Log4J: How it works and how to remediate the vulnerability in your environment