Growth Customer Experience Productivity Business IQ Trends Success Stories Tech Solutions Subscribe Tech Enquiry
Business IQ

3 Easy Steps To Protect Yourself From Heartbleed

Krishan Sharma
Technology Journalist

Krishan Sharma is a freelance journalist who writes for various consumer tech and business IT publications

Krishan Sharma
Technology Journalist

Krishan Sharma is a freelance journalist who writes for various consumer tech and business IT publications

How to protect yourself from Heartbleed - one of the biggest security threats in internet history.....

Computer with bleeding heart on screen

How to Know Whether You Have Been Affected

To determine whether the websites and applications you use have been affected by Heartbleed, use this free Heartbleed checker. Simply enter the URL of the site and it will tell you whether it was affected. The site checker will also determine whether the website in question has actually been updated to the fixed version of OpenSSL. If it has then you should immediately change your password.

You should also go to each of your websites and look for a notice that confirms the website has been patched. A password change on a site that has been patched is important as it will reduce your risk from anyone who has managed to sneak through and extract sensitive data in the past two years. If someone did extract your password in that time than changing your password will ensure the person can no longer access your information.

There is of course little point in changing your password before a site has actually been patched. The next thing to do is to review your important online accounts like banking, credit cards and email for any suspicious activity for at least the next few months. There is little you can do when a security breach of Heartbleed’s scale hits. But you can at least limit the damage by maintaining good password habits like having different passwords for every website or application you use and changing them every few months.

SAFETY FIRST

Take advantage of two-step authentication for sites that offer them. Two-step authentication requires you to enter a six-digit passcode that is delivered to your mobile phone via SMS on top of your regular login details. 

5-minute fixes for your cyber security
Business IQ
Business IQ
5-minute fixes for your cyber security

Safeguarding your business requires an approach that is tailored to your needs. This takes an investment of time and money, and assistance from people with the right knowledge ...

A man typing a credit card number into a laptop.
Business IQ
Business IQ
Cyber security: A failure to plan is a plan to fail

How prepared are you when it comes to your businesses’ cyber security? These days we aren’t just protecting against viruses, but against hackers, identity fraud, data theft and...

Two workers in a security call centre looking at a series of computers.
Tech Solutions
Tech Solutions
Protecting your business with tech

Running a business now means protecting yourself, your assets and your store. Telstra’s business grade solution is Business Protect, to help keep your business safe. More than ...

Cyber security firm, Penten, celebrates winning the 2018 Telstra Business of the Year Award.
Success Stories
Success Stories
Prevention through deception Penten’s recipe for success

Canberra-based cyber security company, Penten, is the 2018 Telstra Australian Business of the Year. The business uses cyber deception strategies to protect Australian governmen...