Tag: proactive tech care

  • If you have a computer or server with an Intel Processor, you need to patch for this vulnerability ASAP

    If you have a computer or server with an Intel Processor, you need to patch for this vulnerability ASAP

    Intel just released a fix for a vulnerability that would make certain CPUs in jeopardy of being compromised. The vulnerability would allow an attacker to gain privileged access to machines or trigger a denial-of-service attack.

    You can see the list of affected CPUs here, patching for this vulnerability may need to occur in phases including micro-updates to the BIOs, system OS and drivers. In a statement on their website Intel says malicious exploitation of this code would need execution of an arbitrary code (so it can’t be exploited with no input from the end user). They don’t believe patching for this issue will impact devices in a noticeable way.

    Originally discovered by a Google Security Engineering team and dubbed “Reptar”, a researcher at Google commented on how strange this vulnerability appears to be.

    The vulnerability changes how redundant prefixes, basically small bits of code, are interpreted by the effected CPUs. Normally CPUs ignore redundant prefixes for obvious reasons (the key word being “redundant”) but instead these prefixes triggered expanding errors within the system. The Google team found that when it was left without remediation eventually the affected machines would report processing errors and begin to malfunction.

    Destructive code like this is frightening because it may not just be a loss of data or temporary use of the affected machine, but it may cause the computer or server to fail altogether.

    This Isn’t the first CPU exploit Intel has suffered and they’re not the only ones battling attacks to their hardware, with AMD also announcing news of their own “CacheWarp” vulnerability that allowed attackers to gain root access to Linux Virtual Machines. So, if you thought these types of attacks were limited to Windows, think again. In this case the vulnerability only affects 1st through 3rd generation EPYC processors, the 4th generation is not vulnerable in this case.

    Also, with the AMD vulnerability it’s also important to note that while a patch is available for just the 3rd generation EPYC processor. For 1st and 2nd generation there is no mitigation available. As with Intel it’s not expected that the patch will have any effect on the CPU performance.

    Both companies have been very quick to patch these aggressive vulnerabilities and attacks like these highlight the need to make sure regular patching is a primary component of any tech service plan. Below are 5 key components we recommend when it comes to proactive technology support

    Proactive care is often a tough sell, with many business owners not feeling the need to spend the money on proactive tech care as these things “won’t happen to them”. It’s important to note that many attacks that occur are widespread and have no specific target in mind. If you have unpatched equipment in your office, you may be a sitting duck to any widespread attack issued to a vendor you use or because you bought a certain kind of hardware that ended up having a vulnerability. These attacks are ones of convenience not of malice as is often misconstrued.

    Even if it can be recovered from, why take the chance? Having a partner like Valley Techlogic to make sure vulnerabilities like the ones in this article are patched as soon as a fix is available means you will never be part of the eye-opening statistic about businesses who suffer a major breach. If you’re not aware, 60% of businesses close after a cyberattack. Don’t let that be you, reach out for a free consultation with us today.

    Looking for more to read? We suggest these other articles from our site.

    This article was powered by Valley Techlogic, an IT service provider in Atwater, CA. You can find more information at https://www.valleytechlogic.com/ or on Facebook at https://www.facebook.com/valleytechlogic/ . Follow us on Twitter at https://x.com/valleytechlogic.

  • Proactive vs Reactive Tech Care – Why Tackling Things as They Spring Up Can Backfire BIG

    Proactive vs Reactive Tech Care – Why Tackling Things as They Spring Up Can Backfire BIG

    As a technology service provider, it’s probably a given that we believe in proactive maintenance. We believe being proactive is less costly both in lost revenue and lost time (and time is money so it’s doubling down when a technology outage occurs).

    Many clients are afraid to replace aging hardware, these systems represent a big investment for them typically and they want to get the most “bang for their buck” out of systems they spent thousands of dollars on. They’re also used to how these machines operate and aren’t sure if newer machines will really represent a quality of life upgrade for them.

    There’s also the fear that replacing hardware will be a protracted situation, where transferring files, setup etc. may result in the one thing we all fear most in the business world – downtime.

    This is generally not the case, most of the time switching out systems is an easy seamless process that’s completed in less than a couple of hours or even during a lunch break. Switching out a server can be more time consuming but at Valley Techlogic we perform those upgrades after hours so as not to inconvenience our clients. We can also keep your existing server running as we get the replacement up and going in most cases (and is another reason it’s a good idea to perform these upgrades before a hardware failure occurs).

    Proactive maintenance also applies to software, whether it be updating existing software or finding a new solution for a software product that’s no longer available. Replacing aging hardware and aging software often go hand in hand, with clients keeping a system around that’s functionally way past it’s prime but is necessary to run a line of business software that’s no longer available.

    This is a risky endeavor, machines running Windows 7 or Windows Server 2012 or older are no longer being updated by Microsoft and represent a literal threat vector to which bad actors can infiltrate your business. The same goes for other aging devices that are no longer receiving firmware updates, such as routers and peripherals like smart switches that connect to the internet.

    At Valley Techlogic we are utilizing tools that track the age of equipment and whether it’s been recently updated, that way we can make recommendations to our clients ahead of time when equipment has reached its end of life.

    In many businesses, operating on a “run-to-failure” basis makes sense, if you’re in manufacturing for example repairing large, expensive equipment for as long as you can to maximize your ROI is a smart business practice. However, anyone would agree that replacing equipment that’s become unsafe is absolutely crucial.

    That’s why we operate on a proactive model, in the technology world aging hardware that can’t be updated is a risk to your business whether it be from unintended downtime or a cyber security threat.

    Here are some other items we’re also proactive about for our clients:

    Click to view the full size version.

    If you would like to learn more about obtaining a proactive technology service plan for your business, just request a consultation. We’ll even give you your first service call on the house (up to 2 hours) which we can use to evaluate your existing devices and offer our recommendations. Learn more today.

    Looking for more to read? We suggest these other articles from our site.

    This article was powered by Valley Techlogic, an IT service provider in Atwater, CA. You can find more information at https://www.valleytechlogic.com/ or on Facebook at https://www.facebook.com/valleytechlogic/ . Follow us on Twitter at https://x.com/valleytechlogic.