If your mailbox has received an email regarding PayPal service upgrade and you don’t know how to get out of such technical email, you don’t need to frighten. The email may be sounding scary, but it is not as scary as it sounds.

Last year, there was an update “HeartBleed Exploit” released on 7th of April 2014. That update was a serious threat to unpatched servers and emphasizing on updating the servers to SHA256 and G5 based encryption. Almost all major web servers have updated the SSL and encryption methods.

PayPal is now updating their IPN algorithm to connect only with SHA256 & G5 based encryption and this email is important for the websites accepting PayPal payments & incorporates the PayPal IPN (Instant Payment Notification). There is no need to go and logging into PayPal’s official website, it is just the things to do about server and ensure that your server is able to handle this update. The “PayPal” is just updating the encryption between your server & the PayPal server to SHA256.

Now, if you have a website accepting payment through PayPal, it will not be successful in completing the redirection process while customer paying online due to improper server connectivity if your server is not updated. This abortive redirection process further leads to annoying customers and ends with losing a lot of customers. The paypal wants you to be ready for this upgrade and that is what the email means.

What has to be done?

Since PayPal has sent the email, it wants to ensure that you don’t lose your customers and want to fix this issue as soon as possible. The best fix is to ask your server and hosting company to upgrade the server for SHA256 & G5 based encryption.

Note: This upgrade is scheduled for 9/30/2015. Therefore, it is essential for you to update your server before 30th September.

If you are still not able to understand these technical changes, you can consult with Envision Ecommerce. We understand the changes and have already suggested our customers on what has to be done. We can help you in understanding more about this email.