The bug itself isn't the result of a design flaw in the SSL/TLS specification, but is more of an implementation problem. It is a programming mistake that allows for leaks in sensitive information from any applications and services using OpenSSL. Normally, bugs like this are detected and fixed before they get too out of hand. However, this one has left particularly large amounts of data exposed since as early as December 2012. Furthermore, this bug leaves no traces and you probably won't know if you've been exploited until it's already too late.
Here is a list of affected websites. If you have accessed any of these sites over the past two years, you should change your passwords immediately.
If you aren't sure if a site has been affected by heartbleed, or if the website has applied a patch that fixes the problem, type the website URL into this checker and it will tell you if the website was affected.
If your company has been the target of an attack, contact COMPANYNAME. We'll use our remote managed IT services to keep your personal information safe. Call PHONENUMBER today before your heart gets broken!