Meltdown and Spectre: Intel CPU vulnerabilities response

An update for our customers on Meltdown and Spectre and our response to the Intel CPU vulnerabilities.

Posted on 05 January 2018 -
Tibus BY Tibus

You’ve probably seen in the news by now that a security vulnerability has been found in Intel chip CPUs.

The risk to smartphones has taken the headlines, but the same vulnerabilities apply to any server running Intel. Shared and multiple tenancy hosting platforms are most vulnerable because of the inherent security risks that come from sharing hardware and having several customers with access to that hardware.

We’ve been working hard today to stay on top of the situation, so this is a brief update for our clients.

What we’re doing about Meltdown and Spectre

  • We will be contacting any clients who we need to take action on behalf of in response to the Intel CPU vulnerabilities. If you don’t hear from us, your services are not affected by the vulnerabilities. 
  • We have been and still are liaising with vendors to get the very latest information and recommendations on patching and updates to mitigate against the risk. We are implementing patches and updates accordingly.
  • We are also monitoring the status of the vulnerabilities closely on the news, blogs and social media so that we can react to any developments quickly.
  • As of this evening, we have patched all shared and multi-tenant platforms and are actively working on our physical hypervisor hosts, which house our customer virtual machines.

As we say, we will be in touch with any clients we need to, but feel free to ask away if you’ve got any questions.

Got a question about Meltdown and Spectre?

Tibus clients can contact us through their usual support channels to get further information on the Intel CPU vulnerabilites.

Get In Touch