116 Gawler Place, Adelaide SA 5000 1800 818 875 [email protected]

Jam Cyber talks about LOG4J Vulnerability

10 ways to ensure your business is protected from the Log4j vulnerability

In December 2021, a vulnerability was discovered in a Java code known as the Log4j vulnerability. The news went global instantly and sent cyber security experts and software developers into a frenzy. Governments issued warnings. The world’s largest companies released statements. And cyber criminals rapidly began exploiting the flaw. 

What is a Log4j Hack?

4 months later, the incident may feel like ‘old news’ however, many businesses in Australia have not taken the appropriate steps to fix this vulnerability.

With the increased cyber threat due to the Russian invasion of Ukraine, experts are advising business owners to check they have taken all necessary steps to safeguard their business.

We have listed the top 10 ways to ensure your business is protected from the Log4j vulnerability.

  1. Patch, patch, patch! The core fix to any vulnerability is to make sure all program patches are up to date.  As it is difficult to identify every program that uses Log4j code, we recommended patching all applications. Read more about patching application.
  2. Set scheduled patch reminders and review: patches should be reviewed every 24 hours to ensure the business is up to date with the latest fixes.
  3. Review your administration rights: check your employees are set up as guests, NOT administrative users. This will limit the impact of an attack if it is successful. Read more about managing administration rights.
  4. Review your antivirus software: these days it is essential to have next-generation antivirus on any business device. Your antivirus software should be able to detect new threats from day zero. Review our advice on antivirus solutions.
  5. Educate your employees: cyber security training educates employees on how to identify an attack, as well as how to minimise threats. Employees are overwhelmingly the cause of cyber attacks and therefore, educating them on issues, such as what to look out for with Log4j, can stop attackers in their tracks. Read more about how to implement cyber security training for your team.
  6. Have an incident response plan: in the event you are attacked via the Log4j vulnerability (or another threat) the business should know how to act immediately to limit the damage caused. See what policies we recommend for all businesses.
  7. Disable Java where possible: disabling Java codes can reduce the likelihood of being attacked via the Log4j. This can be done via reviewing your application hardening. Read more about this process.
  8. Block unknown programs running: the log4j vulnerability can allow cyber criminals to access your computer system and run malicious code (malware) on your system. Thus, blocking unknown programs from executing (running/installing) can stop the attack from occurring. See how you can enable known programs.
  9. Test your backup: if your business falls victim to an attack, such as ransomware, your backup is your business lifeline. Thus, this should be tested regularly to ensure it is working and the business can continue operating in the event data is lost, stolen, or encrypted. See our recommendations when it comes to backup systems.
  10. Speak to a cyber security expert: A cyber security expert can implement all the above for you and more. If you are unsure how to protect your business, you should talk to a cyber security specialist to ensure you, and your IT team, are doing everything you should be to reduce your risk of an attack.

Need to know more about cybersecurity?

Check out our website https://jamcyber.com/
Check out our blog https://jamcyber.com/blog/ 
#JamCyber #CyberCEO

Related Posts:

Google Rating
Based on 41 reviews
Have questions? Search our knowledgebase.