Email Security Intelligence - Guardian Digital Keeps its Customers Protected from Intel Design Flaw
- by Brittany Day
You may have heard that Intel/AMD processors going back a decade all contain serious design flaws that's prompting changes to Linux, Windows, and macOS kernels.
Keeping customers secure is always our top priority, and Guardian Digital has taken steps to make sure all of our users are protected.
Guardian Digital Protects Customers from Intel Design Flaw
Guardian Digital was first made aware of these issues back in May, and since that time has been working with kernel engineers on the development of fixes to our entire network of secure mail servers, both physical and virtual.
With the public disclosure of the security vulnerability, we can now state that we have completed the planned maintenance of all systems involved and all systems are fully protected.
We’ve worked to optimize the CPU and disk I/O path and are not seeing noticeable performance impact after the fix has been applied. All systems are designed with abundant additional processing power such that performance will not be affected.
Must Read Blog Posts
- Demystifying Phishing Attacks: How to Protect Yourself in 2024
- Must Read - How Phishing Emails Bypass Microsoft 365 Default Security
- Must Read - Shortcomings of Endpoint Security in Securing Business Email
- Must Read - What You Need to Know to Shield Your Business from Ransomware
- Must Read - Email Virus: Complete Guide to Email Viruses & Best Practices
- Must Read - Microsoft 365 Email Security Limitations You Should Know in 2024
Latest Blog Articles
- Top Microsoft 365 Cloud Email Security Issues IT Admins Face & How To Overcome Them
- Cloud Security Architecture Guide: Key Strategies, Components, and Challenges
- Navigating the Advantages & Limitations of Host-Based Intrusion Detection Systems (HIDS) in Cyber Threat Protection
- 7 Benefits of Investing in Cybersecurity Services for Business
- Dynamic Duo: Maximizing Security with HIPS and Endpoint Protection
- Why Small Businesses Must Prioritize Cloud Security Assessments
- Fortifying Your Digital Security: A Definitive Guide to Multi-Factor Authentication (MFA)
- What is Cyber Hygiene? Understanding Its Impact on Data Protection
- Data Encryption in the Cloud: A Critical Pillar of GDPR Compliance
- Deceptive Precision: Eye-Opening Spear Phishing Attack Examples