5 Steps to Help Avoid the Log4j 2 Vulnerability