Post Heartbleed, now what?

It’s been over two weeks since the world got to know that websites online were vulnerable due to the OpenSSL Heartbleed vulnerability. By now, most website owners would have mitigated this risk by implementing the right security fixes in place and users would have updated their passwords across these websites. So, can we say all is well? No. Not so soon.

Firstly, it is still too early to say how much of a negative impact the Heartbleed vulnerability has caused to organizations. The first confirmed victims are reportedly Canada’s tax agency and a UK parenting site.

Secondly, our analysis has proved that some websites have been slower to implement the latest internet technologies, hence as a result was saved from this exposure. However, organizations cannot stay backward in technology for too long, else the vulnerabilities will catch up to them and they will get exploited, if not today, then sometime in the future.

Organizations will need to take stock of the versions of internet technologies in use. If they do not have the latest versions in place, then check which of the latest versions are the most stable and work with their IT departments/partners to implement them over the next few months. While this is happening, it will be good to have the right security tools in place and perform continuous website security checks that will share regular security updates to the business owners. Here are some recommendations which will help in achieving this:

      • Place a Web Application Firewall to block vulnerabilities, thus instantly protecting websites from attacks
      • Perform application security tests for web and mobile applications which will check for vulnerabilities and malware on a continuous basis
      • Have a strong encryption program using SSL
      • Conduct Vulnerability Assessments at least every quarter to understand the strength of your network to withstand attacks
      • Get regular application security and compliance audits done to check the overall security posture of the organization‘s internet-facing assets

Stay tuned for more relevant and interesting security articles. Follow Indusface on FacebookTwitter, and LinkedIn.

Venkatesh Sundar

Venky is an Application Security technologist who built the new age Web application Scanner and Cloud WAF - AppTrana at Indusface as a Founding CTO. Currently, he spends his time on driving Product Roadmap, Customer Success, Growth, and technology adoption for US businesses.

This post was last modified on January 11, 2024 13:30

Share
Venkatesh Sundar
Published by
Venkatesh Sundar

Recent Posts

Top 10 Best Practices for Attack Surface Reduction

Explore crucial tactics like Asset Inventory, Patch Management, Access Control & Authentication, and additional best… Read More

5 days ago

10 Important Data Privacy Questions You Should be Asking Now

Delve into the data privacy questions including consent protocols, data minimization strategies, user rights management,… Read More

1 week ago

11 Best Practices to Secure your Nodejs API

Secure Node.js APIs using best practices: Employ proper HTTP methods, robust authentication, and API-specific security… Read More

1 week ago