A real-world view: How expired certificates can cause service downtime and financial losses

Website downtime can have severe financial implications for businesses and organizations. According to recent studies, the average cost of a single minute of downtime is estimated to range from $5,600 to $9,000. 

One of the key reasons for website downtime is certificate expiry. In the 2023 State of Machine Identity Report, 77% of respondents said their organization suffered at least two significant certificate-related outages within the past 24 months.

To shine a light on the importance of proactively monitoring your company’s Certificate Inventory to avoid costly downtime, we’ve compiled a list of high-profile companies whose oversights unfortunately led to big losses.

1. Expired Certificates: A Cascade of Problems

a) Shopify: An expired root certificate made its way into a staging environment, risking a production deployment. Fortunately, a deployment freeze prevented it from reaching the live environment.

b) Microsoft: The expiration of the WinGet CDN’s SSL/TLS certificate impacted package installations and upgrades, affecting users’ experience and productivity.

c) Microsoft and Spotify: An expired certificate disrupted the Windows 11 Clock app’s Spotify integration, rendering it non-functional.

d) Starlink: Over several hours, Starlink experienced downtime due to an expired certificate, affecting its satellite internet services.

2. Widespread Impact

a) Windows Insider: The expiration of a certificate resulted in the temporary unavailability of the Windows Insider program, disrupting the testing and feedback loop.

b) Spotify: An expired certificate caused a service outage on Megaphone, Spotify’s podcast platform, hindering content distribution and listener engagement.

c) LinkedIn: The expiry of a country subdomain SSL certificate impacted the accessibility and security of LinkedIn services.

3. Government Systems and Critical Infrastructure

a) US Government: 80 certificates expired, leading to many US government websites being inaccessible.

How Red Sift can help

With the right solution, certificate expiry is one of the simplest problems to fix. Proactive monitoring can help organizations identify expiring certificates ahead of time, allowing them to renew or replace them before they cause disruptions. By avoiding website downtime, businesses can mitigate the financial costs associated with outages and ensure uninterrupted services for their users. Establishing robust certificate management practices is an essential part of maintaining a secure and reliable online presence in today’s digital world.

Red Sift’s Hardenize monitors your certificates and notifies you if they’re about to expire, proactively avoiding downtime. Crucially, we also monitor the certificates of third-party services your sites rely on, helping you avoid problems via dependencies and services you don’t control directly. Finally, via Certificate Transparency, we observe all the world’s certificates as they are issued in real-time. We automate analysis of these discoveries so that you can ignore those that are known and compliant, but focus your attention on misissued certificates.

To learn more about certificate expiry issues that could lead to expensive downtime, watch our recent webinar “Stop downtime caused by expiring certificates“.

PUBLISHED BY

Billy McDiarmid

6 Jul. 2023

SHARE ARTICLE:

Categories

Recent Posts

VIEW ALL
Certificates

Preventing certificate related violations in cybersecurity frameworks:  A guide to certificate monitoring…

Rebecca Warren

TLS is one of the most widely adopted security protocols in the world allowing for unprecedented levels of commerce across the internet.  At the core of the TLS protocol is TLS certificates. Organizations must deploy TLS certificates and corresponding private keys to their systems to provide them with unique identities that can be reliably…

Read more
ASM

Red Sift ASM & Red Sift Certificates: the missing link in your…

Billy McDiarmid

According to Gartner, Attack Surface Management (ASM) refers to the “processes, technology and managed services deployed to discover internet-facing enterprise assets and systems and associated exposures which include misconfigured public cloud services and servers.” This broad category of tooling is used within Continuous Threat Exposure Management (CTEM) programs, with many vendors within it having…

Read more
Email

The best tools to protect yourself from SubdoMailing

Francesca Rünger-Field

In late February 2024, ‘SubdoMailing’ became a trending search term overnight. Research by Guardio Labs uncovered a massive-scale phishing campaign that had been going on since at least 2022. At the time of reporting, the campaign had sent 5 million emails a day from more than 8,000 compromised domains and 13,000 subdomains with several…

Read more
Product Release

Red Sift’s Spring 2024 Quarterly Product Release

Francesca Rünger-Field

This early into 2024, the cybersecurity space is already buzzing with activity. Emerging standards, such as Google and Yahoo’s bulk sender requirements, mark a new era of compliance for businesses reliant on email communication. At the same time, the prevalence of sophisticated cyber threats, such as the SubdoMailing campaign, emphasizes the continual hurdles posed…

Read more