Heartbleed – DWM servers secured

11 Apr Heartbleed – DWM servers secured

Heartbleed Bug

Heartbleed – DWM servers secured

Unless you have been shut in a dark room for the past week, you have probably heard about the recent security vulnerability in OpenSSL. Here at DWM we can confirm that our servers were either not running the vulnerable version of OpenSSL or have now been patched. 

[Tweet “now is probably a good time to go through all and any online accounts and change your passwords”]

Reports and advice vary wildly across the Internet as which sites may or may not have been compromised. A list of sites and services that were running the problem version of OpenSSL is easy to find but here at DWM we would advise that now is probably a good time to go through all and any online accounts and change your passwords. This is especially true if you tend to use the same or similar passwords across multiple sites.

While you’re going to the trouble of changing all these passwords, why not make sure your new ones are a strong as possible?

Your new strong password

At a minimum, use at least 8 characters and do not use a word that would appear in a dictionary. One way of making an easy to remember password is to create a nonsense word you can pronounce. For example: phiptric.

Making it stronger

You can make this password even stronger by doing a few things. First lets change the letter I to digits: ph1ptr1c. Great, but we can do better than that. Lets add some special characters: @ph1ptr1c!.

How about mixing upper and lowercase a bit: @Ph1pTr1c!. Now we have a reasonably strong password that shouldn’t be too hard to remember.

A super strong password

Here is a very strong password: c.rb/Dhp4A~_?/L. This 15 character password avoids similar characters and phonetics. It uses a range of upper and lower case letters, numbers and special characters. Not the easiest type of password to remember but definitely worth using for your sensitive accounts.

If you have any concerns or questions about your site do feel free to contact us.



//