Subscribe
Certificate Management Best Practices Checklist
*Information collected on this page will be used to send your eBook, and for marketing purposes. Learn More…

Don’t make the same the mistakes Yahoo, Equifax, Home Depot, LinkedIn, and Ericsson did.
Yahoo, Equifax, Home Depot, LinkedIn, and Ericsson. Nearly every week, yet another well-known brand makes headlines for all the wrong reasons: hackers gain access to their customer data; a certificate error causes their website to go down; or investigators fine them for compliance violations. This checklist will help you implement certificate management best practices to avoid similar problems for your company.
Avoid the 4 Horsemen of the Certificate Apocalypse:
- Expensive Outages & Downtime
When certificates expire, websites break, applications go down, and business lurches to a halt. And not just your business — anyone relying on your organization will experience outages and downtime, too. For example, Ericsson had a certificate expiration in 2018 that cut cellular service for 32 million people for several hours. - Angry Customers & Partners
In business, both on- or offline, trust is currency. Your customers and partners trust you to be open, easily identifiable, and to have services available. When that doesn’t happen, your brand and reputation can suffer long-lasting damage. More than a year after the Ericsson incident, their customers are still angry. In fact, one of the company’s partners reportedly received up to £100 million from Ericsson as compensation for the downtime. - Regulatory Penalties & Non-Compliance Fines
Encryption and authentication are critical components of just about every compliance and regulatory framework. That means digital certificates are, too. A Ponemon Institute study found that certificate mismanagement costs the average enterprise just over $7.2 million per year due to failed audits and regulatory penalties. - Critical Data Breaches
Certificate expiration is far more treacherous than just an HTTP browser warning. It can open the doors for far greater attacks. An expired digital certificate shielded the Equifax data breach from detection for 76 days because it knocked out the company’s traffic inspection capabilities. Two years later, the credit bureau is still reeling, with costs at $1.4 billion and still rising!
5 Ways to Determine if a Website is Fake, Fraudulent, or a Scam – 2018
in Hashing Out Cyber SecurityRe-Hashed: How to Fix SSL Connection Errors on Android Phones
in Everything EncryptionHow to Fix ‘ERR_SSL_PROTOCOL_ERROR’ on Google Chrome
in Everything EncryptionRe-Hashed: Troubleshoot Firefox’s “Performing TLS Handshake” Message
in Hashing Out Cyber SecurityRe-Hashed: The Difference Between SHA-1, SHA-2 and SHA-256 Hash Algorithms
in Everything EncryptionRe-Hashed: How to clear HSTS settings in Chrome and Firefox
in Everything EncryptionReport it Right: AMCA got hacked – Not Quest and LabCorp
in Hashing Out Cyber SecurityThe Difference Between Root Certificates and Intermediate Certificates
in Everything EncryptionRe-Hashed: How To Disable Firefox Insecure Password Warnings
in Hashing Out Cyber SecurityThe difference between Encryption, Hashing and Salting
in Everything EncryptionCipher Suites: Ciphers, Algorithms and Negotiating Security Settings
in Everything EncryptionAnatomy of a Scam: Work from home for Amazon
in Hashing Out Cyber SecurityThis is what happens when your SSL certificate expires
in Everything EncryptionHow strong is 256-bit Encryption?
in Everything EncryptionCloud Security: 5 Serious Emerging Cloud Computing Threats to Avoid
in ssl certificatesPayPal Phishing Certificates Far More Prevalent Than Previously Thought
in Industry LowdownHow to View SSL Certificate Details in Chrome 56
in Industry LowdownA Call To Let’s Encrypt: Stop Issuing “PayPal” Certificates
in Industry LowdownWhat is the difference between DNS over TLS & DNS over HTTPS?
in Everything EncryptionRe-Hashed: How to Trust Manually Installed Root Certificates in iOS 10.3
in Everything Encryption