Meltdown-Spectre: Four things every Windows admin needs to do now

The confetti from New Year’s Eve celebrations had barely been swept up before the first major security incident of 2018 arrived. News of a serious security flaw in modern processors broke on January 2, after engineers at every big technology company had spent a feverish few weeks and months dissecting the problem of “speculative execution side-channel attacks” and building fixes.

Meltdown and Spectre are impressively ecumenical in their ability to create havoc, affecting devices running nearly every desktop and mobile operating system. And while software patches can mitigate the effects for now, the long-term solution involves fundamental changes to CPU design that could take years to reach the market.

One week after the (premature) public disclosure of the details of these attacks, we now know enough to survey the threat landscape and plan the long-term response.

Read which four guidelines you can follow to build a response plan that works for Meltdown and Spectre and prepares you for the next big incident on ZDNet.

Track the strategic threats to your business with the Threat Brief, delivered to your email daily.

Subscribe Here