On Monday, April 7th, a major security vulnerability was discovered in the OpenSSL software library. Dubbed “Heartbleed“, this bug affects roughly two thirds of the internet who use the OpenSSL software to send secure communications.
What have we done to secure Zopim?
Immediately after learning about the bug, our engineers took all necessary steps to patch Zopim’s systems and thereby removed the Heartbleed vulnerability from our servers. We have also replaced any security certificates that had the potential to be compromised.
At this time we have no evidence that any users’ data or customers’ accounts have been affected by Heartbleed.
We are continuing to monitor the situation and will issue updates as and when we receive them.
What should you do?
We have fully patched the vulnerability in our servers but to ensure that there is no risk to you or your data, we would strongly encourage you to do the following:
- Log out of Zopim
- Log back in to Zopim
- Change your password (click here)
On Zopim that’s all you need to do. But, we would recommend checking with other online services you might use to see if they have patched their systems.
It’s also good practice to frequently change your passwords on any online services you might be using and not use the same one on multiple websites. Here’s a good article by Lifehacker on what other steps you can take to protect yourself.
We’re committed to providing users with a safe environment to communicate with their customers and we take matters of security very seriously.
If you have any questions or concerns, please email firstname.lastname@example.org.
If you’d like to learn more about the Heartbleed Bug, read this: http://heartbleed.com/.
Latest posts by Abhiroop Basu (see all)
- Scheduled Maintenance — 15 November 2015, 4am to 6am (UTC) - October 16, 2015
- Mobile App Update – What We’re Working On - July 21, 2015
- Introducing the Zopim Chat SDK for Native Mobile Support - July 8, 2015