menu close
  • Back

Following the recently released advisory on a high severity vulnerability (CVE-2021-44228, CVE-2021-45046 and CVE-2021-45105) impacting multiple versions of the Apache Log4j 2 utility, our IT and support teams have taken a proactive approach to investigate the impact of this vulnerability on our networks and services.


From a product and managed services perspective, the team have taken a technology-based focus which has allowed us to work closely with a number of vendors to identify and possibly remediate any Apache vulnerabilities that exist in their products. Some vendors have been able to provide patches, but many of these are still evolving, and in some cases workarounds have been provided as an interim measure until remediation in the form of a patch or otherwise is available.


From our internal network perspective, our network security team have been conducting a targeted sweep on possible affected services in our supported environments and have been applying appropriate work arounds and patches as per vendor recommendations. We are confident in our security measures and the proactive response to this vulnerability by our support teams. We will continue to review our environment along with the latest vendor advice and take any required actions.


If Canon Business Services ANZ is not responsible for managing your IT or BPO services, we would strongly recommend reviewing your infrastructure and applying patches or workarounds as specifically recommended by each vendor in use in your environment.


We’ll keep you updated as the situation evolves.

Get in touch

Talk to us today to optimise your operations.

Contact Us

Similar Articles


When to conduct vulnerability assessments to identify weak points?

Explore the importance of vulnerability assessments in cybersecurity and protect your business data with CBS Australia's expert insights now!

The benefits of outsourcing IT support

Discover how outsourcing IT support drives cost savings, agility, and access to global expertise for your Australian organisation.

SIEM alert management strategies

Explore SIEM compliance for strong cybersecurity in Australia. Learn key components, regulatory standards, and implement effective SIEM solutions today!

A comprehensive comparison of SIEM and XDR

Explore SIEM and XDR for robust cybersecurity. Learn how they complement each other. Enhance your defense against evolving threats in Australia.

SIEM compliance simplified

Discover the latest strategies and best practices for SIEM compliance in Australia. This guide outlines key components, regulations, and effective implementation methods.

Incident response: NIST guidelines

Discover NIST incident response guidelines for stronger cybersecurity in Australia. Enhance incident handling with a structured approach.

Outsourcing cyber security: A strategic approach to safety

Explore the advantages of outsourcing cybersecurity. Tailored solutions to protect your Australian business.

Ransomware action plan guide in 2024

Protect your Australian business from costly ransomware attacks with this step-by-step guide that walks you through everything you need to know about ransomware.

5 reasons IT support is critical for business performance

This article tackles about the 5 Reasons IT Support is Critically Important for Business Performance. Read full article here.

Understanding the regulatory environment for Financial Services

An introduction to the compliance and regulatory environment for the Australian banking, credit lender, insurance and superannuation providers operating in global markets.

Data Security - common misconceptions

We explore four common data loss scenarios that could bring your business to its knees.