ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

1 Million Websites Soon to Be at Risk Due to Change in Encryption Protocol

b2ap3_thumbnail_SHA1_encryption_400.jpgEventually, one technology gets replaced by another and users of the older technology must upgrade, or else risk running an inefficient operation. This upgrade-or-be-obsolete scenario plays out most often with software, like with SHA1, the Internet’s most popular encryption protocol, slated to have its SSL certificates expire on January 1, 2017.

Essentially, any website using SHA1 certificates after this date will have problems loading, and may even be vulnerable to hacks. Websites that utilize SHA1 protocol are signified by HTTPS, which include many of the most popular websites on the Internet. In fact, ZDNet goes so far as to describe SHA1 protocol as “the cryptographic hashing algorithm that’s been at the heart of the web’s security for a decade.”

For a decade, SHA1 security has provided users with the peace of mind that their sensitive content is encrypted and can’t be skimmed by hackers, but all of this is about to change. Soon, a significant number of older devices won’t be capable of processing the new SHA2 security protocol certificates, which will put their sensitive data at risk. ZDNet puts a number to these at-risk websites; “About 24 percent of SSL-encrypted websites still use SHA1 -- or, about 1 million websites.”

Thankfully, the situation is improving every day as more websites update their protocol. In fact, it’s estimated that by the end of this year, the number of websites utilizing SHA1 technology will decrease by 90%. So no need to hit the panic button quite yet. Although, the expiration of SHA1 is still expected to leave enough websites vulnerable to cause concern and warrant caution when browsing the Internet. ZDNet puts this threat into perspective:

For most people, there's nothing to worry about. The majority are already using the latest Chrome or Firefox browser, the latest operating system, or the newest smartphone with the latest software, which are compatible with the old SHA1-hashed websites and the newer SHA2-hashed websites. But many, particularly those in developing nations, who are running older software, devices, and even "dumb phones," the candy bar cell phones that have basic mobile internet, will face a brick wall, because their devices aren't up-to-date enough to even know what SHA2 is.

The expiration of SHA1 security protocol is just one example of why it’s vital to stay on top of upgrading all of your company’s mission-critical software. A more common upgrading situation that companies run into is when their operating system expires and is no longer supported with security patches provided by the software developer, like with the recent examples of Windows XP and Windows Server 2003.

It can be a chore to stay on top of upgrading every piece of technology in your office, let alone stay current with software licenses so that you don’t get fined. This is why ClearView IT does this for you as part of our managed IT service. We are able to remotely monitor the software situation of your entire IT infrastructure and take care of any needed upgrades, security patches, and software licenses. Call us today at 866-326-7214 and never get caught using outdated technology again.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 05 May 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Privacy Network Security Data Cloud Business User Tips IT Support Internet Hardware Innovation Malware Email Hosted Solutions Efficiency Workplace Tips Computer Microsoft Google Collaboration Android Cybersecurity Phishing Business Management IT Services Backup Ransomware Data Backup Smartphone communications Upgrade Small Business Smartphones Microsoft Office Mobile Devices Network Data Recovery Communication Managed IT Services Quick Tips Productivity Social Media VoIP Users Mobile Device Automation Tech Term Windows 10 Business Continuity Facebook Passwords Holiday Disaster Recovery Covid-19 IT Support Browser Apps Managed Service Windows 10 Cloud Computing Outsourced IT Miscellaneous Managed Service Provider Internet of Things Data Management Remote Work Saving Money Operating System Government Artificial Intelligence Managed IT services Gadgets Workplace Strategy Networking Windows Blockchain Spam WiFi Server Information Bandwidth Encryption Remote Mobile Device Management App Business Technology Virtualization Office 365 Information Technology Budget History Employee/Employer Relationship Gmail Office Two-factor Authentication Apple Conferencing Access Control Data Security Cybercrime Wi-Fi BDR Health Big Data Analytics Training Remote Computing Voice over Internet Protocol Hacker Document Management Save Money Patch Management Compliance Vendor Remote Monitoring Employer-Employee Relationship Help Desk Hacking Cost Management IT Management Outlook Password Data loss Mobile Office Legal Money Managed Services Data storage Customer Service Unified Threat Management Firewall Augmented Reality Applications Word Search... Best Practice IBM Project Management BYOD Vulnerabilities Website Computing Retail Alert Vendor Management Hard Drive Hiring/Firing Scam Laptop Law Enforcement Remote Workers End of Support Printer Chrome Windows 7 VPN Free Resource Update Social Sports How To SaaS DDoS Travel Mobile Computing Virtual Reality Data Breach Social Engineering Cryptocurrency Paperless Office Marketing Antivirus iPhone Black Market Running Cable Education Cortana Cleaning Maintenance Content Filtering Robot Storage Monitoring Router Healthcare Websites Meetings The Internet of Things Mobility Windows 11 YouTube User Twitter Google Maps Wireless Technology eWaste How To Microchip Excel Flexibility Downtime Managed Services Provider Safety Virtual Private Network Tech Terms Identity Theft Hack Virtual Desktop Notifications Managed IT Unified Communications Virtual Assistant PowerPoint Experience Current Events Digital Administration Solutions Google Docs Taxes Presentation Bluetooth Specifications Distributed Denial of Service IT Consultant Integration Office Tips Images 101 Disaster Display Private Cloud Processor Memory Customer Relationship Management Physical Security Co-Managed IT Lithium-ion battery Employees Entertainment Avoiding Downtime Politics Machine Learning Settings Multi-factor Authentication Holidays Processors Start Menu Computer Care Solid State Drive Downloads Cooperation Video Conferencing Vulnerability Saving Time Virtual Machines Chromebook Software as a Service Drones Bitcoin Computer Repair HIPAA Data Protection Computers Automobile Professional Services Telephone Advertising Motion Sickness Business Communications Internet Service Provider Azure Relocation Browsers Keyboard Displays Nanotechnology Work/Life Balance Google Drive Upload Tech Support Software License Regulations Compliance Business Owner Managed IT Service Comparison Google Play Hard Drives Memes Workplace Social Network intranet Human Resources Net Neutrality Wireless Knowledge Data Analysis Shortcut Corporate Profile Screen Reader Heating/Cooling Telephony Trends Environment Employer Employee Relationship Mobile Technology Financial Data In Internet of Things Television Security Cameras Windows XP IT Scams Hacks Customer Resource management Social Networking Network Congestion Cabling Devices Risk Management G Suite Tip of the week Google Apps Reliable Computing Fileless Malware Writing Tablet VoIP Gamification Tracking Company Culture Telework Inbound Marketing Mouse Communitications Microsoft 365 Cables Telephone System Regulations Smartwatch Web Server Procurement Scalability Directions Backup and Disaster Recovery Text Messaging Content Proactive IT Digital Payment Desktop FinTech Administrator SharePoint Electronic Payment IT Assessment Point of Sale Bring Your Own Device Electronic Medical Records Worker Accountants CES Supply Chain Management Staffing Value Access Database IP Address Shortcuts Time Management Music Public Cloud Organization Cyber security Smart Devices Phone System Health IT Equifax Hard Drive Disposal Remote Working Audit Spyware Tactics Be Proactive Username File Sharing AI Trend Micro Botnet Electronic Health Records Transportation Rental Service Redundancy Micrsooft Startup Freedom of Information Digital Security Cameras email scam Recovery Wasting Time Navigation Competition Flash Cache Addiction Computer Accessories Modem Workplace Strategies Telephone Systems Unified Threat Management Business Growth Workers Mobile Security eCommerce LiFi Surveillance User Tip Entrepreneur Legislation News Videos CCTV Documents Managing Costs Printing Evernote Application Network Management SSID Banking Touchscreen Business Intelligence Google Wallet Development Employer/Employee Relationships Messenger Emergency Proxy Server Deep Learning Emails Computer Malfunction Fake News Media Vendor Mangement Service Level Agreement Computing Infrastructure Securty Virtual Machine Domains Smart Technology Business Metrics Management Hosted Solution Samsung Device security Reviews Optimization Webcam Microsoft Excel 2FA Teamwork Books Uninterrupted Power Supply Wireless Headphones Language Business Mangement Going Green Society Business Cards Data Storage Troubleshooting Hypervisor Tech Medical IT Error Tablets Shopping Visible Light Communication Paperless SQL Server Reading Bookmark Monitors Download Windows 8 Supercomputer Piracy PCI DSS Licensing Google Calendar Term Public Speaking Humor Supply Chain Virus HTML Gig Economy Streaming Media

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?