Client Area
  • Home
  • Sectors
    • IT for Business
    • IT for Education
    • IT for Charities
  • Our Services
    • IT Support Services
    • IT Security Services
    • IT Cloud Services
    • Microsoft Teams
    • Microsoft 365 Business Voice
    • Managed Connectivity
    • Managed IT Infrastructure
  • IT Masterclass Training
  • The ITSB Byte
  • Contact
IT Support Business IT Support Business
  • Solutions
    • COVID-19 Solutions
      • iDisplay Digital Thermometer
      • Protection – LCD Hand Sanitisers
  • Sectors
    • IT for Business
    • IT for Education
    • IT for Charities
  • IT Services
    • IT Support Services
    • IT Security Services
      • Managed Detection & Response (MDR)
      • Microsoft 365 Security Monitoring
      • Office 365 Advanced Threat Protection
      • Penetration Testing
      • Dark Web Monitoring
      • Cyber Essentials
        • Cyber Essentials
        • Cyber Essentials Plus
      • SSL Certificates
    • IT Cloud Services
      • Microsoft Teams
      • Cloud Protection For Microsoft Office 365
      • Power BI – Data Reporting and Visualisation
      • Email Signatures For Microsoft 365
    • IT Automation Services
      • Intelligent Automation
      • Microsoft Power Automate
    • Modern Workplace
      • Power BI – Data Reporting and Visualisation
    • Microsoft 365 Business Voice
    • Managed Connectivity
    • Managed IT Infrastructure
    • IT Masterclass Training
  • Company
    • About Us
    • Join The Team
    • The ITSB Byte (Blog)
  • Contact
  • Client Area
silvermslogo
Client Area
IT Support Business
Call our experts
Back to The ITSB Byte

[mc4wp_form id=”19228″]

You’ve may have heard the recent cybersecurity news about Apple’s “text-bomb” bug and Intel’s “Meltdown” vulnerability. But do you know the difference between a bug and a vulnerability? If not, don’t worry – we’re here to break it down for you.
Apple’s “text bomb” bug causes iPhones and Macs to crash and, in some cases, restart if they receive a message containing a specific website link. Intel’s “Meltdown” vulnerability is a little more complicated: it is a chip-level security flaw that effectively “melts” security boundaries that are normally enforced by the hardware. This means that, in theory, anything that runs as an application on your computer could steal your data.
Put simply, a bug is when the system isn’t behaving as it’s supposed to, whereas a vulnerability is a bug that manifests itself as an opportunity for exploitation. So while Apple’s “text bomb” is a bug, Intel’s “Meltdown” is a vulnerability, and therefore a more serious threat.
Where Apple’s bug is a mere annoyance, causing iPhones to crash,Meltdown has the potential to allow hackers to bypass the (usually highly protected) hardware barrier between applications run by users and the computer’s core memory. This means Intel’s security flaw could lead to theft of data, so it’s important to update your system with the latest security patch to avoid getting hacked.
With all the high-profile cyber attacks that happened last year too, news like this has only served to highlight the importance of a robust cybersecurity strategy for preventing breaches and for reacting swiftly and effectively in the event of a security failure.
This means keeping on top of updates (especially security patches); frequently backing up your data; ensuring your password health is up to scratch throughout your entire team; having a disaster recovery plan in place; and having the right support system in case anything does go awry. If you don’t have the means to develop a strong cybersecurity strategy or disaster recovery plan, get in touch to find out how our experts can help you prevent downtime and data loss.
Concerned about protecting your digital assets? Get in touch with our team to find out how we can help!

1
Like this post
  • Case Study: Gatehouse School
    Previous PostCase Study: Gatehouse School
  • Next PostTo Transform or Optimise Your Digital Business
    Case Study: Gatehouse School

Related Posts

Advantages & Disadvantages of the hybrid working model
Cloud IT Support

Advantages & Disadvantages of the hybrid working model

Visions of a post-pandemic hybrid workforce
IT Support

Visions of a post-pandemic hybrid workforce

Announcement: Our Strategic Merger with AV Specialist Quad Vision
IT Support ITSB in the Community

Announcement: Our Strategic Merger with AV Specialist Quad Vision

Welcome to the age of remote working productivity
IT Support

Welcome to the age of remote working productivity

How to regain control of your inbox
IT Support

How to regain control of your inbox

Simplify the transition to secure remote working
Cloud IT Support

Simplify the transition to secure remote working

Why you need a disaster recovery plan and what could happen if you don’t
Cyber Security IT Support

Why you need a disaster recovery plan and what could happen if you don’t

How Microsoft 365 can help you simplify GDPR
Cloud IT Support

How Microsoft 365 can help you simplify GDPR

Cloud computing: Frequently asked questions
Cloud IT Support

Cloud computing: Frequently asked questions

Welcome to the team: 10 Questions with Ashley
IT Support Soul

Welcome to the team: 10 Questions with Ashley

Leave a Reply (Cancel reply)

Your email address will not be published. Required fields are marked *

*
*

Main-Logo-2.0

Our Services

Our support services are only the start of a larger story. From Security, to voice, infrastructure and cloud our services are in place to cover a wide amount of needs for your organisation.
Lets Talk
Managed IT Support
Learn More
Microsoft Business Voice
Learn More
Managed IT Security
Learn More
Managed Connectivity
Learn More
Managed Cloud
Learn More
Managed IT Infrastructure
Learn More
Sector
  • IT for Business
  • IT for Charities
  • IT for Education
Services
  • IT Support Services
  • IT Security Services
  • IT Cloud Services
  • Managed Connectivity
  • Microsoft 365 Business Voice
  • Managed IT Infrastructure
Our Company
  • About Us
  • The ITSB Byte
  • Contact
Information
  • Privacy Policy
  • Terms & Conditions
DorsetChamberWhite-2-e1576766199759
Microsoft Silver Partners Bournemouth
Cyber Essentials internet Safety Certificate Bournemouth
Quad Vision Logo Dark
Visit our Audio Visual Arm
Main-Logo-2.0
  • IT Support Services
  • IT Security Services
  • IT Cloud Services
  • Managed Connectivity
  • Microsoft 365 Business Voice
  • Managed IT Infrastructure
© 2020 IT Support Business Limited | All Rights Reserved
Company Number: 07184583
Copy
We use cookies to ensure we're able to give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.I AgreePrivacy policy