Understanding Microsoft 365 Licences: An Overview for SMEs Navigating the complexities of software licensing can be an exhausting task for
10 ways to ensure your business is protected from the Log4j vulnerability
In December 2021, a vulnerability was discovered in a Java code known as the Log4j vulnerability. The news went global instantly and sent cyber security experts and software developers into a frenzy. Governments issued warnings. The world’s largest companies released statements. And cyber criminals rapidly began exploiting the flaw.
4 months later, the incident may feel like ‘old news’ however, many businesses in Australia have not taken the appropriate steps to fix this vulnerability.
With the increased cyber threat due to the Russian invasion of Ukraine, experts are advising business owners to check they have taken all necessary steps to safeguard their business.
We have listed the top 10 ways to ensure your business is protected from the Log4j vulnerability.
- Patch, patch, patch! The core fix to any vulnerability is to make sure all program patches are up to date. As it is difficult to identify every program that uses Log4j code, we recommended patching all applications. Read more about patching application.
- Set scheduled patch reminders and review: patches should be reviewed every 24 hours to ensure the business is up to date with the latest fixes.
- Review your administration rights: check your employees are set up as guests, NOT administrative users. This will limit the impact of an attack if it is successful. Read more about managing administration rights.
- Review your antivirus software: these days it is essential to have next-generation antivirus on any business device. Your antivirus software should be able to detect new threats from day zero. Review our advice on antivirus solutions.
- Educate your employees: cyber security training educates employees on how to identify an attack, as well as how to minimise threats. Employees are overwhelmingly the cause of cyber attacks and therefore, educating them on issues, such as what to look out for with Log4j, can stop attackers in their tracks. Read more about how to implement cyber security training for your team.
- Have an incident response plan: in the event you are attacked via the Log4j vulnerability (or another threat) the business should know how to act immediately to limit the damage caused. See what policies we recommend for all businesses.
- Disable Java where possible: disabling Java codes can reduce the likelihood of being attacked via the Log4j. This can be done via reviewing your application hardening. Read more about this process.
- Block unknown programs running: the log4j vulnerability can allow cyber criminals to access your computer system and run malicious code (malware) on your system. Thus, blocking unknown programs from executing (running/installing) can stop the attack from occurring. See how you can enable known programs.
- Test your backup: if your business falls victim to an attack, such as ransomware, your backup is your business lifeline. Thus, this should be tested regularly to ensure it is working and the business can continue operating in the event data is lost, stolen, or encrypted. See our recommendations when it comes to backup systems.
- Speak to a cyber security expert: A cyber security expert can implement all the above for you and more. If you are unsure how to protect your business, you should talk to a cyber security specialist to ensure you, and your IT team, are doing everything you should be to reduce your risk of an attack.
Need to know more about cybersecurity?
Understanding Multi-Factor Authentication: What it is and why you probably need it Multi-Factor Authentication (MFA) is a security feature now
The Menace of Malware: Safeguarding Small Businesses In the expansive landscape of cybersecurity threats, few adversaries loom as ominously as
Cyber Security Strategies: Enabling Small Businesses to Collaborate with Major Sectors Australian small to medium businesses (SMBs) are progressively realising