Login to your account

Username *
Password *
Remember Me

Create an account

Fields marked with an asterisk (*) are required.
Name *
Username *
Password *
Verify password *
Email *
Verify email *
Captcha *
Reload Captcha

Don't Let Your Digital Certificates Expire

Written by  Sep 15, 2019

X.509 certificates help secure the identity, privacy, and communication between two endpoints, but remember that these digital certificates have built-in expiration.

Trusted relationships of any nature must be monitored. Digital certificates – a standardised, encrypted exchange of credentials between two endpoints – are the medium for managing trust online for the last 20+ years.

Digital certificates aren't technically complex, but they do have a built-in expiration date that if ignored can bring operations to a grinding halt. While most users manage their certificates manually, there are a range of products and services available today that can do this for you.

Certificates have evolved in the past few years as essential for all websites, thanks to a change in Google's search algorithms that give greater preference to URLs using digital certificates (the green padlock on websites).

5g and iotAlso see: Securing Your 5G and IoT Security Connections

In addition to Google search changes, the Internet of Things (IoT) is also making the market more active. Digital certificates are increasingly being used by organisations to better secure a huge range of IoT's devices, experts say.

"Every IoT device needs a certificate to pair up with the mothership that [shows] all the rights and protections are there," says Andrew Webber, senior analyst at Copes.

According to recent statistics the 2018 global market value of digital certificates are worth around £62 million, forecasted to grow about 10% annually to £101 million in 2023, according to Research and Markets.

Their purpose

Basically, digital certificates help organisations ensure identity, privacy, or both. They establish "mutual nonrepudiation"; a sender can't deny sending a message or transaction, and a receiver can't deny receiving it. While a would-be user can create his own digital certificate, an individual or an organisation more typically applies to a trusted third-party called a certificate authority.

Using the X.509 standard, which is essentially an encryption standard for how Public Key Infrastructure (PKI) information gets formatted and exchanged, the certificate gets issued for a fee with a number of unique criteria, including a serial number, subject (applicant's name), usage information, as well as public key, associated signature algorithm, and the signature of the issuer.

The certificate also contains "not before" and "not after" fields, which specify how long it's valid. The maximum term of a digital certificate is 825 days, though most CAs will limit the term to 2 years to allow for inadvertent expiration.

Modern digital certificates use the Transport Layer Security (TLS) as the means for two entities to exchange PKI information and verify the integrity of their connection. Secure socket layer (SSL) is still used in some cases but really shouldn't be as it does not offer the same level of security.

risksAlso see: How to prepare your security strategy for today’s cyber risks

Managing Your Certificates

Certificates are often managed by simply using a spreadsheet.

If your workload is vast, a variety of digital certificate management products are available from vendors including Webroot and CyberReason. They ensure certificates are renewed before their expiration dates and promise seamless security and connectivity.

Leave a comment

Make sure you enter all the required information, indicated by an asterisk (*). HTML code is not allowed.


Popular News

May 06, 2020 IT Security News

Popular VPNs Exposed Users to Attacks

Researchers analysed some of the most popular VPNs and discovered that two of them were affected by vulnerabilities that...

May 22, 2020 Cyber Security

EasyJet will be sued over customer data breach

Legal firm PGMBM, a specialist in group legal action, has issued a class action claim under Article 82 of the General Da...

May 19, 2020 IT Security News

EasyJet data breach: Over 9 million customers affected

The personal data of over 9 million EasyJet customers has been infiltrated by hackers, including over 2,000 users' credi...

May 18, 2020 Cyber Security

UK power grid operator Elexon hit by cyberattack

The UK’s power grid middleman Elexon has announced it has fallen victim to a cyberattack, which did not compromise pow...

May 05, 2020 Cyber Security

The importance of cybersecurity for UK businesses

Technology is constantly changing and at a pace which is hard to keep up with, but 'safety first' always applies. ...

May 11, 2020 Cloud Security News

Tips to help secure your cloud data in the UK

In this digital age, it’s not a great idea to trust someone with your sensitive data. ...

Apr 01, 2020 IT Security News

Online privacy is all but gone, say Brits

Nearly 80% of UK consumers believe they have lost any real control over how their personal data is collected and used by...

May 27, 2020 Cyber Security

UK scared cybercriminals will use NHSX Covid-19 Tracing App to launch attacks

Nearly half (48%) of the UK public surveyed about the NHSX COVID-19 tracing app do not trust the UK government to keep t...

Apr 10, 2020 IT Security News

The importance of security for UK office printers

When it comes to digital security, we tend not to think about printers as they are often seen as dumb devices with a few...

May 07, 2020 Cyber Security

Three quarters of UK homeworkers haven't received cybersecurity training

As Covid-19-related cybersecurity threats continue to multiply, three in four of home workers are yet to receive any cyb...

May 20, 2020 IT Security News

To VPN or not to VPN for business users

It’s a question many organisations are asking as they work to provide secure and reliable remote access at scale. ...

May 14, 2020 IT Security News

Windows 10 is getting DNS over HTTPS (DoH) support

DNS is one of the last protocols that still runs unencrypted on the Internet. ...

May 25, 2020 Cyber Security

Beware of security threats before deploying remote working

Remote working is receiving a great deal of attention recently for obvious reasons. The world has changed and remote wor...

Apr 11, 2020 IT Security News

Tips for testing an IT security experts worth in the UK

There is no shortage of people presenting themselves as security experts. Some of them truly are, the others may or may ...

May 28, 2020 IT Security News

UK virus apps highlights tension between privacy and need for data

As more UK and European governments turn to tracing apps in the fight against the coronavirus, a deep-rooted tension bet...

Apr 22, 2020 IT Security News

Kaspersky shares 10 security and privacy tips when using Zoom

The recommendations from Kaspersky come following recent concerns regarding Zoom's security and privacy. ...

Symantec Home 120x60