these from medium to High. These 2 changes will have implications and cause popup notifications every time you access a new site or try to run a java script. The best way to tackle this is to white list the sites in both the browser and Java application.
Now unfortunately almost every web application needs to execute Java Script, it’s such a crucial tool that you just can’t disable it completely. What can be done is to increase your browser’s web security so that a prompt/pop up is displayed when java script needs to be executed. Now this may not be possible for all environments to constantly acknowledge a pop up as it can be a disruption to workflow so another idea is to increase Java Security and then whitelist sites and URLs that are regularly accessed and are known to be secure.
Communicate With Users And Implement Logic Where Possible
Ask users to implement some logic where possible about their browsing habits; it’s not always the end users fault as sites are hacked regularly and hijacked with redirects put in place to compromise machines. For the time being try to only visit trusted sites until some serious security patching can happen from the major Tech vendors in our industry to stably implement the second and third line of defence.
If you don’t have web security software installed or just need a hand trying to work out what the best way to handle all of this is, simply pick up the phone and give us a call or shoot over an email to your account manager and we will be more than happy to assist in advising or implementing some security best-practices.
Trackback from your site.