A real-world view: How expired certificates can cause service downtime and financial losses

Last updated: December 2024

Website downtime can have severe financial implications for businesses and organizations. According to a 2024 study, the average cost of a single minute of downtime has grown from $5,600 to around $9,000. 

Certificate expiry is one of the leading causes of website downtime. According to Keyfactor’s 2024 PKI and Digital Trust Report, respondents experienced an average of three outages caused by expired certificates over the past 24 months. The report also revealed that it takes 2.6 hours to identify the root cause of an outage and an additional 2.7 hours to remediate the issue. Based on the earlier calculation of $9,000 per minute, this means the average outage costs approximately $2,862,000.

To shine a light on the importance of proactively monitoring your company’s certificate inventory in order to avoid costly downtime, we’ve compiled a list of high-profile companies whose oversights unfortunately led to big losses.

1. Expired certificates: A cascade of problems

a) Shopify: An expired root certificate made its way into a staging environment, risking a production deployment. Fortunately, a deployment freeze prevented it from reaching the live environment.

b) Microsoft: The expiration of the WinGet CDN’s SSL/TLS certificate impacted package installations and upgrades, affecting users’ experience and productivity.

c) Microsoft and Spotify: An expired certificate disrupted the Windows 11 Clock app’s Spotify integration, rendering it non-functional.

d) Starlink: Over several hours, Starlink experienced downtime due to an expired certificate, affecting its satellite internet services.

2. Widespread impact

a) Windows Insider: The expiration of a certificate resulted in the temporary unavailability of the Windows Insider program, disrupting the testing and feedback loop.

b) Spotify: An expired certificate caused a service outage on Megaphone, Spotify’s podcast platform, hindering content distribution and listener engagement.

c) LinkedIn: The expiry of a country subdomain SSL certificate impacted the accessibility and security of LinkedIn services.

3. Government systems and critical infrastructure

a) US Government: 80 certificates expired, leading to many US government websites being inaccessible.

How Red Sift can help

With the right solution, certificate expiry is one of the simplest problems to fix. Proactive monitoring can help organizations identify expiring certificates ahead of time, allowing them to renew or replace them before they cause disruptions. By avoiding website downtime, businesses can mitigate the financial costs associated with outages and ensure uninterrupted services for their users. Establishing robust certificate management practices is an essential part of maintaining a secure and reliable online presence in today’s digital world.

Red Sift’s Hardenize monitors your certificates and notifies you if they’re about to expire, proactively avoiding downtime. Crucially, we also monitor the certificates of third-party services your sites rely on, helping you avoid problems via dependencies and services you don’t control directly. Finally, via Certificate Transparency, we observe all the world’s certificates as they are issued in real-time. We automate analysis of these discoveries so that you can ignore those that are known and compliant, but focus your attention on misissued certificates.

To learn more about certificate expiry issues that could lead to expensive downtime, watch our recent webinar “Stop downtime caused by expiring certificates“.

PUBLISHED BY

Billy McDiarmid

6 Jul. 2023

SHARE ARTICLE:

Categories

Recent Posts

VIEW ALL
BEC

What is email spoofing and how can you prevent it?

Faisal Misle

Executive summary: Email spoofing is a growing cyber threat where attackers forge the sender’s address to impersonate trusted sources, enabling phishing, business email compromise, and financial fraud. Because legacy email protocols like SMTP lack strong authentication, spoofing can bypass traditional filters. Organizations can mitigate this risk by implementing robust email authentication measures, especially DMARC.…

Read more
Email

What is social engineering and how can you prevent it?

Jack Lilley

Executive summary: Email phishing has evolved and criminals now use social engineering to impersonate executives, suppliers, and even government agencies, persuading recipients to approve payments or disclose credentials. Because human judgment sits at the heart of these attacks, technical controls that eliminate spoofed messages before they reach the inbox are essential. DMARC provides that…

Read more
Cybersecurity

Attackers are abusing Microsoft 365: Here’s how to stay protected

Jack Lilley

Executive summary: Varonis has surfaced an active phishing campaign that spoofs internal users by abusing Microsoft 365’s Direct Send feature. Because Direct Send doesn’t require authentication and is treated as “internal,” these messages often bypass the checks you rely on for outside mail. Microsoft now offers an opt-in switch, RejectDirectSend, to block the pathway,…

Read more
BEC

SVGs with JavaScript are bypassing traditional email security: Learn how to stay…

Jack Lilley

Executive summary: Hackers are hiding JavaScript inside SVG attachments that pass as harmless images, and slipping past Secure Email Gateways (SEGs). To stay secure, organizations need to enforce a DMARC policy of p=reject, easily implemented with Red Sift OnDMARC, to stop compromised SVGs before they reach the end user. Key takeaways: Scalable Vector Graphics…

Read more