Due to the General Data Protection Regulations (GDPR) the whois email address is no longer listed for domain validation.
From 15 February 2018 certificates can only be purchased with a maximum of 825 days validity.
This article covers important changes to how the Domain Validated Authentication process works for customers using File and DNS Authentication methods.
By the end of August 2016 site seals will only appear if the connection to the site is using TLS1.1 or higher. If the connection is established using TLS1.0 or below the seal will not display.
The attack is only possible against connections supporting SSLv2. This is a very old protocol from 1995. However some systems still allow SSLv2 connections. To protect your server you should disable SSLv2.
From 1 April 2015 all SSL Certificates will be issued with a maximum validity period of 39 months.
You do not need to re-issue your SSL certificate because of POODLE.
In compliance with the CA Browser Forum as of 31st October 2014 you will be unable to order an SSL certificate with an internal server name or reserved IP address (NAT classified IP addresses).
Heartbleed is a flaw in the implementation of OpenSSL. It is not a bug that affects the SSL/TLS protocol. If your server does not use OpenSSL then you do not need to take any further action.