Growth Customer Experience Productivity Business IQ Trends Success Stories Tech Solutions Awards Business Tools Subscribe Tech Enquiry
Business IQ

3 Easy Steps To Protect Yourself From Heartbleed

Krishan Sharma
Technology Journalist

Krishan Sharma is a freelance journalist who writes for various consumer tech and business IT publications

Krishan Sharma
Technology Journalist

Krishan Sharma is a freelance journalist who writes for various consumer tech and business IT publications

How to protect yourself from Heartbleed - one of the biggest security threats in internet history.....

Computer with bleeding heart on screen

How to Know Whether You Have Been Affected

To determine whether the websites and applications you use have been affected by Heartbleed, use this free Heartbleed checker. Simply enter the URL of the site and it will tell you whether it was affected. The site checker will also determine whether the website in question has actually been updated to the fixed version of OpenSSL. If it has then you should immediately change your password.

You should also go to each of your websites and look for a notice that confirms the website has been patched. A password change on a site that has been patched is important as it will reduce your risk from anyone who has managed to sneak through and extract sensitive data in the past two years. If someone did extract your password in that time than changing your password will ensure the person can no longer access your information.

There is of course little point in changing your password before a site has actually been patched. The next thing to do is to review your important online accounts like banking, credit cards and email for any suspicious activity for at least the next few months. There is little you can do when a security breach of Heartbleed’s scale hits. But you can at least limit the damage by maintaining good password habits like having different passwords for every website or application you use and changing them every few months.

SAFETY FIRST

Take advantage of two-step authentication for sites that offer them. Two-step authentication requires you to enter a six-digit passcode that is delivered to your mobile phone via SMS on top of your regular login details. 

Woman stressed at desk
Tech Solutions
Tech Solutions
When your tech fails

Technology is so important to a modern small business that even the smallest IT glitch can have enormous consequences. But there are ways to minimise – and even avoid – the dam...

e-commerce_sales
Customer Experience
Customer Experience
Four ways to prepare your business for e-commerce sales

Customers love finding bargains online – no surprises there. But in recent years, digital sales events such as Click Frenzy, Black Friday and Cyber Monday have had a real impac...

Avoid phishing threats
Tech Solutions
Tech Solutions
How to identify, avoid and recover from a phishing attack

Getting snagged by a phishing scam is never pleasant. It usually involves a cybercriminal using emails, texts, social media or phone calls to lure someone into handing over sen...

Diagram of Virtual Private Network
Business IQ
Business IQ
What is a VPN and do you need one?

If regular news of high-profile cyber-attacks across the world teaches us anything, it’s that every business, regardless of size, needs to take its security more seriously. T...