Security


Business IT Source is working with companies to help address security vulnerabilities, including those associated with Spectre and Meltdown. Relative to the recent issues associated with Spectre and Meltdown, we have compiled a list of manufacturer links describing the issues, what to do, and the appropriate steps and drivers to install to overcome vulnerabilities.


Our configuration and integration team understands what needs to be done for specific manufacturers and models. Whether or not you are a BITS customer, we would be glad to help answer questions you have. Please see the following information and let us know if there is anything we can do.


Microsoft - Understanding the performance impact of Spectre and Meltdown mitigations on Windows Systems

Intel - Security Exploits and Intel Products

- Apple
https://support.apple.com/en-us/HT208394


- Cisco
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel


- Dell – Client
http://www.dell.com/support/article/us/en/19/sln308587/microprocessor-side-channel-vulnerabilities--cve-2017-5715--cve-2017-5753--cve-2017-5754---impact-on-dell-products?lang=en


- Dell – Server
http://www.dell.com/support/article/us/en/19/sln308588/microprocessor-side-channel-vulnerabilities--cve-2017-5715--cve-2017-5753--cve-2017-5754---impact-on-dell-emc-products--dell-enterprise-servers--storage-and-networking-?lang=en


- HP
https://support.hp.com/us-en/document/c05869091


- HPE
https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00039267en_us


- Lenovo
https://support.lenovo.com/us/en/solutions/LEN-18282


- Microsoft
https://support.microsoft.com/en-us/help/4072698/windows-server-guidance-to-protect-against-the-speculative-execution


- VMware
https://www.vmware.com/security/advisories/VMSA-2018-0002.html