Skip to content

How to Identify Meltdown and Spectre Vulnerable Devices

1 min read

The recent Meltdown and Spectre announcements have seen wide media coverage this past week and prompted a fair amount of extra work for IT teams across the globe.

If you work in IT, I suspect that you have recently spent a fair amount of time ensuring your systems are patched against these vulnerabilities. However, I suspect that you have also spent a considerable amount of time dealing with enquiries from others asking about these vulnerabilities and your own organisation's risk.

Mobile devices, although equally at risk, may not have been top of your priority patch list, but with increasing amounts of sensitive corporate data being stored and accessed from these devices, perhaps they should be.

THE MAJORITY OF THESE MOBILE DEVICES ARE STILL AT RISK, WITH ONLY A SMALL NUMBER OF DEVICES HAVING BEEN FULLY PATCHED AGAINST THESE CRITICAL VULNERABILITIES

Recent analysis of our aggregated and anonymised IronWorks data shows that the majority of these mobile devices are still at risk, with only a small number of devices having been fully patched against these critical vulnerabilities.

Reporting on these devices - and their current Meltdown patch status - can be a full time job without automation.  Our IronWorks solution allows you to do just that, and ensure that the senior management, risk and compliance, as well as information security teams, receive automated, personalised and relevant PDF reports on the state of your mobility project.

IronWorks brochure mobility project

We are now proud to announce that IronWorks features new additional reports listing the unpatched and vulnerable devices, so that your teams can prioritise which users and devices to concentrate on and truly understand and measure the corresponding risks.

Meltdown reporting for mobile devices

If you're not familiar with these critical vulnerabilities, or are looking for our vendor update notifications, please read our previous post here: Meltdown and Spectre Update.

Download the IronWorks Brochure

Latest Blogs

Visit the blog

Overcoming the Most Pressing Challenges CISOs Face Today

It’s no secret that CISOs have some of the toughest roles in any organisation, especially with the...

Read More

How to Calculate a Return on Investment (ROI) of Cyber Security

Cyber security is a minefield for many, not just in terms of its intricacies and ever-changing...

Read More

6 Ways Cyber Security Can Be Improved at Your Company

We know the old ways of working, well, don’t work — and they call for innovative, forward-thinking...

Read More

7 Business Growth Benefits of Cyber Security You Should Know

All organisations understand that cyber security is now an essential expense, helping companies cut...

Read More

The Pros and Cons of a Cost-Benefit Analysis Approach to Cyber Security

The cost-benefit analysis approach to cyber security is perhaps the most popular in helping prove...

Read More

Let's Talk

Get on a first-name basis with the Bridgeway team. Let’s chat about your organisational objectives and any critical cyber security concerns you need to cover.

Let's talk

default-image