Hunting for Log4j CVE-2021-44228 (Log4Shell) Exploit Activity

With Log4j, it is essential to detect the threat activity as the vulnerability is exploited or as attackers successfully insert themselves into your environment. This is where the efficacy of your security tools is put to the test.

You can’t afford to be reactive. Read the @Palo Alto Networks blog for some proactive insights. Let us know if you’d like to talk to one of our Palo Alto Networks experts about how Comtasq can help you assess and mitigate your Log4j risk.

#cybersecurity #SecuredByPANW

Use Teams for your business

From sharing files to collaborating on projects to scheduling meetings with anyone, there are many ways to use Teams for your business. Watch this video from @Microsoft for a short demo of how Teams helps you, your employees and customers stay connected, share files and work together.