log4j: What You Need To Do now

Just in case you’ve been fishing or somehow else disconnect from what’s been going on in the past two days: the internet is on fire. Quite literally, ever since news about a vulnerability in the lesser know, but widely used log4j software has been discovered. Suffice to say, almost everyone is affected, and it’s a vulnerability which can be exploited using just a few letter. Literally.

However, we’re not going to go into details about what has happened, you’ll find plenty of explanations out there. However, even if most vulnerabilities in affected software will be fixed soon, it won’t be the end of the fire. What is happening now is that cyber criminals will plant back doors into servers and software, with the intent of using those when the dust settled.

Hence, the best advice for now: Don’t panic! Next, once your heartrate has settled to an acceptable level, do the following.

  • Update all of your software. Here is a list of software affected – however, don’t expect that list to be complete. Stay on the safe side and update everything you can get your hands on. Repeat that during the next few days.
  • Backup. Follow the 3-2-1 rule in backing up. Especially now it is vital to have a backup offsite which is not compromised.
  • Up your defense. Whatever that might be. If you’re a small business and shied away from the costs: now is the time to do something about cybersecurity. Not the worst time at the end of the year, either.
  • Be alert. Tell your employees to be alert. Attacks will be on the rise, that is for sure, in the weeks to come. Educate yourself and your staff about cyber defenses.
Related:   Top Skills for Cybersecurity Professionals to Prepare for the Future of Work

This is most likely the biggest cybersecurity event this year, it’s impact will hunt us for a while to come. But then again, that is a good opportunity to give cybersecurity the credit it deserves.

2 thoughts on “log4j: What You Need To Do now

Leave a Reply

Your email address will not be published. Required fields are marked *