Let's talk

Log4j: What you need to know


There have been widespread reports of a new serious cyber security vulnerability within the last few days. Log4j is used by many systems worldwide including Apple and Amazon etc and its been discovered that there is a serious flaw that has been actively exploited already. Synergi is fully aware of this flaw and our team are actively checking Synergi vendors and our own systems; relevant advice or updates will be shared with our customers as they become available.

Synergi Customer Systems

We are investigating the impact widely, some suppliers have not released statements on log4j yet. We have deployed components via our Remote Monitoring Toolkit that will check for active exploits using the vulnerability. This is now running continually on all supported Managed Services customers. You will be notified if any active exploits or log4j vulnerabilities are discovered. If you have any questions or concerns, please contact the Synergi support desk however we will be actively helping to mitigate this risk ongoing for all customers.

Synergi Systems

We are working closely with our partners and are pleased to report that our main internal systems providers in Microsoft (Office, Security tools and D365), Datto (SaaS protect, Remote Management, Professional Services Automaton) and Sophos (Security Endpoint, WiFi and Firewalls) have all confirmed their systems are safe, have been updated, or do not use this technology.

We have compiled a list of information sources below for further detail. As always the team at Synergi are here to help, our experts are working to check for active exploits in order to mitigate risk for all customers.


Vendor Posts


3rd Party Posts


We will post further updates and links to this blog as they become available. Last updated 24/01/2022 11:40

***UPDATE – 23/12/2021***

Log4j latest – We are now actively scanning our own and all our Managed Service customer workstation and server systems daily to detect any signs of vulnerability or compromise. Please also be aware that the vulnerability can be present in any hardware devices that are network connected as well as software and cloud based systems.

cyberessentials_certification mark plus_colour-

Cyber Essentials Certified Plus

Untitled design (5)-

Microsoft Solutions Partner



Nintex Partner Award for Customer Success (EMEA)


Nintex Partner Award for Business Transformation


Regional Spotlight Nintex Partner Award

Nintex-Partner-Premier-Horz _CMYK-

UK Nintex Premier Partner


Crown Commercial Service


Sophos Gold Partner

Blue Diamond Partner Program Logo JPG-

Datto Blue Diamond Partner


Yubico Gold Partner

YES! I want to know more ...

Get in touch with our friendly team of experts. Start your digital transformation journey today.

Call: +44 (0) 191 477 0365

  • This field is for validation purposes and should be left unchanged.