Hackers have found many ways to exploit digital certificates. What can you do to defend yourself against digital certificate risks?