Contact us today!
(518) 203-2110

Evolve IT

Evolve IT has been serving the Saratoga Springs area since 1995, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

1 Million Websites Soon to Be at Risk Due to Change in Encryption Protocol

b2ap3_thumbnail_SHA1_encryption_400.jpgEventually, one technology gets replaced by another and users of the older technology must upgrade, or else risk running an inefficient operation. This upgrade-or-be-obsolete scenario plays out most often with software, like with SHA1, the Internet’s most popular encryption protocol, slated to have its SSL certificates expire on January 1, 2017.

Essentially, any website using SHA1 certificates after this date will have problems loading, and may even be vulnerable to hacks. Websites that utilize SHA1 protocol are signified by HTTPS, which include many of the most popular websites on the Internet. In fact, ZDNet goes so far as to describe SHA1 protocol as “the cryptographic hashing algorithm that’s been at the heart of the web’s security for a decade.”

For a decade, SHA1 security has provided users with the peace of mind that their sensitive content is encrypted and can’t be skimmed by hackers, but all of this is about to change. Soon, a significant number of older devices won’t be capable of processing the new SHA2 security protocol certificates, which will put their sensitive data at risk. ZDNet puts a number to these at-risk websites; “About 24 percent of SSL-encrypted websites still use SHA1 -- or, about 1 million websites.”

Thankfully, the situation is improving every day as more websites update their protocol. In fact, it’s estimated that by the end of this year, the number of websites utilizing SHA1 technology will decrease by 90%. So no need to hit the panic button quite yet. Although, the expiration of SHA1 is still expected to leave enough websites vulnerable to cause concern and warrant caution when browsing the Internet. ZDNet puts this threat into perspective:

For most people, there's nothing to worry about. The majority are already using the latest Chrome or Firefox browser, the latest operating system, or the newest smartphone with the latest software, which are compatible with the old SHA1-hashed websites and the newer SHA2-hashed websites. But many, particularly those in developing nations, who are running older software, devices, and even "dumb phones," the candy bar cell phones that have basic mobile internet, will face a brick wall, because their devices aren't up-to-date enough to even know what SHA2 is.

The expiration of SHA1 security protocol is just one example of why it’s vital to stay on top of upgrading all of your company’s mission-critical software. A more common upgrading situation that companies run into is when their operating system expires and is no longer supported with security patches provided by the software developer, like with the recent examples of Windows XP and Windows Server 2003.

It can be a chore to stay on top of upgrading every piece of technology in your office, let alone stay current with software licenses so that you don’t get fined. This is why Evolve IT does this for you as part of our managed IT service. We are able to remotely monitor the software situation of your entire IT infrastructure and take care of any needed upgrades, security patches, and software licenses. Call us today at (518) 203-2110 and never get caught using outdated technology again.

Comments

 
No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 04 May 2024
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up!

Free Consultation
 

Tag Cloud

Tip of the Week Security Technology Internet Best Practices Cloud Hackers Privacy Email Productivity Business Malware Software Business Computing User Tips Efficiency Workplace Tips Google Computer Hosted Solutions Microsoft Upgrade Windows 10 IT Support Mobile Devices Innovation Smartphone Hardware Gmail Network Security Ransomware Microsoft Office Office Backup Apps Business Continuity Operating System Disaster Recovery Communication Hacking The Internet of Things WiFi Social Media Facebook Bandwidth Quick Tips Money Mobile Device Management Network Smartphones Managed Service Provider Firewall Outlook Content Filtering Cybercrime Website Wireless Technology Android Apple Employer-Employee Relationship Best Practice History Two-factor Authentication Alert Small Business Networking Phishing App Data storage Data Windows Mobile Computing Experience Big Data communications Safety Unified Threat Management Downtime IP Address Virtualization BYOD Passwords Streaming Media Help Desk Writing Micrsooft Government Visible Light Communication Disaster Augmented Reality Keyboard Business Growth Data Management Search User Hard Drives Robot Advertising Recovery Sports Remote Computing Shortcut Society Google Wallet Spam Retail DDoS Heating/Cooling Word Information Technology Running Cable Internet of Things Windows 8 Hosted Solution Windows XP IT Services Managed IT services Business Management Artificial Intelligence Documents Compliance Tech Support Drones Bluetooth Competition Presentation Entrepreneur Social Browser Automation Domains Printer Virtual Desktop Wireless Memory Hacker Unified Communications Securty Document Management Encryption Deep Learning Application Law Enforcement SaaS VoIP BDR Customer Service Proactive IT Cortana Vendor Management Network Congestion Router Save Money Music Monitors Office 365 Laptop Analytics Cryptocurrency Saving Money intranet IBM Displays Lithium-ion battery Google Docs Education Holiday Cleaning Black Market Social Networking YouTube Processors End of Support Public Speaking Office Tips LiFi Staffing
QR-Code