updates | GIGE IT Solutions: IT Services Mississauga http://gige.ca/tag/updates IT Services & IT Solutions Mississauga & Toronto Wed, 29 Jan 2020 16:40:30 +0000 en-US hourly 1 https://wordpress.org/?v=6.8.3 https://gige.ca/wp-content/uploads/2017/06/cropped-tab-icon-g-final-32x32.png updates | GIGE IT Solutions: IT Services Mississauga http://gige.ca/tag/updates 32 32 Today We Say Goodbye to Windows 7 https://gige.ca/goodbye-windows-7 Tue, 14 Jan 2020 19:02:37 +0000 https://gige.ca/?p=9240 The post Today We Say Goodbye to Windows 7 appeared first on GIGE IT Solutions: IT Services Mississauga.

]]>

Goodbye Windows 7 – today, January 14th 2020, is the day that Microsoft officially ends security support for Windows 7 computers. This means that PCs still running the decade old operating system will no longer be receiving security updates from Microsoft. According to NetMarketShare’s statistics, 1/3 of PCs around the world are still running Windows 7.

Microsoft urges all of these users to update to a newer operating system, either Windows 8.1 or Windows 10 in order to stay protected against malware threats such as ransomware. Sensitive personal information on your home or business PCs are at risk of exposure.

It’s not all bad news – Google has said that it will continue to release updates for its Chrome browser for Windows 7 until 2021. However, this by no means covers all security bases, and migrating to a newer operating system is still the best option in terms of cybersecurity.

If upgrading is not an option, follow these best practices to keep yourself protected:

For businesses still running Windows 7, your employees are the first line of defense against malware. One of the most common methods of infection is through malicious links in fraudulent emails – a strategy known as phishing. By education your employees with frequent seminars on current threats and phishing telltale signs, you can minimize the likelihood that malware can infiltrate your network. If you would like an overview on some of our recommendations against phishing, you can check out our article on the topic here: Phishing Scams – What are they and how can you protect yourself?

For both businesses and consumers, it is important not to store sensitive information such as credit card data on your Windows 7 PC. Furthermore, avoid using online banking apps on Windows 7 PCs.

Don’t fully rely on your Windows 7 PC’s storage. Keep backups of your important data in a separate location – either on an external hard drive, a USB, or on another PC. Some types of malware, such as ransomware, locks user data behind a ransomwall, demanding payment for its release. Once a computer is infected with ransomware and the data is encrypted, it cannot be read unless it is decrypted with a key only known by the attackers.

If you would like to learn more about the dangers of staying on Windows 7, you can visit our page here, or email any questions to info@gige.ca

The post Today We Say Goodbye to Windows 7 first appeared on GIGE IT Solutions: IT Services Mississauga.

The post Today We Say Goodbye to Windows 7 appeared first on GIGE IT Solutions: IT Services Mississauga.

]]>
9240
Best Practices Against The New “Spectre” And “Meltdown” Cyberthreats https://gige.ca/best-practices-against-the-new-spectre-and-meltdown-cyberthreats Tue, 29 May 2018 16:12:21 +0000 http://gige.ca/?p=5658 The post Best Practices Against The New “Spectre” And “Meltdown” Cyberthreats appeared first on GIGE IT Solutions: IT Services Mississauga.

]]>

Best Practices Against The New “Spectre” And “Meltdown” Cyberthreats

The cybersecurity threats “Spectre” and “Meltdown” were first discovered January of this year as vulnerabilities that allowed attackers to gain access to sensitive information on computers using modern Intel, AMD, or ARM CPUs. While the name “Spectre” included Variants 1 and 2 of the vulnerability, “Meltdown” described Variant 3. Although these original threats have since been addressed by security updates, new versions dubbed Variant 3a and Variant 4 have been discovered on May 21st 2018. Like the original threats, these new iterations allow attackers to access personal information stored on vulnerable systems.

CPU and Operating System (OS) developers are currently working on further security updates to address these new threats in the following weeks. However, here are some best practices that can help protect your computer while official updates are developed:

First, ensure that your computers are running the latest security updates developed against variants 1, 2, and 3. In particular, Intel has stated that updates which were developed to defend against Variant 1 web-browser exploitation are also effective in combatting Variant 4. However, it is also important to be vigilant for new security updates. The US Computer Emergency Readiness Team has stressed that the January/February Microsoft updates against “Spectre” and “Meltdown” still contained a vulnerability that could allow attackers to gain full control of a computer through editing kernel memory.

Second, constantly check for new microcode updates from your computer’s Operating System, Motherboard, or Server providers. Furthermore, after applying new security updates, the National Cybersecurity and Communications Integration Centre suggests reporting any abnormal behavior on your computer to the update developer, as effectiveness of updates can vary depending on users’ specific system configurations.


The “Meltdown” and “Spectre” Cybersecurity Threats

Originally revealed in January 2018, cybersecurity threats “Meltdown” and “Spectre” allowed attackers to destroy security measures and access CPU data on many computers containing CPUs from Intel, AMD, or ARM. Since its discovery, security updates combatting the vulnerabilities have been released by both CPU developers and OS providers such as Intel and Microsoft. However on May 21st two new versions of the security threats were discovered by both Google Project Zero (GPZ) and Microsoft Security Response Centre (MSRC). Like the original vulnerabilities, these threats allowed hackers to access personal information on computers containing Intel, AMD, or ARM CPUs.

The first of these threats is officially known as “CVE-2018-3640”, “Variant 3a” or “Rogue System Register Read (RSRR)”. By exploiting this vulnerability, an individual can gain access to personal information by speculatively reading system parameters through side-channel analysis. The second threat has been named “CVE-2018-3639”, “Variant 4”, or “Speculative Store Bypass Disable (SSBD)”. This vulnerability allows for an individual to access old memory values in a CPU, allowing attackers to acquire sensitive information. This is possible because remnant data is stored within the CPU stack despite the processor constantly updating old information.

Intel, AMD, and ARM have all released statements outlining their strategies to combatting the new threat, and what consumers can do to protect themselves. Intel has reportedly distributed new beta security updates to various OS developers, who they state are working to develop production-versions to be released in the following weeks. Next, AMD suggests consulting OS providers specific to your system for steps to protect yourself against these new vulnerabilities. Finally, ARM has stated that the impact of these new threats is less widespread among their CPUs. Therefore, no further action against RSRR is required for Linux systems, and SSBD can be combatted by “disabling a hardware feature (memory disambiguation) at boot via an implementation-defined control register.” Finally, to address the threats on systems not running Linux, ARM suggests that “Memory disambiguation should be disabled at boot by setting the relevant control register bit”.

If you need more information on Meltdown and Spectre or keeping your servers up to date, contact us at +1 (888) 366-4443.

The post Best Practices Against The New “Spectre” And “Meltdown” Cyberthreats first appeared on GIGE IT Solutions: IT Services Mississauga.

The post Best Practices Against The New “Spectre” And “Meltdown” Cyberthreats appeared first on GIGE IT Solutions: IT Services Mississauga.

]]>
5658