As you may have seen in the media, there has been a major cyber security threat identified. Unlike an attack on a specific company, a cyber security threat is a vulnerability – or flaw – that is detected in a program/operating system and can be easily used by any cyber criminal to attack any company or individual.
This recent threat is dubbed the Log4Shell, or Log4J Exploit, and allows criminals to execute malicious codes remotely via un-patched programs. This means hackers can enter an entire computer system or network through the program’s flaw and gain access to any information that is on that computer or a connected network.
Experts, including us, believe this may be the largest cyber security breach to date due to the widespread use of Log4J in authentication systems across the IT world. Potentially, billions of devices and programs are affected until the flaw is patched!
As a business owner or CTO, what you need to do or get done TODAY:
1) Contact the vendor of every software you use which connects from and to the internet, in particular if it’s Software as a Service (SaaS) and obtain a statement in relation to the Log4J vulnerability.
2) Contact the vendor of every internet connected hardware, in particular networking devices and obtain a statement in relation to the Log4J vulnerability.
3) Ensure your cyber security defenses span your staff / people, cyber governance (i.e. policies and processes) and technologies. Cyber security is NOT an IT problem but a business risk. If badly managed, a single mouse click can destroy a decade or more of your business being built. In seconds.
Log4J, The Cyber Security Threat of the Decade?
LOG4J, the cyber security threat of the decade?
As you may have seen in the media, there has been a major cyber security threat identified. Unlike an attack on a specific company, a cyber security threat is a vulnerability – or flaw – that is detected in a program/operating system and can be easily used by any cyber criminal to attack any company or individual.
This recent threat is dubbed the Log4Shell, or Log4J Exploit, and allows criminals to execute malicious codes remotely via un-patched programs. This means hackers can enter an entire computer system or network through the program’s flaw and gain access to any information that is on that computer or a connected network.
Experts, including us, believe this may be the largest cyber security breach to date due to the widespread use of Log4J in authentication systems across the IT world. Potentially, billions of devices and programs are affected until the flaw is patched!
As a business owner or CTO, what you need to do or get done TODAY:
1) Contact the vendor of every software you use which connects from and to the internet, in particular if it’s Software as a Service (SaaS) and obtain a statement in relation to the Log4J vulnerability.
2) Contact the vendor of every internet connected hardware, in particular networking devices and obtain a statement in relation to the Log4J vulnerability.
3) Ensure your cyber security defenses span your staff / people, cyber governance (i.e. policies and processes) and technologies. Cyber security is NOT an IT problem but a business risk. If badly managed, a single mouse click can destroy a decade or more of your business being built. In seconds.
Contact us on www.jam.magneticalliance.com.au/contact if you need assistance or to initiate a Cyber Health Check to learn how to protect your business.
#cybersecurity #jamcyber #business
Log4J in the media:
–https://lnkd.in/eByACwk9
–https://lnkd.in/e3uNFZTQ
–https://lnkd.in/eKpk9h8b
Need to know more about #cybersecurity?
Check out our website https://jamcyber.com/
Check out our blog https://jamcyber.com/blog/
#JamCyber #CyberCEO
Related Posts:
Minimising the Risk of Insider Threats for Your Business
Minimising the Risk of Insider Threats for Your Business In the constantly evolving landscape of cybersecurity, one aspect that is frequently
The Danger of Using Public Wi-Fi Networks
Navigating the Risks: The Dangers of Using Public Wi-Fi Networks In our interconnected world, staying connected is a necessity for
(Password) Size DOES Matter
Cyber CEO – (Password) Size DOES Matter A recent study has inflamed the old conversation about password length: Using an
The 10 most notorious cyber crime gangs in the world
The 10 most notorious cyber crime gangs in the world Roughly four in five breaches emanate from organised crime.[i] Cyber
Recent Posts
Categories