SHA-1: The Most Used Yet Most Insecure Web Security Algorithm

Author: Jack Martin

Once considered a secure algorithm, SHA-1 has proved to be getting weaker year after year. Search engines, including Google, are finally pushing web users to move on from SHA-1.

What Is SHA-1?

SHA-1 is the widely used security algorithm that secures sensitive and personal websites, software, and corporate servers.
According to, almost 90% of websites that use SSL (Secure Socket Layer) encryptions, such as https, use SHA-1 to protect themselves from being impersonated. For example, when you want to visit, SHA-1 ensures that you’re visiting the actual website and not giving your password or information to an attacker or fake website.

What You Can Do

SHA-1 is not an immediate threat, but it will become one in the next few years. Luckily, the ability to transition your website from SHA-1 to SHA-2 is now an option, and, according to, SHA-3 is even available as a secure algorithm. As certificates start to expire, Keystone Click will also start updating websites, ensuring the security of our client’s websites.

Don’t know if your website needs to be updated? Visit this website to find out! Or talk with us today if you have any questions about your website.

To learn more on SHA-1 visit here for more details on the issue.