Starting two days ago, we went through every one of our clients’ servers and updated OpenSSL to the latest patched version. Unbeknownst to us, the updates did not actually stop and start Apache and/or Nginx, which is a must-do step (so the vulnerable OpenSSL libraries are fully unloaded). So another round of service restarts was planned out and executed shortly afterwards.
If you have a concern or question regarding this vulnerability or its impact on your services don’t hesitate to get in touch via email or the support system. We’re more than happy to answer questions, comments, or help in any way we can.