How To Protect Your Server Against the Meltdown and Spectre Vulnerabilities

How To Protect Your Server Against the Meltdown and Spectre Vulnerabilities

You or your IT personnel may have heard of the Meltdown and Spectre vulnerabilities affecting Intel, AMD and other major chip manufacturers worldwide. This includes Servers used worldwide, your personal desktops / laptops and other devices. You can read more on the official INTEL statement on https://newsroom.intel.com/news/intel-responds-to-security-research-findings/

Follow instructions found on https://support.microsoft.com/en-us/help/4073757/protect-your-windows-devices-against-spectre-meltdown to protect your own personal computers / Any windows servers you may have in your office.

Ever since we’ve learned about that, we’ve kept very close watch on this issue and have followed every steps to keep your servers as safe as possible.

Since last year, in order to mitigate the risk to your servers running outdated kernels, we’ve moved everything to https://www.imunify360.com/ , a Security Solution powered by Artificial Intelligence that, on top of detecting and stopping DDoS patterns and other malicious behaviors to your servers, can also apply hot kernel patches to your servers you have with us on an hourly basis so you can be protected automatically with the latest kernel releases without having to worry about doing manual kernel upgrades.

If you want to use it in your own infrastructure you can learn more about it on https://www.cloudlinux.com/all-products/product-overview/kernelcare/enterprises (DELL does already, as do we 🙂 )

If you have your own servers that you’d like to patch as well, you may use the following guide published by Digital Ocean, or forward it to your IT Manager: https://www.digitalocean.com/community/tutorials/how-to-protect-your-server-against-the-meltdown-and-spectre-vulnerabilities

If like us, you’ve moved some of your intensive computing power to the cloud at Digital Ocean, you can get a more extensive guide on https://www.digitalocean.com/community/tutorials/how-to-update-a-digitalocean-server-s-kernel to help you making sure you’ve got the latest kernel patched.

If you’re on Google Cloud, here’s for you: https://cloud.google.com/security/cpu-vulnerabilities/

If you’re on Azure: https://azure.microsoft.com/en-us/blog/securing-azure-customers-from-cpu-vulnerability/

And if you’re on AWS: https://aws.amazon.com/security/security-bulletins/AWS-2018-013/

I hope these will help you and your IT Team keep your on-premise infrastructure safe and secure, as well as your desktop and laptop windows machines.

If you host with us, you don’t have anything to worry about, we’re taking care of it behind the scenes while you’re busy making money for your company 🙂

As always, if you have any questions, just pop us a chat message and we’ll be glad to assist!

Did you find this helpful ? Tell us what you think!

Leave a Reply

Your email address will not be published. Required fields are marked *


David is the Managing Director of GWS. With a software engineering background, and more than 11 years of experience of R&D in web application, server management, multi-platform integrations, and the successful development and development of more than 300 websites in his career, he knows a bit or two about getting things done for your business. He's also a technology enthusiast, and is always playing with new stuff that are still in beta, or not widely used yet, like Kubernetes, scalable wordpress deployments, transactional chat bots. Anything buzzy actually, trying them out, and finding use-cases to implement these new tech that will benefit client projects he's currently working on.

Cookie Settings
By continuing to browse or by clicking "Accept All Cookies" you agree to the storing of first and third-party cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts.
Cookie Policy
Cookie Settings
Accept All Cookies
By continuing to browse or by clicking "Accept All Cookies" you agree to the storing of first and third-party cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts.
Cookie Policy
Cookie Settings
Accept All Cookies