Switch from vulnerable SHA-1 to secure SHA-2 certificates.