Be sure to delete expired SSH and SSL keys that you no longer use. If someone is capturing your encrypted data and saving it somewhere, they would be able to decrypt that data with the matching key, even if it’s expired.

© Copyright 2020 Rex Consulting, Inc. – All rights reserved