Local website purchase SSL or self signed?
-
@Dashrender said:
This is a situation where Let's Encrypt would be all that I need.
Have they started issuing certificates yet?
-
@dafyre said:
@Dashrender said:
This is a situation where Let's Encrypt would be all that I need.
Have they started issuing certificates yet?
They are in a Beta stage now.
-
and they don't currently have a Windows client.. yeah!
-
@DustinB3403 said:
Yeah users need to shut it...
You're in the corporate network, which is heavily monitor'd.
So as Scott said, they need to shut it.
I completely disagree with this. I do not want users to have to ever get used to clicking through an error screen. Doing so on an internal site means instructing them to do so whenever they see it. Do you honestly expect general users to have the level of knowledge to properly read the error and confirm the internal URL?
-
Awesome, that's the kind of thing I was looking for.
With NTG I can totally understand this.. they are all technical people.. but here, they are all the technical Luddites.
-
@JaredBusch said:
@DustinB3403 said:
Yeah users need to shut it...
You're in the corporate network, which is heavily monitor'd.
So as Scott said, they need to shut it.
I completely disagree with this. I do not want users to have to ever get used to clicking through an error screen. Doing so on an internal site means instructing them to do so whenever they see it. Do you honestly expect general users to have the level of knowledge to properly read the error and confirm the internal URL?
That's an excellent point. I often forget that one but it does matter a lot in most cases.
-
@Dashrender said:
Awesome, that's the kind of thing I was looking for.
With NTG I can totally understand this.. they are all technical people.. but here, they are all the technical Luddites.
Right, that's why we often go that route internally.
-
As @JaredBusch said.
Why would you ever tell users to ignore such a fundamental error message? If they get that error when logging into say, Office 365, do you want them typing in their credentials to a bogus website?
-
@JaredBusch said:
@DustinB3403 said:
Yeah users need to shut it...
You're in the corporate network, which is heavily monitor'd.
So as Scott said, they need to shut it.
I completely disagree with this. I do not want users to have to ever get used to clicking through an error screen. Doing so on an internal site means instructing them to do so whenever they see it. Do you honestly expect general users to have the level of knowledge to properly read the error and confirm the internal URL?
Exactly. That's promoting bad habits. We use self-signed ones in places however push the Certs out as trusted via GPOs fixes any errors in browsers.
-
@DustinB3403 said:
You're in the corporate network, which is heavily monitor'd.
Heavily monitored doesn't mean protected from stupid actions, which is how most things get in. You can't rely on a single point to protect you from vulnerabilities. You need good user training in addition to AV and network firewalls. User training is the most important.
-
If you just need the SSL, StartSSL offers free certs. You don't have the insurance of a paid cert, but it's still encrypted and it's still green.
-
@Jason said:
You need good user training in addition to AV and network firewalls. User training is the most important.
User training..... hahaha....
So as with anything lets perform a math exercise and calculate the continuing cost of effectively training users, versus the cost of build a good security policy with backup and recovery functionality (not excluding cost to upgrade it and maintain it)
-
@DustinB3403 said:
@Jason said:
You need good user training in addition to AV and network firewalls. User training is the most important.
User training..... hahaha....
So as with anything lets perform a math exercise and calculate the continuing cost of effectively training users, versus the cost of build a good security policy with backup and recovery functionality (not excluding cost to upgrade it and maintain it)
Don't forget to add the cost of a breach.
Reputation
Fines -
@Breffni-Potter said:
Don't forget to add the cost of a breach.
Reputation
FinesLoss of stock value, investors etc.
-
@Breffni-Potter said:
@DustinB3403 said:
@Jason said:
You need good user training in addition to AV and network firewalls. User training is the most important.
User training..... hahaha....
So as with anything lets perform a math exercise and calculate the continuing cost of effectively training users, versus the cost of build a good security policy with backup and recovery functionality (not excluding cost to upgrade it and maintain it)
Don't forget to add the cost of a breach.
Reputation
FinesI really hate to be the pessimist... but do companies really care about loss of reputation after a breach? To the average consumer I don't think they really understand or care that their data has been stolen... For us sure it matters but everyone else?
-
@coliver said:
I really hate to be the pessimist... but do companies really care about loss of reputation after a breach? To the average consumer I don't think they really understand or care that their data has been stolen... For us sure it matters but everyone else?
I know many people who aren't IT or security minded at all who won't shop at Kmart & Target now. So I guess they do.
-
@Jason said:
@coliver said:
I really hate to be the pessimist... but do companies really care about loss of reputation after a breach? To the average consumer I don't think they really understand or care that their data has been stolen... For us sure it matters but everyone else?
I know many people who aren't IT or security minded at all who won't shop at Kmart & Target now. So I guess they do.
But is it enough to impact their sales? TJ Maxx did this stuff too, but has that stopped people shopping there? People forget really, really quickly. Investing in company reputation is often worthless as consumers just don't remember.
-
@johnhooks said:
If you just need the SSL, StartSSL offers free certs. You don't have the insurance of a paid cert, but it's still encrypted and it's still green.
what insurance would that be?
And you get green? That doesn't seem right. Green is suppose to mean extended validation. I can't imagine that StartSSL is doing that for free.
-
The padlock HTTPS bit is always green regardless of cert level.
You are thinking of the green bar which is called Extended Validation.
-
@Dashrender said:
@johnhooks said:
If you just need the SSL, StartSSL offers free certs. You don't have the insurance of a paid cert, but it's still encrypted and it's still green.
what insurance would that be?
And you get green? That doesn't seem right. Green is suppose to mean extended validation. I can't imagine that StartSSL is doing that for free.
from Comodo:
What does the Warranty actually mean?
We believe it is important to protect the end user. If we were to mis-issue a certificate to a fraudulent site, that fraudulent site has an SSL link with an end user and as a result of this the end user loses money the end user had what they thought was a "trusted session". Comodo should never have provided the fraudster with the ability to engineer this situation we therefore have insurance to pay the end user for any losses that they may incur. Why would we do this?
We value the end customer
We believe the insurance provides greater peace of mind and therefore allows the merchant to sell more products
Most importantly, we value our validation techniques (delivered through www.comodo.com)
We pre-validate customers and provide validation that is far higher than the majority of other SSL providers. Some CA's have weak validation so they do not offer insurance! We also offer high validation, but not at the compromise of speed. You can still obtain SSL instantly.Also
Warranty: Comodo’s guarantee against loss associated with an online credit card transaction caused by Comodo’s failure to exercise reasonable care to perform the validation steps set forth in the Comodo CPS prior to the Certificate’s issuance.
As @Breffni-Potter said, the lock is always green, but only the bar is the extended validation.