How to Handle the Latest Cybersecurity Fire around Log4j Known as LOG4Shell

Apache’sLog4j is an innocuous name for a bit of software currently setting the security world on fire. It’s free and used in all sorts of software applications. Developers insert Log4j as the tracking code during their software build.

It works, no reason to re-invent the wheel. Log4j is in the Java programming language. Significant parts of computer code used today run Java and so contain Log4j.

What’s affected? Lots, such as cloud storage, software packages used by millions, and even TVs connected to the Internet. How did this happen?

Log4j searches to record an entry correctly with each log request received. Cybercriminals ask Log4j to log a malicious code, and it complies. This process allows the criminals to hijack a server running Log4j.

How will this affect your business? A good deal of the hacking appropriates the computer to mine bitcoin. Computer security engineers are working as fast as possible to fix the problem.

But this little piece of software is everywhere, so finding and patching is an enormous project. Multiple scanning programs to locate Log4j are available to use. The security community recommends using more than one type to search as not all will find it everywhere it exists.

How can you turn away an attack? Phishing emails are a popular way to insert malicious code. Notify your employees to expect more suspicious emails coming their way. Remind them not to open links or download attachments before double-checking the source.

Author: Kris Keppeler, a writer who finds technology fascinating and loves humor. She writes for Crossing Genres on Medium.com and Does This Happen to You? on Channillo. Award-winning podcast producer who enjoys telling stories. Follow her @KrisKKAria on Twitter or on LinkedIn.

Leave a Reply

Please log in using one of these methods to post your comment:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.