Business Cyber Security delivered via Cloud
Free Call:
Email:
Company Address:
116 Gawler Place
Adelaide SA 5000
Postal Address:
PO Box 1235,
Glenelg South SA 5044
Copyright © 2024 | Magnetic Alliance Cyber Pty Ltd | Designed by Magnetic Alliance
Log4J, The Cyber Security Threat of the Decade?
LOG4J, the cyber security threat of the decade?
As you may have seen in the media, there has been a major cyber security threat identified. Unlike an attack on a specific company, a cyber security threat is a vulnerability – or flaw – that is detected in a program/operating system and can be easily used by any cyber criminal to attack any company or individual.
This recent threat is dubbed the Log4Shell, or Log4J Exploit, and allows criminals to execute malicious codes remotely via un-patched programs. This means hackers can enter an entire computer system or network through the program’s flaw and gain access to any information that is on that computer or a connected network.
Experts, including us, believe this may be the largest cyber security breach to date due to the widespread use of Log4J in authentication systems across the IT world. Potentially, billions of devices and programs are affected until the flaw is patched!
As a business owner or CTO, what you need to do or get done TODAY:
1) Contact the vendor of every software you use which connects from and to the internet, in particular if it’s Software as a Service (SaaS) and obtain a statement in relation to the Log4J vulnerability.
2) Contact the vendor of every internet connected hardware, in particular networking devices and obtain a statement in relation to the Log4J vulnerability.
3) Ensure your cyber security defenses span your staff / people, cyber governance (i.e. policies and processes) and technologies. Cyber security is NOT an IT problem but a business risk. If badly managed, a single mouse click can destroy a decade or more of your business being built. In seconds.
Contact us if you need assistance or to initiate a Cyber Health Check to learn how to protect your business.
#cybersecurity #jamcyber #business
Log4J in the media:
–https://lnkd.in/eByACwk9
–https://lnkd.in/e3uNFZTQ
–https://lnkd.in/eKpk9h8b
Need to know more about #cybersecurity?
Check out our website https://jamcyber.com/
Check out our blog https://jamcyber.com/blog/
#JamCyber #CyberCEO
Related Posts:
How and Why to Block HTM/HTML Attachments in Outlook 365
How and Why to Block HTM/HTML Attachments in Outlook 365 Microsoft Outlook 365 is one of the most popular business
Building a Positive Cyber Security Culture
Building a Positive Cyber Security Culture A successful cyber security culture starts at the top. We often hear the term
Understanding Administrative Privileges: A Guide for Small Business Owners
Understanding Administrative Privileges: A Guide for Small Business Owners What Are Administrative Privileges? Administrative privileges on computers, simply put, are
Fake Invoice Scams: How to Protect Your Business & Your Customers
Fake Invoice Scams: How to Protect Your Business & Your Customers Fake invoice scams involve the unauthorised sending of invoices
Recent Posts
Categories