Mytek Logo
MyTek Logo

ALERT: Log4j is the Most Dangerous Vulnerability in Recent History and Your Business Needs to Act NOW

by | Dec 20, 2021 | Alerts, MyTek Blog


Subscribe To The Blog

By subscribing to the blog, you will be notified when a new blog post is created on the site.

Recently, a vulnerability was discovered that will affect all computer users, whether you’re a private user or a business. This situation might take some time to resolve so we want you to know everything you need to know about Log4j so that you can protect yourself.

What is Log4j?

Log4j is a Java library, which might not mean anything to you, but you need to know about how these libraries are used to develop software. If an application uses the Log4j library, you should know about the massive vulnerability that was recently discovered.

Unfortunately, this Java library has been used extensively for the last few years, and that means this vulnerability can impact huge names in software. Here are justa  few:

  • Amazon Web Services
  • Apple
  • Cisco
  • Fortinet
  • Google
  • IBM
  • Microsoft 
  • SonicWall
  • Sophos
  • VMware

Among other companies, large and small. Beyond these, even the United States Cybersecurity and Infrastructure Agency (CISA) is affected.

How Vulnerable Could Log4j Leave My Business?

Sadly, it can leave your business extremely vulnerable. Hackers can be given near-ubiquitous access while only using a single script in some applications. It also isn’t even a new vulnerability, it’s been around for years but was only recently discovered on this scale.

Because of this discovery, it’s being taken advantage of.

What to Do to Fight Back Against Log4j

If you rely on any of the systems that have been affected, here are some steps you can take.

While it’s really up to developers to go through a fix the issues, there are still some things you can do. And don’t worry, because most developers are working on it right away.

First of all, you’ll need to keep an eye out for any patches that become available for you. If you don’t apply these, your information can be left vulnerable.

How to Protect Yourself from Log4j, as an Individual and as a Business

While it might not completely save you in the end, making sure your password are secure is one of the first steps you should take. Make sure none of your passwords are basic or too easy to guess. Here are some ways to secure your passwords:

  • Use a unique password for each account and website
  • Use a mix of alphanumeric characters and symbols
  • Use a complex passcode to help with memorability without shorting your security
  • Keep your passwords to yourself

Here at MyTek, we specialize in this kind of thing and can help your business take immediate action. Give us a call at 623-312-2440 today so we can get your team started on quick fixes.


Tim - Team

Tim Tiller, LMSW

Tim Tiller, MSW brings a deep service background to his role at Mytek, having graduated from McDonald’s management training program, fresh out of high school, and working his way up through the ranks in the hospitality industry. He has led two prior companies – Multi-Systems Inc., an IT-focused organization providing technology to hospitality companies (where he was named President at age 36), and most recently, as Chief Operating Officer for Jewish Voice Ministries International.


Subscribe To This Author

By subscribing to the author, you will be notified when a new blog post is created by the author.


Top 5 Hardware Monitoring Software 

Did you know that almost 40% of servers had at least one outage in the last twelve months? Veeam reports that the most common reason for outrages is infrastructure failure which puts the current hardware monitoring practices under the scanner. Hardware failures are...

Types of Mobile Malware & How to Defend Against Them

Malware has a long history of undermining computer security and stealing critical data. With the rapid growth of mobile usage, we're now seeing a new breed of mobile malware infecting smartphones and tablets. The new-age mobile malware are more advanced, seamless, and...

How to Protect Your Data Privacy & Enhance IT Security

Every time you use a device, you enter, modify or access data. Some of your usages are routine and public but sometimes you perform tasks that are confidential in your personal life or business. Naturally, this type of data is private and it should be kept that way....

Mobile? Grab this Article!

QR Code

Blog Archive

Share This