CSI is actively investigating a remote code execution vulnerability (CVE-2021-44228) – deemed “Log4Shell” that was discovered on 9th December.
Who is affected?
Systems using Apache Log4j2 version 2.14.1 and earlier are affected. Also affected are any products that bundle log4j2 by default.
What is CSI doing in response?
CSI is working with vendors to understand the scope of services and systems affected by this vulnerability and planning remediation efforts.
We are investigating and taking action for CSI services that may be potentially impacted.
We will communicate to any clients who are impacted and help customers detect, investigate and mitigate attacks.
Additional information can be found on the NCSC website below:
Read more like this
Storage and Backup
Why Cyber-resilient Backups Are More Important Than Ever
Restoring mission-critical workloads with a backup strategy is the bedrock in understanding how your organisation can become even more resilient.
Cyber Security tips and best practice
Discover top cyber security tips & lessons from industry influencers.
CSI Change Freeze (Dec 2023 – Jan 2024)
CSI will be operating a ‘Change Freeze’ across our hosted and managed infrastructure to manage risk at this critical time.
Ready to talk?
Get in touch today to discuss your IT challenges and goals. No matter what’s happening in your IT environment right now, discover how our experts can help your business discover its competitive edge.