There are two NEW vulnerabilities
 imbedded in the computer processing chips that run operating systems. The ability to invoke this weakness requires a degree of sophistication beyond most individuals, but certainly not beyond the resources and interests of crime organizations and nation states.
 There are no known widespread compromises reported, as of yet. Still, in the history of vulnerabilities, we know it will not take long before the criminal elements will take advantage. SO IMMEDIATE ACTION IS REQUIRED.

Thank you for submitting your information.

Contact Us

* Indicates required fields.

† We may require account set up and/or phone contact to verify legitimacy of request.

WHAT ARE THOSE?

These vulnerabilities have existed for years and are present in every computer, smart phone, smart TV, camera and any other endpoint or Internet of Things (IoT) device.
These flaws are pervasive across all industries, many consumer   products and number in the billions.

HOW TO ACT?

IMMEDIATE ACTION
PATCH
Microsoft, Apple, Intel and other companies are already releasing patches. If your data processing infrastructure and operating systems are set up to receive patches, review and make sure the updates were properly implemented. Otherwise a complete review of any device that uses a chip for data processing and the operating systems on the device should be manually patched. It is incumbent on each of us to be vigilant, stay aware of released and required patches, and protect our data processing capabilities.
LONG TERM IMPACT
UNDERTAKE A FRESH ASSESSMENT OF YOUR SECURITY PROGRAM
Meltdown and Spectre will not be the last vulnerability, and may not even be the most dangerous vulnerabilities in 2018. Today, more than any other time, with Ransomware, Krack, Blueborne and now Meltdown and Spectre, each company, organization and government should undertake a fresh assessment of their Security Program. These assessments do not necessarily have to be expensive or time consuming, but should be undertaken. Creating a Security Program that continually assesses your business goals, identifies critical data, implements and manages the right security solutions and having a security continuity plan in place is a necessary and defendable approach to meet ever evolving security threats.

RESOURCES

For more PCM-Security information CLICK HERE
 

More than an IT Provider - We're Your Technology Partner!

Since 1987, PCM has been a leading provider of IT products, services, solutions to businesses, government agencies, educational, institutions, and healthcare facilities.
We provide access to over 300,000 IT products like tablets , notebooks desktops , servers , storage , and networking from leading manufacturers like Cisco , HPI , Apple , Adobe , Lenovo and Microsoft . With powerful eProcurement tools, comprehensive software licensing solutions and dedicated Account Executives, it's easy to get exactly what you need to tackle your technical challenges.

Our Company

Support

We Provide

About Us
Blog
Brands
Careers
Certification & Authorization
Investor Relations
Locations
Privacy Policy
RSS
Site Map
Terms of Use and Sale
Why PCM?
Tech Journal
Contact Us
Email Subscriptions
Help Topics
My Account
Order Status
Product Recalls
Business Direct
Employee Purchase Program
Leasing Services
OpsTRACK
Services
Solutions
We proudly welcome American Express® Cards

1940 E. Mariposa Ave, El Segundo, CA 90245 - 800-700-1000
© 2016 PCM Sales, Inc.

SSL

Embedded Elouqua Script