{"id":14945,"date":"2014-04-14T20:46:23","date_gmt":"2014-04-14T20:46:23","guid":{"rendered":"http:\/\/kasperskydaily.com\/b2b\/?p=1680"},"modified":"2020-02-26T18:41:08","modified_gmt":"2020-02-26T16:41:08","slug":"addressing-the-heartbleed-panic-advice-for-small-business-owners-2","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.za\/blog\/addressing-the-heartbleed-panic-advice-for-small-business-owners-2\/14945\/","title":{"rendered":"Addressing the #heartbleed panic: advice for small business owners"},"content":{"rendered":"<p>The Heartbleed bug was <a href=\"https:\/\/business.kaspersky.com\/the-heart-is-bleeding-out-a-new-critical-bug-found-in-openssl\/\" target=\"_blank\" rel=\"noopener nofollow\">huge news<\/a> last week and still is. As a hobbyist programmer, I am saddened that attention to the art of software-making was brought on as a result of this alarming situation rather than by something positive. In our previous <a href=\"https:\/\/business.kaspersky.com\/the-heartbleed-bug-averting-a-doomsday\/\" target=\"_blank\" rel=\"noopener nofollow\">blog posts<\/a> on the topic we received a number of questions and comments about how to reduce the risk of a possible attack using this vulnerability. Obviously we are not alone in sharing advice (almost everyone does nowadays), but I keep noticing that the majority of blog posts and articles are more or less devoted to an explanation of technical matters. Of course, this story is highly technical in nature, but when you run your own business you don\u2019t think about it like SSL, Heartbeat, memory dumps and the like. You think about lost profits, the compromise of customer data or the unavailability of your website. Is my company affected? Were my passwords compromised and where? What is the right thing to do right now? These are the topics that I will discuss today.<\/p>\n<p><b>Summary<\/b><\/p>\n<ol>\n<li>Make sure your website is unaffected. Or fix it.<\/li>\n<li>Change the password for your online bank account.<\/li>\n<li>Change all other passwords just to be sure. Make sure your employees do the same.<\/li>\n<\/ol>\n<p><b>Things to discuss with the IT guy<\/b><\/p>\n<p>There is always an IT guy: your full-time employee, a freelance specialist or just a support team from a company that provides you with a web service, virtual infrastructure, etc. This is a person who will eventually clean all the mess and make sure that your data stays safe. In most cases what you have to do is just to ask the right questions.<\/p>\n<p><i>Did they steal our passwords? <\/i><\/p>\n<p>This is not the right question. IT people don\u2019t know (no one does), due to the specifics of the bug. The vulnerability can be exploited without leaving any trace of an attack. This one is correct:<\/p>\n<p><i>Is our infrastructure vulnerable? <\/i><\/p>\n<p>By \u2018infrastructure\u2019 I mean almost anything with an internet connection, apart from your laptops and desktops (I will talk about them later). Website? Yes, certainly. File server? Office Internet router? In some cases, they might not be vulnerable, or, even if they are, the vulnerable protocol might not be utilized. But it is a good idea to double-check anyway: the IT Pros will then narrow the list down to services and hardware running Linux or Unix-based systems with OpenSSL installed. We won\u2019t talk too technically here, but it is useful to know the exact vulnerable versions of the OpenSSL library. Everything from 1.0.1 to 1.0.1f is prone to this bug. All versions below or above these are okay.<\/p>\n<p><b>So my website was (is) vulnerable. What should I do?<\/b><\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/103\/2017\/05\/06020341\/wide1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-1682\" alt=\"wide1\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/103\/2017\/05\/06020341\/wide1.png\" width=\"640\" height=\"320\"><\/a><\/p>\n<p>Let the IT guys do their work. Or insist on a solution from a company that handles your website. Sometimes upgrading software on a production server is a tricky process, but hey, if major internet giants like Google managed to solve the problem in a few hours after the vulnerability disclosure, on a much more complicated infrastructure, everything else should not be a big problem.<\/p>\n<p>So, closing the vulnerability on the services or infrastructure you are <b>directly responsible<\/b> for (like your company website), is the <b>first priority<\/b>. For example, if your website is hosted by GoDaddy, you might start by reading <a href=\"http:\/\/support.godaddy.com\/godaddy\/openssl-and-heartbleed-vulnerabilities\/\" target=\"_blank\" rel=\"noopener nofollow\">this<\/a> statement from their website. Next you might want to contact their support and clarify, if your website was affected. The following procedure may require additional steps from your side as well.<\/p>\n<p><b>The passwords problem<\/b><\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/103\/2014\/04\/06015937\/wide36401.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-1683\" alt=\"wide3640\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/103\/2014\/04\/06015937\/wide36401.png\" width=\"640\" height=\"427\"><\/a><\/p>\n<p>Now we can proceed with the \u201cdid they steal our passwords\u201d question. Once again, it is impossible to tell. Is it possible to steal a password from a vulnerable website? Yes. What other passwords could be stolen? Do you have to change passwords at the cloud service of your choice? Was Dropbox vulnerable? GMail? Yahoo? Your bank?<\/p>\n<div class=\"pullquote\">Closing the vulnerability on the services or infrastructure you are directly responsible for (like your company website), is the first priority.<\/div>\n<p>There are two ways to evaluate the risk. First is to conduct the research: lots of companies disclosed a lot of information on the potential vulnerability of their services. Let\u2019s name a few:<\/p>\n<ul>\n<li>Cloud services Google, Amazon Web Service and Rackspace: <a href=\"http:\/\/www.zdnet.com\/google-aws-rackspace-affected-by-heartbleed-openssl-flaw-but-azure-escapes-7000028281\/\" target=\"_blank\" rel=\"noopener nofollow\">affected<\/a> (via ZDNet)<\/li>\n<li>Social networks: LinkedIn and Twitter unaffected, Instagram and Tumblr <a href=\"http:\/\/mashable.com\/2014\/04\/09\/heartbleed-bug-websites-affected\/\" target=\"_blank\" rel=\"noopener nofollow\">affected<\/a> (via Mashable)<\/li>\n<li>E-Mail: GMail and Yahoo affected, Outlook \u2013 unaffected.<\/li>\n<li>Zoho \u2013 <a href=\"https:\/\/www.zoho.com\/general\/blog\/heartbleed.html\" target=\"_blank\" rel=\"noopener nofollow\">affected<\/a>. Basecamp \u2013 <a href=\"https:\/\/twitter.com\/37signals\/status\/453939896152231936\" target=\"_blank\" rel=\"noopener nofollow\">no<\/a>. Prezi \u2013 <a href=\"http:\/\/engineering.prezi.com\/blog\/2014\/04\/12\/heartbleet\/\" target=\"_blank\" rel=\"noopener nofollow\">yes<\/a>.<\/li>\n<\/ul>\n<p>So, if a certain web service was vulnerable and you used it after the vulnerability disclosure and before they fixed everything, you should change your password. Sounds really complicated. Why spend hours on such research, when you can just go in and<b> change the passwords to all services you use<\/b>, for work or personal matters. The Heartbleed is the perfect occasion to do just that! It is really worth the time spent. Some say that changing the password is useless if a service is still vulnerable, or its certificates were stolen by the attackers. This is true, but, once again, if you are a small company with limited resources, you don\u2019t have time to investigate and sort out the resources you use by their current and future state of security. Just change the password. To be sure, change it once again a month or two later when even the slowest service providers will, hopefully, apply a fix.<\/p>\n<p><b>The passwords solution<\/b><\/p>\n<p>Here are the top five tips on securing your passwords. Keep in mind that we as a security company, stick to these rules regardless of vulnerability disclosures, cyber attacks or other events.<\/p>\n<ol>\n<li>Use complex passwords. 123456 is not an option.<\/li>\n<li>Change passwords regularly<\/li>\n<li>Do not use the same password for different services<\/li>\n<li>Do not store passwords on insecure medium (text file or piece of paper)<\/li>\n<li>If available, always use 2-Step verification \u2013 when a one-time password is sent to your mobile or generated via a separate app or device. Service like GMail, Zoho and Facebook as well as many banks provide it.<\/li>\n<\/ol>\n<p><b>Will Kaspersky protect my laptop? <\/b><\/p>\n<p>Finally, let\u2019s talk about your office desktop and your home laptop. If you use Kaspersky Lab\u2019s software on your PC, will the Heartbleed bug affect you? To start with, <b>Windows machines (like your laptop or maybe your Windows-based file server at the office) are not affected by OpenSSL bug<\/b>. They just don\u2019t use OpenSSL, which is essentially a product of the open-source community. If you happen to run Ubuntu or other Linux flavor, then you should perform an upgrade of course, but now let\u2019s concentrate on the Windows machines.<\/p>\n<p>If they are not affected, does it mean that everything is safe? No, unfortunately. You open your web browser on a Windows machine which is totally secure, navigate to a web service of your choice, enter your password and it gets stolen on the server\u2019s side.<\/p>\n<p>What our products can help you with, apart from protecting you from millions of other cyber threats, is, in fact, managing your passwords. This feature is available as a standalone product named<a href=\"https:\/\/www.kaspersky.com\/password-manager\" target=\"_blank\" rel=\"noopener nofollow\"> Kaspersky Password Manager<\/a>, but also as part of <a href=\"https:\/\/www.kaspersky.com\/small-office-security\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Small Office Security<\/a> (try it <a href=\"https:\/\/www.kaspersky.com\/small-office-trial?redef=1&amp;reseller=blog_b2b_en-global\" target=\"_blank\" rel=\"noopener nofollow\">here<\/a>) suite designed for small businesses and <a href=\"https:\/\/www.kaspersky.com\/pure\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky PURE<\/a> for your private PC. These solutions allow you to <a href=\"https:\/\/business.kaspersky.com\/password-management-in-kaspersky-small-office-security\/\" target=\"_blank\" rel=\"noopener nofollow\">store your passwords<\/a> in an encrypted form and easily transfer them from one machine to another, helping to generate secure passwords. It is also the right tool to store and use unique passwords for each web service, which is always the right thing to do.<\/p>\n<p>Have any questions? Want to share a #heartbleed experience? Feel free to leave a comment. Our team is always ready to help.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Heartbleed bug was huge news last week and still is. As a hobbyist programmer, I am saddened that attention to the art of software-making was brought on as a<\/p>\n","protected":false},"author":53,"featured_media":16218,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3021],"tags":[491,588,590],"class_list":{"0":"post-14945","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-cyberthreats","10":"tag-heartbleed","11":"tag-openssl"},"hreflang":[{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/addressing-the-heartbleed-panic-advice-for-small-business-owners-2\/14945\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/addressing-the-heartbleed-panic-advice-for-small-business-owners-2\/14945\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/addressing-the-heartbleed-panic-advice-for-small-business-owners-2\/14945\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.za\/blog\/tag\/cyberthreats\/","name":"cyberthreats"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts\/14945","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/users\/53"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/comments?post=14945"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts\/14945\/revisions"}],"predecessor-version":[{"id":26119,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts\/14945\/revisions\/26119"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/media\/16218"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/media?parent=14945"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/categories?post=14945"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/tags?post=14945"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}