{"id":357,"date":"2017-12-12T15:59:46","date_gmt":"2017-12-12T20:59:46","guid":{"rendered":"https:\/\/www.amp.legal\/blog\/?p=357"},"modified":"2019-01-03T17:25:32","modified_gmt":"2019-01-03T22:25:32","slug":"google-compels-website-security","status":"publish","type":"post","link":"https:\/\/www.amp.legal\/blog\/google-compels-website-security\/","title":{"rendered":"Google Compels Websites To Use SSL"},"content":{"rendered":"<p>Most states have <a href=\"https:\/\/www.amp.legal\/data-breach-law-tool\/\" target=\"_blank\" rel=\"noopener noreferrer\">data breach laws<\/a>\u00a0that require companies to secure the personal data of their customers, yet <a href=\"https:\/\/www.wired.com\/2017\/01\/half-web-now-encrypted-makes-everyone-safer\/\" target=\"_blank\" rel=\"noopener noreferrer\">WIRED<\/a> reported that only 50% of websites use the Internet\u2019s secure HTTPS protocol. With the release of Chrome v62, Google is requiring websites to use HTTPS (Hyper Text Transfer Protocol Secure) that encrypts data with SSL (Secure Sockets Layer). If a website is not secure, Google will lower its rankings in the search engine.<\/p>\n<h3>HTTP Transmits Clear Text<\/h3>\n<p>When a website allows a user to input text into a web form, it transmits the text from the user\u2019s web browser to the web server. A website that uses HTTP (Hyper Text Transfer Protocol) transmits text in a \u201cclear text\u201d format, which leaves the data vulnerable for hacker attacks.<\/p>\n<p>Using a network sniffer utility, a hacker can intercept the clear text that is traveling through the web. For example, <a href=\"https:\/\/www.wireshark.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">Wireshark<\/a>, a network protocol analyzer, captures packets of data by sniffing a network for traffic. Using Wireshark, a hacker can sniff a network, capture the traffic, and display the data in a readable format.<\/p>\n<p>While HTTP operates on port 80, HTTPS creates a secure tunnel using SSL port 443. Importantly, HTTPS is stateful, which means it establishes a connection between the web browser and the web server until the session is complete.<\/p>\n<h3>HTTPS Compliance<\/h3>\n<p>To implement SSL, a website owner must obtain an SSL certificate from a trusted Certificate Authority. Next, the web administrator installs the certificate on the web server and configures the website to use the HTTPS protocol.<\/p>\n<p>Google has a strategy to enforce the SSL requirement. If a website lacks an SSL certificate, the Chrome browser will tag it as &#8220;not secure.&#8221;\u00a0Additionally, Google plans to favor websites in its search engine rankings that use HTTPS.<\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter wp-image-359 size-full\" title=\"HTTP vs. HTTPS Comparison\" src=\"https:\/\/www.amp.legal\/blog\/wp-content\/uploads\/2017\/12\/HTTPS-1.png\" alt=\"\" width=\"700\" height=\"252\" srcset=\"https:\/\/www.amp.legal\/blog\/wp-content\/uploads\/2017\/12\/HTTPS-1.png 700w, https:\/\/www.amp.legal\/blog\/wp-content\/uploads\/2017\/12\/HTTPS-1-300x108.png 300w, https:\/\/www.amp.legal\/blog\/wp-content\/uploads\/2017\/12\/HTTPS-1-520x187.png 520w, https:\/\/www.amp.legal\/blog\/wp-content\/uploads\/2017\/12\/HTTPS-1-360x130.png 360w, https:\/\/www.amp.legal\/blog\/wp-content\/uploads\/2017\/12\/HTTPS-1-250x90.png 250w, https:\/\/www.amp.legal\/blog\/wp-content\/uploads\/2017\/12\/HTTPS-1-100x36.png 100w\" sizes=\"(max-width: 700px) 100vw, 700px\" \/><\/p>\n<h3>SSL Vulnerabilities and Benefits<\/h3>\n<p>A motivated hacker may still be able to find a way to defeat HTTPS. For example, once a HTTPS session creates an SSL tunnel, the contents are encrypted and sent through the tunnel bypassing any content filtering appliance. This means that malware could travel through the tunnel without being noticed. An unaware web client would download the malware, and it\u00a0could replicate itself across the network. As a defense, a network administrator can setup a proxy server using SSL Inspection to prevent this type of attack.<\/p>\n<p>Although HTTPS has vulnerabilities, transmitting encrypted data is preferable to sending it through the web in clear text. In addition to the security benefits, using HTTPS offers better search engine rankings and verifies the authenticity of the website.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Most states have data breach laws\u00a0that require companies to secure the personal data of their customers, yet WIRED reported that only 50% of websites use the Internet\u2019s secure HTTPS protocol. With the release of Chrome [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":890,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[27],"tags":[13,25,21,49,52,50,71],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Google Compels Websites To Use SSL - Cyber Law Blog<\/title>\n<meta name=\"description\" content=\"Only half of websites use the Internet\u2019s secure HTTPS protocol. With the release of Chrome v62, Google is requiring websites to encrypt data with SSL.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.amp.legal\/blog\/google-compels-website-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Google Compels Websites To Use SSL - Cyber Law Blog\" \/>\n<meta property=\"og:description\" content=\"Only half of websites use the Internet\u2019s secure HTTPS protocol. With the release of Chrome v62, Google is requiring websites to encrypt data with SSL.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.amp.legal\/blog\/google-compels-website-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Law Blog\" \/>\n<meta property=\"article:published_time\" content=\"2017-12-12T20:59:46+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-01-03T22:25:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.amp.legal\/blog\/wp-content\/uploads\/2017\/12\/Google-laptop.png\" \/>\n\t<meta property=\"og:image:width\" content=\"900\" \/>\n\t<meta property=\"og:image:height\" content=\"525\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Alice M. Porch, Esq., CIPP\/US, C|EH, Security+\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Alice M. Porch, Esq., CIPP\/US, C|EH, Security+\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.amp.legal\/blog\/google-compels-website-security\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.amp.legal\/blog\/google-compels-website-security\/\"},\"author\":{\"name\":\"Alice M. Porch, Esq., CIPP\/US, C|EH, Security+\",\"@id\":\"https:\/\/www.amp.legal\/blog\/#\/schema\/person\/2abed582dc9fbf067a8aa30d3e21453f\"},\"headline\":\"Google Compels Websites To Use SSL\",\"datePublished\":\"2017-12-12T20:59:46+00:00\",\"dateModified\":\"2019-01-03T22:25:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.amp.legal\/blog\/google-compels-website-security\/\"},\"wordCount\":428,\"publisher\":{\"@id\":\"https:\/\/www.amp.legal\/blog\/#organization\"},\"keywords\":[\"cyber security\",\"data breach\",\"encryption\",\"Google\",\"hackers\",\"HTTPS\",\"Internet\"],\"articleSection\":[\"Cyber Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.amp.legal\/blog\/google-compels-website-security\/\",\"url\":\"https:\/\/www.amp.legal\/blog\/google-compels-website-security\/\",\"name\":\"Google Compels Websites To Use SSL - Cyber Law Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.amp.legal\/blog\/#website\"},\"datePublished\":\"2017-12-12T20:59:46+00:00\",\"dateModified\":\"2019-01-03T22:25:32+00:00\",\"description\":\"Only half of websites use the Internet\u2019s secure HTTPS protocol. With the release of Chrome v62, Google is requiring websites to encrypt data with SSL.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.amp.legal\/blog\/google-compels-website-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.amp.legal\/blog\/google-compels-website-security\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.amp.legal\/blog\/google-compels-website-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.amp.legal\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Google Compels Websites To Use SSL\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.amp.legal\/blog\/#website\",\"url\":\"https:\/\/www.amp.legal\/blog\/\",\"name\":\"Cyber Law Blog\",\"description\":\"Exploring technology law in cyberspace\",\"publisher\":{\"@id\":\"https:\/\/www.amp.legal\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.amp.legal\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.amp.legal\/blog\/#organization\",\"name\":\"Alice M. Porch, P.A.\",\"url\":\"https:\/\/www.amp.legal\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.amp.legal\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.amp.legal\/blog\/wp-content\/uploads\/2017\/08\/AMP-Logo.png\",\"contentUrl\":\"https:\/\/www.amp.legal\/blog\/wp-content\/uploads\/2017\/08\/AMP-Logo.png\",\"width\":1104,\"height\":1114,\"caption\":\"Alice M. Porch, P.A.\"},\"image\":{\"@id\":\"https:\/\/www.amp.legal\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.amp.legal\/blog\/#\/schema\/person\/2abed582dc9fbf067a8aa30d3e21453f\",\"name\":\"Alice M. Porch, Esq., CIPP\/US, C|EH, Security+\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.amp.legal\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/b0913e4ef042f9c502b709824db43e8f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/b0913e4ef042f9c502b709824db43e8f?s=96&d=mm&r=g\",\"caption\":\"Alice M. Porch, Esq., CIPP\/US, C|EH, Security+\"},\"description\":\"Alice is a member of the Florida Bar, and she focuses on data privacy and cybersecurity compliance. She attended the Warrington College of Business at the University of Florida and earned a Bachelor of Science in Business Administration. After graduating, she earned a Juris Doctor at the Stetson University College of Law. During law school, she served as an Assistant Executive Editor for Stetson Law Review and also as a Staff Editor for Stetson Journal of Advocacy and the Law. She also served as a member of The Florida Bar Journal\/News Editorial Board from 2018-2024. She is currently a member of the Florida Bar Cybersecurity and Privacy Law Substantive Law Committee.\",\"sameAs\":[\"https:\/\/www.aliceporch.com\",\"https:\/\/www.linkedin.com\/in\/alice-m-porch\/\"],\"url\":\"https:\/\/www.amp.legal\/blog\/author\/amplegal\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Google Compels Websites To Use SSL - Cyber Law Blog","description":"Only half of websites use the Internet\u2019s secure HTTPS protocol. With the release of Chrome v62, Google is requiring websites to encrypt data with SSL.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.amp.legal\/blog\/google-compels-website-security\/","og_locale":"en_US","og_type":"article","og_title":"Google Compels Websites To Use SSL - Cyber Law Blog","og_description":"Only half of websites use the Internet\u2019s secure HTTPS protocol. With the release of Chrome v62, Google is requiring websites to encrypt data with SSL.","og_url":"https:\/\/www.amp.legal\/blog\/google-compels-website-security\/","og_site_name":"Cyber Law Blog","article_published_time":"2017-12-12T20:59:46+00:00","article_modified_time":"2019-01-03T22:25:32+00:00","og_image":[{"width":900,"height":525,"url":"https:\/\/www.amp.legal\/blog\/wp-content\/uploads\/2017\/12\/Google-laptop.png","type":"image\/png"}],"author":"Alice M. Porch, Esq., CIPP\/US, C|EH, Security+","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Alice M. Porch, Esq., CIPP\/US, C|EH, Security+","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.amp.legal\/blog\/google-compels-website-security\/#article","isPartOf":{"@id":"https:\/\/www.amp.legal\/blog\/google-compels-website-security\/"},"author":{"name":"Alice M. Porch, Esq., CIPP\/US, C|EH, Security+","@id":"https:\/\/www.amp.legal\/blog\/#\/schema\/person\/2abed582dc9fbf067a8aa30d3e21453f"},"headline":"Google Compels Websites To Use SSL","datePublished":"2017-12-12T20:59:46+00:00","dateModified":"2019-01-03T22:25:32+00:00","mainEntityOfPage":{"@id":"https:\/\/www.amp.legal\/blog\/google-compels-website-security\/"},"wordCount":428,"publisher":{"@id":"https:\/\/www.amp.legal\/blog\/#organization"},"keywords":["cyber security","data breach","encryption","Google","hackers","HTTPS","Internet"],"articleSection":["Cyber Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.amp.legal\/blog\/google-compels-website-security\/","url":"https:\/\/www.amp.legal\/blog\/google-compels-website-security\/","name":"Google Compels Websites To Use SSL - Cyber Law Blog","isPartOf":{"@id":"https:\/\/www.amp.legal\/blog\/#website"},"datePublished":"2017-12-12T20:59:46+00:00","dateModified":"2019-01-03T22:25:32+00:00","description":"Only half of websites use the Internet\u2019s secure HTTPS protocol. With the release of Chrome v62, Google is requiring websites to encrypt data with SSL.","breadcrumb":{"@id":"https:\/\/www.amp.legal\/blog\/google-compels-website-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.amp.legal\/blog\/google-compels-website-security\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.amp.legal\/blog\/google-compels-website-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.amp.legal\/blog\/"},{"@type":"ListItem","position":2,"name":"Google Compels Websites To Use SSL"}]},{"@type":"WebSite","@id":"https:\/\/www.amp.legal\/blog\/#website","url":"https:\/\/www.amp.legal\/blog\/","name":"Cyber Law Blog","description":"Exploring technology law in cyberspace","publisher":{"@id":"https:\/\/www.amp.legal\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.amp.legal\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.amp.legal\/blog\/#organization","name":"Alice M. Porch, P.A.","url":"https:\/\/www.amp.legal\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.amp.legal\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.amp.legal\/blog\/wp-content\/uploads\/2017\/08\/AMP-Logo.png","contentUrl":"https:\/\/www.amp.legal\/blog\/wp-content\/uploads\/2017\/08\/AMP-Logo.png","width":1104,"height":1114,"caption":"Alice M. Porch, P.A."},"image":{"@id":"https:\/\/www.amp.legal\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.amp.legal\/blog\/#\/schema\/person\/2abed582dc9fbf067a8aa30d3e21453f","name":"Alice M. Porch, Esq., CIPP\/US, C|EH, Security+","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.amp.legal\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/b0913e4ef042f9c502b709824db43e8f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b0913e4ef042f9c502b709824db43e8f?s=96&d=mm&r=g","caption":"Alice M. Porch, Esq., CIPP\/US, C|EH, Security+"},"description":"Alice is a member of the Florida Bar, and she focuses on data privacy and cybersecurity compliance. She attended the Warrington College of Business at the University of Florida and earned a Bachelor of Science in Business Administration. After graduating, she earned a Juris Doctor at the Stetson University College of Law. During law school, she served as an Assistant Executive Editor for Stetson Law Review and also as a Staff Editor for Stetson Journal of Advocacy and the Law. She also served as a member of The Florida Bar Journal\/News Editorial Board from 2018-2024. She is currently a member of the Florida Bar Cybersecurity and Privacy Law Substantive Law Committee.","sameAs":["https:\/\/www.aliceporch.com","https:\/\/www.linkedin.com\/in\/alice-m-porch\/"],"url":"https:\/\/www.amp.legal\/blog\/author\/amplegal\/"}]}},"_links":{"self":[{"href":"https:\/\/www.amp.legal\/blog\/wp-json\/wp\/v2\/posts\/357"}],"collection":[{"href":"https:\/\/www.amp.legal\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.amp.legal\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.amp.legal\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.amp.legal\/blog\/wp-json\/wp\/v2\/comments?post=357"}],"version-history":[{"count":15,"href":"https:\/\/www.amp.legal\/blog\/wp-json\/wp\/v2\/posts\/357\/revisions"}],"predecessor-version":[{"id":741,"href":"https:\/\/www.amp.legal\/blog\/wp-json\/wp\/v2\/posts\/357\/revisions\/741"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.amp.legal\/blog\/wp-json\/wp\/v2\/media\/890"}],"wp:attachment":[{"href":"https:\/\/www.amp.legal\/blog\/wp-json\/wp\/v2\/media?parent=357"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.amp.legal\/blog\/wp-json\/wp\/v2\/categories?post=357"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.amp.legal\/blog\/wp-json\/wp\/v2\/tags?post=357"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}