CNCounty News

Cyber attacks don't take breaks for holidays

Author

Image of Rita-Reynolds-2.png

Rita Reynolds

Director of Public Sector, CAI

Upcoming Events

Related News

Advocacy

County Countdown – Dec. 1, 2025

Image of GettyImages-1331943958.jpg

Key Takeaways

One would think that over the holidays, the hacking community might take a break! On the contrary, they are capitalizing on the opportunity to exploit a new vulnerability found in an open- source logging utility widely used by enterprise applications and cloud services. Many counties have already started addressing this exposure, but in case you have not heard about it, here are six key points along with remediation guidance on addressing the situation for you to share with your IT departments or support.

Situation

Remediation

The Cyber Security and Infrastructure Security Agency (DHS-CISA) has been hosting various calls as well as providing online guidance to help identify and remediate this exposure. The CISA has compiled a great set of resources to assist (located at Apache Log4j Vulnerability Guidance | CISA ). Further, the Multi-State Information Sharing and Analysis Center (MS-ISAC) has developed a guiding playbook located at https://www.cisecurity.org/log4j-zero-day-vulnerability-response/. The playbook starts with having the County IT answer the question “Is my county application impacted by this vulnerability”? The playbook then contains additional steps that will help you answer that question and respond appropriately. If you determine that your county is impacted, then it is imperative that vendor patches are applied immediately followed by testing. In some cases that may involve reaching out to a third-party provider who controls or owns the application or platform you are using. The playbook contains a very helpful flowchart (see below)

Image of Log4jImage.JPG

In closing, you will want to make sure that your end user security is in place and working properly. This includes having monitoring tools in place that will alert your IT for suspicious or unusual activity.

Resources 

For more information and guidance, here is a summary of valuable of resources

For additional information or assistance, you can reach out to Rita Reynolds, NACo CIO at rreynolds@naco.org.

Attachments

Related News

White House
Advocacy

White House signs Executive Order on state AI lawmaking

President Trump signed an Executive Order (EO) aimed at mobilizing federal agencies to challenge existing state laws on artificial intelligence.

man pointing at a cybersecurity shield with a checkmark and then a checklist is next to it
Advocacy

Congress Considers Bills to Reauthorize State and Local Cybersecurity Grant Program

Congress is considering two bills to reauthorize the State and Local Cybersecurity Program

County Countdown
Advocacy

County Countdown – Dec. 1, 2025

Every other week, NACo's County Countdown reviews top federal policy advocacy items with an eye towards counties and the intergovernmental partnership.