On April 7th, 2014, a serious security vulnerability was publicly announced in the popular OpenSSL software library, which is used by many web systems for encrypting and decrypting data. The bug opens up the secret keys used to identify the service providers and to encrypt the traffic, the names and passwords of the users and the actual content. If exploited, attackers could eavesdrop on communications, steal data directly from the services and users and to impersonate services and users.
PCRecruiter software runs on web servers which do not use the OpenSSL library by default and therefore are not vulnerable to the exploit.
If you are a PCRecruiter user concerened that your password may have been compromised by use with another website, you may wish to use the 'Change My Password' option on the MyPCR screen to update your password. It's a 'best practice' to change passwords regularly.
Your PCRecruiter system administrator may also select a strong password mode. In this mode:
For more information on security practices in PCRecruiter, contact your representative.
For more information on the Heartbleed bug, see http://www.heartbleed.com/
Join Gabe Mendelsohn, Partnerships Manager at Woo.io, alongside PCR’s James Blair and Drew Rothman in a webinar about uncovering the hidden potential in your database.
Read morePCR 9 is getting a few end-of-year enhancements in this week’s release, including some stylistic updates as well as updates and improvements to our integration with SEEK.
Read moreAs mail service providers use increasingly sophisticated tools, including AI, to detect suspicious activity, and Microsoft begins placing tighter restrictions on Exchange and 365 accounts, recruiters need to be well-informed on how to reach their intended recipients without breaking the rules.
Read moreFind out more about who we and what we do.