<img height="1" width="1" style="display:none;" alt="" src="https://dc.ads.linkedin.com/collect/?pid=604601&amp;fmt=gif">

 AUS 1300 360 553 |  NZ +64 9 281 8322  |  US +1 (415) 200 3752  |  UK +44 115 824 5548

Get a free demo

Submit the form below, and we'll show you how contactSPACE enables your team to achieve better business outcomes.

final-demo-background-hill-min

Have better conversations - and more of them

contactSPACE enables your team to contact the right person at the right time, managing the entire user workflow - allowing for incredible conversations at scale.

Blog

How we managed the recent CPU vulnerabilities, Meltdown and Spectre, to protect our customers.

Posted by Nick Tratsellas on 09-Jan-2018 11:40:13
meltdown_spectre.jpg

 

On January 3rd, 2018, the public was notified about two security vulnerabilities dubbed Meltdown and Spectre by researchers, that affected any Intel, AMD or ARM processor created in the last 20 years.  These vulnerabilities could potentially allow an attacker to obtain access to sensitive information. 

Spectre attacks take advantage of a CPU's branch prediction capabilities. The impact is that a process may leak sensitive data to other processes on a system. Spectre may also allow one part of an application to access other parts of the same process memory space that would otherwise not be permitted.

Meltdown leverages out-of-order execution capabilities in modern CPUs. The impact of Meltdown is that a process running in user space can view the contents of kernel memory. 

This is likely the largest security breach in history, so it’s absolutely crucial that organisations are able to deal with these security issues effectively, with minimum disruption to its customer’s operations.

contactSPACE had received the alert about the vulnerabilities on the night of January 3rd and by 11 am January 4th, all our systems were patched and protected. The process involved moving all our systems from infrastructure that were vulnerable, over to infrastructure that had been patched for us by Amazon Web Services (AWS). Our quick response time and a robust networking system meant that the entire process had a very short impact period of only 2 minutes total downtime when other companies would be down for days.

Aside from downtime, it’s been widely reported that the patched systems would suffer a performance degradation of between 30-100%, due to the many additional system processes being implemented by vendors in addressing this issue, however, contactSPACE has recently invested a lot more resources with AWS and doubled the processing power, so this type of performance degradation doesn’t affect our customers. 

This experience has highlighted the importance of continuously improving your vulnerability management processes and investing in resources to minimise the impact of significant security issues. 

Learn more about Meltdown and Spectre:

https://meltdownattack.com/meltdown.pdf

https://spectreattack.com/spectre.pdf

Update by Project Zero Team at Google  

Topics: Best Practice, contactSPACE Updates, Technology

 

About this Blog

Welcome to the contactSPACE blog!

Here we'll share the latest & greatest contact centre industry news, tips and tricks, and advice to help you get the most out of your inbound/outbound contact team.

Keen to learn more?

Subscribe to get new posts delivered weekly to your inbox.

Subscribe to Blog

Or, get an obligation free demo to find out what contactSPACE has to offer.

Make yourself heard

Get a personalised demonstration, and we'll show you how contactSPACE enables your team to achieve better business outcomes.

final-demo-background-hill-min

Have better conversations - and more of them

contactSPACE enables your team to contact the right person at the right time, managing the entire user workflow - allowing for incredible conversations at scale.

Get a free demo