Using passive and active approaches to manage the Heartbleed issue/tragedy!
Have you changed your passwords?
We are now into week two/three of the Heartbleed issue and while many high profile sites were patched initially, a lot of servers still remain vulnerable. Some people have adopted a head in the sand type approach and that they think that only high profile servers will be targeted. My own research shows that SSL servers on networks of all sizes are being targeted.
If you have not done so already you need to get an inventory of systems together so that you know what to monitor and patch. This is easier said than done. Many devices which have a web based management console will be running OpenSSL. Windows server running 3rd party applications may also be vulnerable as these applications may use OpenSSL for web services.