{"componentChunkName":"component---src-templates-blog-list-template-js","path":"/104","result":{"data":{"allMarkdownRemark":{"edges":[{"node":{"excerpt":"There has been a significant surge in formjacking attacks recently. It has been affecting organizations that mostly accept online payment…","fields":{"slug":"/identity/what-is-formjacking/"},"html":"<p>There has been a significant surge in formjacking attacks recently. It has been affecting organizations that mostly accept online payment from consumers.</p>\n<p>In recent times, cryptocurrencies have progressed in both popularity and technical improvements. However, the radical decrease in the value of cryptocurrencies like Bitcoin and Monero has led to cybercriminals looking elsewhere for fraudulent profits. </p>\n<p>That being said, what better place to steal your financial information than a product order form on online shopping websites before you even hit the submit button—that's formjacking!</p>\n<p>To understand what other threats formjacking pose, let's get to the basics by exploring this unique kind of <a href=\"https://www.loginradius.com/blog/identity/2019/10/cybersecurity-attacks-business/\">cyberattack</a>.</p>\n<h2 id=\"what-is-a-formjacking-attack\" style=\"position:relative;\"><a href=\"#what-is-a-formjacking-attack\" aria-label=\"what is a formjacking attack permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What Is a Formjacking Attack</h2>\n<p>Formjacking is a type of cyber attack in which hackers insert malicious JavaScript code into the target website, most often to a payment page form. </p>\n<p>Once the malicious code is in operation, when a consumer enters their payment card information and hits submit, the compromised code sends the payment card number and other sensitive information like the consumer's name, address, and phone number to the hacker. </p>\n<p>Hackers send this stolen information to a server for reuse or even sell the personal details on the dark web. While all this happens, the victim is blissfully unaware of their payment details being compromised.</p>\n<p>According to the authenticated <a href=\"https://www.broadcom.com/support/security-center?om_ext_cid=biz_vnty_istr-24_multi_v10195\">Symantec Internet Security Threat Report 2019,</a> formjackers hacked 4,818 unique websites each month in 2018. Symantec blocked more than 3.7 million Formjacking attack attempts in that year alone.</p>\n<h2 id=\"who-is-behind-formjacking-attacks\" style=\"position:relative;\"><a href=\"#who-is-behind-formjacking-attacks\" aria-label=\"who is behind formjacking attacks permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Who Is Behind Formjacking Attacks</h2>\n<p>It is quite complicated for security researchers to pinpoint a single attacker or attack style considering so many unique sites are being attacked simultaneously. However, the majority of formjacking attacks are known to originate from Magecart groups. </p>\n<p>Magecart is a club of hacker groups that have been behind the attacks on various websites. Attacks on Ticketmaster, Feedify, British Airways, and Newegg are only some of the Formjacking examples done by this consortium. </p>\n<p>The group injects web-based card skimmers onto eCommerce sites to <a href=\"https://www.loginradius.com/blog/identity/2020/04/corporate-account-takeover-attacks/\">steal payment card data or credit card information</a> and other sensitive information right from online payment forms.</p>\n<p>Magecart group started hacking into Magneto online stores; however, they have now altered their strategies and are increasingly using formjacking attacks to steal payment card details. </p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 148%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAeCAYAAAAsEj5rAAAACXBIWXMAAAsSAAALEgHS3X78AAACv0lEQVRIx51WCW7bMBDM/7/XpAWcIDaKHL51U7y3OytSkSynaGVgIYomhzN7UQ8xRsJP+0CtDaRcHK2T90B5TX7+7feQFzXWkw+RjHVsVizwe8+AOOy/AcGGd1BZFHQ8HOiw35NnUCZK2q0AbIwnw0wss7J+MBcG2WYNQx+TPLazcuI7vAP4X8EWkoUNk6ksg/OzZzAECkxXB6XtOmqahmo27z0HJK7zIZhgXNcVFdcrXdkCA5qwEnAqWbEZnu4dJPt1kiEX+YaIHjpLyqaorw0K0kZJEjNwoNF3raRNXCPZy/PICf368kK/dztiJ65P7EoPEa1VT4fzhc5lLUkO5tPS+87y/yMgNsNnYKQ8Ep3kHXLDglm8eX6xHwGdAEYBLk0UtjYFJbPQ6QCUfX7qVKYLhhVLy53lVJTUajNKNjlATP9SVrR7+6DTtaT3/ZFdpLkogrCdAeagqLahl+cNnU/HkTlAL70TN2jV0c+nR/r19ES77SvFMGTHArBJDJVxYq224kMkNpgCeBgTlW1Hx2tBnbEiGXsXkn0qMcg7M5veD/KzfyRwPvmRQQsz+Bt7/L0oK5QefHin2+AwbGrTlYB1tY3DOM3NAdk61G3b0ufnJ/vvRHtO8LqqhLFJJZkT3BjD/5VD9KWx3JEsTYA3fTDgZrOh1+2WeqXERzkf+wSoOQOKspQ7J8T4PSAkiVTkF7qOGxwuklO0sQ7zWAO5Tdo3Ai5rNFLBQQnh+7oFq1K7ee1MK2Vai3B4yXXd3LT+aUXVzBRrutSUpzZjiAU6JWmWOK1jjDGXZ+Dfzs470Rcgm0KeaU0/Hh/lXnbStcMIiDHmOs6Gt7d3ObidlN0cMN0rniOqeIN3VvJrntjDp4rhQ1tcYiHMArIAlGaQ7hX4Utmw8GGXvn+wprlzxT7cRgkVIX3xZuFtYLAm3PmI+gOE6D3dZAdeeAAAAABJRU5ErkJggg=='); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"who-is-behind-formjacking-attacks\"\n        title=\"who-is-behind-formjacking-attacks\"\n        src=\"/static/536a62a1e643be82873d5537f2fcee6c/e5715/who-is-behind-formjacking-attacks.png\"\n        srcset=\"/static/536a62a1e643be82873d5537f2fcee6c/a6d36/who-is-behind-formjacking-attacks.png 650w,\n/static/536a62a1e643be82873d5537f2fcee6c/e5715/who-is-behind-formjacking-attacks.png 768w,\n/static/536a62a1e643be82873d5537f2fcee6c/2bef9/who-is-behind-formjacking-attacks.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<h2 id=\"how-big-is-this-formjacking-campaign\" style=\"position:relative;\"><a href=\"#how-big-is-this-formjacking-campaign\" aria-label=\"how big is this formjacking campaign permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How Big Is This Formjacking Campaign</h2>\n<p>The latest Formjacking campaign conveys that attackers are constantly changing and enhancing their malicious formjacking code and discovering innovative delivery mechanisms to infect users. By the time people even understand formjacking, hackers flee with the information. </p>\n<p>For example, Symantec has been digging into telemetry and examining the technical aspects of formjacking attacks to find that 248,000 formjacking attempts were blocked in 2019. But the worrying thing is that such activities are increasing continually as over one-third of those blocks were encountered between September 13 and 20.</p>\n<h2 id=\"what-categories-of-businesses-are-these-attacks-targeting\" style=\"position:relative;\"><a href=\"#what-categories-of-businesses-are-these-attacks-targeting\" aria-label=\"what categories of businesses are these attacks targeting permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What Categories of Businesses Are These Attacks Targeting</h2>\n<p>Magecart has been targeting eCommerce giants such as Ticketmaster, Newegg, and British Airways to gain larger profits. </p>\n<p>Symantec's data showcases that the impacted websites are mostly online retail sites, including small niche sites, to more extensive retail business operations. Websites impacted ranged from a fitness retailer to a supplier of outdoor accessories.</p>\n<p>Other online retailers affected included suppliers of parts for vehicles and portals selling gifts or kitchen accessories. </p>\n<p>Therefore, it is safe to assume that any company that processes payments on the internet is a probable victim of formjacking attacks.</p>\n<h2 id=\"how-can-formjacking-attacks-affect-you\" style=\"position:relative;\"><a href=\"#how-can-formjacking-attacks-affect-you\" aria-label=\"how can formjacking attacks affect you permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How Can Formjacking Attacks Affect You</h2>\n<p>How formjacking attacks can impact your business depends on the type of information the identity thief captures. \"There is some data that can ruin your current day; however, there is some confidential information that can even ruin your complete life,\" says <a href=\"https://www.linkedin.com/in/alex-hamerstone-364b4520\">Alex Hamerstone</a>, Practice Lead: Governance, Risk and Compliance at TrustedSec.</p>\n<p>You must monitor your bank and credit card statements and keep an eye on your credit scores. Unfortunately, it is almost impossible for victims to identify formjacking attacks, considering most still do not understand what is formjacking, let alone knowing how to detect it. </p>\n<p>So, it is solely upon the IT professionals to keep a constant check on their systems to detect and eliminate it, if such a specific threat were to occur.</p>\n<h2 id=\"how-can-businesses-protect-your-credit-card-and-other-information-from-formjacking\" style=\"position:relative;\"><a href=\"#how-can-businesses-protect-your-credit-card-and-other-information-from-formjacking\" aria-label=\"how can businesses protect your credit card and other information from formjacking permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How Can Businesses Protect Your Credit Card and Other Information From Formjacking</h2>\n<p>You may not be able to stop Formjacking before it attacks your system, but you can take steps to protect your personal details. </p>\n<p>Use credit cards instead of debit cards while shopping online to reduce <a href=\"https://www.loginradius.com/blog/identity/2020/11/ecommerce-security/\">financial risks</a>. The reason behind this is simple. </p>\n<p>If someone uses your credit card information deceptively or indulges in card fraud, they will be exhausting the funds of the credit card companies. In the case of debit cards, the funds are directly tied to your checking account balance.</p>\n<p><a href=\"https://www.loginradius.com/resource/pii-data-breach-report/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"protecting-pii-against-data-breaches\"\n        title=\"protecting-pii-against-data-breaches\"\n        src=\"/static/8ae28768fa7a47b91a86b0e9441f9c50/e5715/protecting-pii-against-data-breaches.png\"\n        srcset=\"/static/8ae28768fa7a47b91a86b0e9441f9c50/a6d36/protecting-pii-against-data-breaches.png 650w,\n/static/8ae28768fa7a47b91a86b0e9441f9c50/e5715/protecting-pii-against-data-breaches.png 768w,\n/static/8ae28768fa7a47b91a86b0e9441f9c50/63ff0/protecting-pii-against-data-breaches.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<h2 id=\"how-to-prevent-formjacking-attacks\" style=\"position:relative;\"><a href=\"#how-to-prevent-formjacking-attacks\" aria-label=\"how to prevent formjacking attacks permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How to Prevent Formjacking Attacks</h2>\n<ul>\n<li>Make sure that your IT professionals are well-versed with what is formjacking. </li>\n<li>Use the latest antivirus software; one with a reputable status can <a href=\"https://www.loginradius.com/blog/identity/2019/10/cybersecurity-best-practices-for-enterprises/\">safeguard your system</a> from some if not all formjacking attacks. </li>\n<li>Run scans and tests to check for vulnerabilities in your systems and fix them before a cybercriminal can find them. </li>\n<li>Every time your software gets a new update, run a test to look for discrepancies before launching it on the web. </li>\n<li>Don't forget to monitor your systems' behavioral patterns so that you can detect suspicious patterns and block the apps that may cause damage to your system.</li>\n</ul>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>Victims don't realize that they have fallen prey to formjacking attacks easily as websites prolong to operate as usual, and Magecart formjacking attackers take steps to stop their detection. </p>\n<p>Even with all preventive measures in place, it can still be exceedingly difficult to spot formjacking attacks. However, as an online business, you must have all the protocols in place to quickly alert consumers in the case of such attacks.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-loginradius\"\n        title=\"book-a-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"January 15, 2021","updated_date":null,"description":"Formjacking attacks are designed and executed by cybercriminals to steal financial and banking details from payment forms that can be captured directly on the checkout pages from eCommerce websites. Find out more about how this practice can affect your business and how to prevent it.","title":"What is Formjacking","tags":["all, Security"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.408450704225352,"src":"/static/fdccc143a05e8d7762360472dedb082a/9a31d/what-is-formjacking.jpg","srcSet":"/static/fdccc143a05e8d7762360472dedb082a/f836f/what-is-formjacking.jpg 200w,\n/static/fdccc143a05e8d7762360472dedb082a/2244e/what-is-formjacking.jpg 400w,\n/static/fdccc143a05e8d7762360472dedb082a/9a31d/what-is-formjacking.jpg 767w","sizes":"(max-width: 767px) 100vw, 767px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},{"node":{"excerpt":"What is DNS Cache Poisoning DNS cache poisoning, also known as DNS spoofing, is a cyber-attack that exploits the weaknesses in the Domain…","fields":{"slug":"/identity/dns-cache-poisoning/"},"html":"<h2 id=\"what-is-dns-cache-poisoning\" style=\"position:relative;\"><a href=\"#what-is-dns-cache-poisoning\" aria-label=\"what is dns cache poisoning permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is DNS Cache Poisoning</h2>\n<p>DNS cache poisoning, also known as DNS spoofing, is a cyber-attack that exploits the weaknesses in the Domain Name System (DNS) servers. It enables the attacker to poison the data in DNS servers, including your company server, by providing false information to your internet traffic and diverting it to fake servers. This is done by redirecting the data in DNS to their IP address. </p>\n<p>DNS cache poisoning utilizes the vulnerabilities in the DNS protocols' security to divert internet traffic away from legitimate servers to the wrong address. </p>\n<p>DNS cache poisoning is effectively used for phishing attacks, often referred to as Pharming, for spreading malware. In the background, the malware runs and connects with the legitimate servers to steal sensitive information.</p>\n<p>When the DNS server is attacked, users may be requested to login into their accounts, and the attacker finds its way to steal the sensitive and financial credentials. </p>\n<p>Moreover, <a href=\"https://www.loginradius.com/blog/identity/phishing-for-identity/\">phishing attacks</a> also install viruses on the client's computer to exploit the stored data for long term access. </p>\n<h2 id=\"how-does-dns-cache-poisoning-works\" style=\"position:relative;\"><a href=\"#how-does-dns-cache-poisoning-works\" aria-label=\"how does dns cache poisoning works permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How Does DNS Cache Poisoning Works</h2>\n<p>DNS spoofing is a threat that copies the legitimate server destinations to divert the domain's traffic. Ignorant of these attacks, the users are redirected to malicious websites, which results in insensitive and personal data being leaked. </p>\n<p>It is a method of attack where your DNS server is tricked into saving a fake DNS entry. This will make the DNS server recall a fake site for you, thereby posing a threat to vital information stored on your server or computer. </p>\n<p>The cache poisoning codes are often found in URLs sent through spam emails. These emails are sent to prompt users to click on the URL, which infects their computer. </p>\n<p>When the computer is poisoned, it will divert you to a fake IP address that looks like a real thing. This way, the threats are injected into your systems as well.</p>\n<h2 id=\"what-are-the-different-stages-of-attack-of-dns-cache-poisoning\" style=\"position:relative;\"><a href=\"#what-are-the-different-stages-of-attack-of-dns-cache-poisoning\" aria-label=\"what are the different stages of attack of dns cache poisoning permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What Are the Different Stages of Attack of DNS Cache Poisoning</h2>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 60.61538461538461%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"stages-of-attack-of-DNS-cache-poisoning\"\n        title=\"stages-of-attack-of-DNS-cache-poisoning\"\n        src=\"/static/d8e06d6ae3159c7277906eada8fe5a8b/e5715/stages-of-attack-of-DNS-cache-poisoning.png\"\n        srcset=\"/static/d8e06d6ae3159c7277906eada8fe5a8b/a6d36/stages-of-attack-of-DNS-cache-poisoning.png 650w,\n/static/d8e06d6ae3159c7277906eada8fe5a8b/e5715/stages-of-attack-of-DNS-cache-poisoning.png 768w,\n/static/d8e06d6ae3159c7277906eada8fe5a8b/2bef9/stages-of-attack-of-DNS-cache-poisoning.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<ul>\n<li>First Stage</li>\n</ul>\n<p>The attacker proceeds to send DNS queries to the DNS resolver, which forwards the Root/TLD authoritative DNS server request and awaits an answer. </p>\n<ul>\n<li>Second Stage</li>\n</ul>\n<p>The attacker overloads the DNS with poisoned responses that contain several IP addresses of the malicious website. </p>\n<p>To be accepted by the DNS resolver, the attacker's response should match a port number and the query ID field before the DNS response. </p>\n<p>Also, the attackers can force its response to increasing their chance of success.</p>\n<ul>\n<li>Third Stage</li>\n</ul>\n<p>If you are a legitimate user who queries this DNS resolver, you will get a poisoned response from the cache, and you will be automatically redirected to the malicious website.</p>\n<h2 id=\"how-to-detect-dns-cache-poisoning\" style=\"position:relative;\"><a href=\"#how-to-detect-dns-cache-poisoning\" aria-label=\"how to detect dns cache poisoning permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How to Detect DNS Cache Poisoning</h2>\n<p>Now that we know what is DNS cache poisoning let's understand how to detect it. </p>\n<p>One way is to monitor the DNS server for any change in behavior patterns. Also, you can apply data security to DNS monitoring.  </p>\n<p>Another way is to look for a potential birthday attack. This occurs when there is a sudden increase in DNS activity from a single source in a single domain. When there is an increase in the DNS activity from a single source, querying your DNS server for multiple domain names without recurring shows that the attacker is looking for a DNS entry for poisoning. </p>\n<p>Monitor the file system behavior and active directory events for any abnormal activities. You can use analytics for correlating activities among three vectors to add important information to your <a href=\"https://www.loginradius.com/blog/identity/2019/10/cybersecurity-best-practices-for-enterprises/\">cybersecurity strategy</a>. </p>\n<h2 id=\"why-is-dns-cache-poisoning-dangerous-for-your-business\" style=\"position:relative;\"><a href=\"#why-is-dns-cache-poisoning-dangerous-for-your-business\" aria-label=\"why is dns cache poisoning dangerous for your business permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Why Is DNS Cache Poisoning Dangerous for Your Business</h2>\n<p>When the DNS server is poisoned, it will start spreading towards other DNS servers and home routers. Computers that lookup DNS entries will get the wrong response by causing more users to end up as victims of DNS poisoning. </p>\n<p>This issue will be resolved only when the poisoned DNS cache is cleared on each affected DNS server; you are at risk of losing your precious information until then. </p>\n<p>One of the major reasons DNS cache poisoning is highly dangerous is that it can spread from one DNS server to another. </p>\n<p><strong>Here are a few DNS poisoning attack examples-</strong></p>\n<p>A <a href=\"https://www.computerworld.com/article/2516831/china-s-great-firewall-spreads-overseas.html\">DNS poisoning event</a> had resulted in the Great Firewall of China's temporary escape from China's national borders by censoring the internet in the USA till the problem was resolved. </p>\n<p>Recently, <a href=\"https://searchsecurity.techtarget.com/answer/How-did-OurMine-hackers-use-DNS-poisoning-to-attack-WikiLeaks\">attackers</a> targeted WikiLeaks, who used a DNS Cache poisoning attack for hijacking traffic to their WikiLeaks like version. This intentional attack was created to divert the traffic away from WikiLeaks and was implemented successfully.</p>\n<h2 id=\"how-to-protect-against-dns-cache-poisoning\" style=\"position:relative;\"><a href=\"#how-to-protect-against-dns-cache-poisoning\" aria-label=\"how to protect against dns cache poisoning permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How To Protect Against DNS Cache Poisoning</h2>\n<h3 id=\"for-dns-server-providers-and-website-owners\" style=\"position:relative;\"><a href=\"#for-dns-server-providers-and-website-owners\" aria-label=\"for dns server providers and website owners permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>For DNS server providers and website owners</h3>\n<p>If you are a DNS service provider or a website owner, you have a huge responsibility for safeguarding your users by using various tools and protocols to manage the threats. </p>\n<p>Some of the resources we have specified will help you in this regard.</p>\n<ul>\n<li>Just like endpoint user security products, you can proactively use DNS spoofing detection tools to scan before you send or receive the data.</li>\n<li>Using DNSSEC (Domain Name System Security Extensions) helps to keep DNS lookup fool-proof and authentic.</li>\n<li>You can use end-to-end encryption to send DNS requests and replies. Hackers will not be able to duplicate the unique security certificate that is present on the legitimate website. </li>\n</ul>\n<p><a href=\"https://www.loginradius.com/resource/ebook/buyers-guide-to-multi-factor-authentication/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"buyer-guide-to-multi-factor-authentication-ebook\"\n        title=\"buyer-guide-to-multi-factor-authentication-ebook\"\n        src=\"/static/dce0b5caab393383c0c906c5653faa64/e5715/buyer-guide-to-multi-factor-authentication-ebook.png\"\n        srcset=\"/static/dce0b5caab393383c0c906c5653faa64/a6d36/buyer-guide-to-multi-factor-authentication-ebook.png 650w,\n/static/dce0b5caab393383c0c906c5653faa64/e5715/buyer-guide-to-multi-factor-authentication-ebook.png 768w,\n/static/dce0b5caab393383c0c906c5653faa64/63ff0/buyer-guide-to-multi-factor-authentication-ebook.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<h3 id=\"for-endpoint-users\" style=\"position:relative;\"><a href=\"#for-endpoint-users\" aria-label=\"for endpoint users permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>For endpoint users</h3>\n<p>To avoid making your users vulnerable to a DNS poisoning attack, you can use the specified tips.</p>\n<ul>\n<li>Do not click on the links that you don't recognize; these include text messages, emails, or social media links. To be safe, you can opt for entering the URL manually in the address bar.</li>\n<li>Regularly scan your computer for any malware. Your security software will help and remove any secondary infections. As the poisoned sites deliver malicious programs, you need to scan for spyware, viruses, or any other hidden issues.</li>\n<li>Flush your DNS cache to solve the problem of poisoning. Nevertheless, cache poisoning remains in your system for a long time until you clean the infected area.</li>\n<li>Use the <a href=\"https://www.loginradius.com/blog/engineering/learn-about-vdn-for-cybersecurity/\">virtual private network (VPN)</a>, a service that offers an encrypted tunnel for your web traffic. You can use a private DNS service exclusively for end-to-end encrypted requests; as a result, your servers are tougher against DNS spoofing. </li>\n</ul>\n<h2 id=\"final-thoughts\" style=\"position:relative;\"><a href=\"#final-thoughts\" aria-label=\"final thoughts permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Final Thoughts</h2>\n<p>DNS cache poisoning can be summarised as an attacker controlling the DNS server to send fake DNS responses. As a result, when the user visits the counterfeit domains, they will be directed to a new IP address selected by the hacker. </p>\n<p>This new IP address might be from a malicious phishing website, where the users are prompted to download malware, or they might be asked to provide their financial or login details. </p>\n<p>Hence, understanding what is DNS cache poisoning, how to detect it, and ways to prevent it is crucial so you can <a href=\"https://www.loginradius.com/blog/identity/2020/06/consumer-data-privacy-security/\">protect your business</a> against it. </p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-loginradius\"\n        title=\"book-a-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"January 13, 2021","updated_date":null,"description":"DNS cache poisoning is an attack that uses changed DNS records to redirect online traffic to a website that is fake and resembles its intended destination.","title":"DNS Cache Poisoning: Why Is It Dangerous for Your Business","tags":["security"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.408450704225352,"src":"/static/f31909dafa2f358eea05d48bd9c92886/9a31d/dns-cache-poisoning-is-dangerous-for-your-business.jpg","srcSet":"/static/f31909dafa2f358eea05d48bd9c92886/f836f/dns-cache-poisoning-is-dangerous-for-your-business.jpg 200w,\n/static/f31909dafa2f358eea05d48bd9c92886/2244e/dns-cache-poisoning-is-dangerous-for-your-business.jpg 400w,\n/static/f31909dafa2f358eea05d48bd9c92886/9a31d/dns-cache-poisoning-is-dangerous-for-your-business.jpg 767w","sizes":"(max-width: 767px) 100vw, 767px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},{"node":{"excerpt":"HTTP (hypertext transfer protocol) is a communication protocol that transfers data between client and server. HTTP requests are very…","fields":{"slug":"/engineering/tune-the-go-http-client-for-high-performance/"},"html":"<p>HTTP (hypertext transfer protocol) is a communication protocol that transfers data between client and server. HTTP requests are very essential to access resources from the same or remote server. In Golang, the <code>net/http</code> package comes with the default settings that we need to adjust according to our high-performance requirement.</p>\n<p>For setting up HTTP clients for making requests, most programming languages have different frameworks in place. We will take a hands-on approach in the coming sections to explore how HTTP requests can be made in Golang or Go, as I will refer to the language for the rest of the post.</p>\n<p>While working on the <a href=\"https://www.loginradius.com/blog/engineering/golang-maps/\">Golang projects</a>, I realized that improper configuration of HTTP might crash your server anytime.</p>\n<p>In the time when I was working with HTTP Client, I Observed some problems and their solutions, listed below:</p>\n<h2 id=\"problem1-default-http-client\" style=\"position:relative;\"><a href=\"#problem1-default-http-client\" aria-label=\"problem1 default http client permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Problem:1 Default Http Client</h2>\n<p>The HTTP client does not contain the request timeout setting by default.\nIf you are using http.Get(URL) or &#x26;Client{} that uses the http.DefaultClient. DefaultClient has not timeout setting; it comes with <code>no timeout</code></p>\n<p>Suppose the Rest API where you are making the request is broken, not sending the response back that keeps the connection open. More requests came, and open connection count will increase, Increasing server resources utilization, resulting in crashing your server when resource limits are reached.</p>\n<h3 id=\"solution-dont-use-the-default-http-client-always-specify-the-timeout-in-httpclient-according-to-your-use-case\" style=\"position:relative;\"><a href=\"#solution-dont-use-the-default-http-client-always-specify-the-timeout-in-httpclient-according-to-your-use-case\" aria-label=\"solution dont use the default http client always specify the timeout in httpclient according to your use case permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Solution: Don't use the default HTTP client, always specify the timeout in http.Client according to your use case</h3>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"\" data-index=\"0\"><code class=\"grvsc-code\"><span class=\"grvsc-line\">var httpClient = &http.Client{</span>\n<span class=\"grvsc-line\">  Timeout: time.Second * 10,</span>\n<span class=\"grvsc-line\">}</span></code></pre>\n<p>For the Rest API, it is recommended that timeout should not more than 10 seconds.\nIf the Requested resource is not responded to in 10 seconds, the HTTP connection will be canceled with net/http: request canceled (Client.Timeout exceeded ...) error.</p>\n<h2 id=\"problem2-default-http-transport\" style=\"position:relative;\"><a href=\"#problem2-default-http-transport\" aria-label=\"problem2 default http transport permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Problem:2 Default Http Transport</h2>\n<p>By default, the Golang Http client performs the connection pooling. When the request completes, that connection remains open until the idle connection timeout (default is 90 seconds). If another request came, that uses the same established connection instead of creating a new connection, after the idle connection time, the connection will return to the pool.</p>\n<p>Using the connection pooling will keep less connection open and more requests will be served with minimal server resources.</p>\n<p>When we not defined transport in the http.Client, it uses the default transport <a href=\"https://golang.org/src/net/http/transport.go\">Go HTTP Transport</a></p>\n<p>Default configuration of the HTTP Transport, </p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"\" data-index=\"1\"><code class=\"grvsc-code\"><span class=\"grvsc-line\">var DefaultTransport RoundTripper = &Transport{</span>\n<span class=\"grvsc-line\">\t...</span>\n<span class=\"grvsc-line\">\tMaxIdleConns:          100,</span>\n<span class=\"grvsc-line\">\tIdleConnTimeout:       90 * time.Second,</span>\n<span class=\"grvsc-line\">\t...</span>\n<span class=\"grvsc-line\">}</span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\">const DefaultMaxIdleConnsPerHost = 2</span></code></pre>\n<p>MaxIdleConns is the connection pool size, and this is the maximum connection that can be open; its default value is 100 connections.</p>\n<p>There is problem with the default setting <code>DefaultMaxIdleConnsPerHost</code> with value of 2 connection,\nDefaultMaxIdleConnsPerHost is the number of connection can be allowed to open per host basic.\nMeans for any particular host out of 100 connection from the connection pool only two connection will be allocated to that host.</p>\n<p>With the more request came, it will process only two requests; other requests will wait for the connection to communicate with the host server and go in the <code>TIME_WAIT</code> state. As more request came, increase the connection to the <code>TIME_WAIT</code> state and increase the server resource utilization; at the limit, the server will crash.</p>\n<h3 id=\"solution-dont-use-default-transport-and-increase-maxidleconnsperhost\" style=\"position:relative;\"><a href=\"#solution-dont-use-default-transport-and-increase-maxidleconnsperhost\" aria-label=\"solution dont use default transport and increase maxidleconnsperhost permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Solution: Don't use Default Transport and increase MaxIdleConnsPerHost</h3>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"\" data-index=\"2\"><code class=\"grvsc-code\"><span class=\"grvsc-line\">t := http.DefaultTransport.(*http.Transport).Clone()</span>\n<span class=\"grvsc-line\">t.MaxIdleConns = 100</span>\n<span class=\"grvsc-line\">t.MaxConnsPerHost = 100</span>\n<span class=\"grvsc-line\">t.MaxIdleConnsPerHost = 100</span>\n<span class=\"grvsc-line\">\t</span>\n<span class=\"grvsc-line\">httpClient = &http.Client{</span>\n<span class=\"grvsc-line\">  Timeout:   10 * time.Second,</span>\n<span class=\"grvsc-line\">  Transport: t,</span>\n<span class=\"grvsc-line\">}</span></code></pre>\n<p>By increasing connection per host and the total number of idle connection, this will increase the performance and serve more request with minimal server resources.</p>\n<p>Connection pool size and connection per host count can be increased as per server resources and requirements.</p>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>In this article, we discussed the problems around the 'net/http' client default configurations. By changing some of the default settings of HTTP Client, we can achieve a High-performance HTTP client for production use. If you want to learn more about http, here is an interesting post on <a href=\"https://www.loginradius.com/blog/engineering/http-security-headers/\">HTTP security headers</a> If you like what you read, share your thoughts in the comment section.</p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n  .dark-default-dark {\n    background-color: #1E1E1E;\n    color: #D4D4D4;\n  }\n</style>","frontmatter":{"date":"January 12, 2021","updated_date":null,"description":"In this post, we will discuss how to make HTTP requests for higher performance in Go, and also how to tune it.","title":"How to Use the HTTP Client in GO To Enhance Performance","tags":["Golang","HTTP","Performance"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.7699115044247788,"src":"/static/68276d4b4277ad09e329598038e91917/14b42/index.jpg","srcSet":"/static/68276d4b4277ad09e329598038e91917/f836f/index.jpg 200w,\n/static/68276d4b4277ad09e329598038e91917/2244e/index.jpg 400w,\n/static/68276d4b4277ad09e329598038e91917/14b42/index.jpg 800w,\n/static/68276d4b4277ad09e329598038e91917/47498/index.jpg 1200w,\n/static/68276d4b4277ad09e329598038e91917/ec6c5/index.jpg 1280w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Mayank Agarwal","github":"mayankagrwal","avatar":null}}}},{"node":{"excerpt":"Introduction How to set up 2FA on your accounts? And why is it important in the first place? As social media is becoming increasingly…","fields":{"slug":"/identity/how-to-setup-2fa-in-online-accounts/"},"html":"<h2 id=\"introduction\" style=\"position:relative;\"><a href=\"#introduction\" aria-label=\"introduction permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Introduction</h2>\n<p>How to set up 2FA on your accounts? And why is it important in the first place? As social media is becoming increasingly popular, security is becoming something of supreme importance. </p>\n<p>Even though choosing a <a href=\"https://www.loginradius.com/blog/identity/2021/01/how-to-choose-a-secure-password/\">strong password</a> helps you in certain ways, by adopting 2FA, you can improve and enhance security further. So, let's know more about this extra layer of protection and how to set up 2FA on your accounts. </p>\n<p>First stop. </p>\n<h2 id=\"what-is-two-factor-authentication\" style=\"position:relative;\"><a href=\"#what-is-two-factor-authentication\" aria-label=\"what is two factor authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>What is Two-Factor Authentication?</strong></h2>\n<p>2FA is one of the best security methods that use two layers to verify a consumer's identity. This means, rather than simply entering the password to log into an account, two-factor authentication requires a code to be sent via text message to the consumer's phone number or generated through an app.</p>\n<p>This type of verification code helps and ensures that only the authorized consumer can access their account. Similarly, <a href=\"https://www.loginradius.com/blog/identity/2019/06/what-is-multi-factor-authentication/\">multi-factor authentication (MFA)</a> offers two or more authentication layers to approve account access for consumers. </p>\n<h2 id=\"types-of-2fa-methods\" style=\"position:relative;\"><a href=\"#types-of-2fa-methods\" aria-label=\"types of 2fa methods permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Types of 2FA Methods</h2>\n<p>SMS Verification is one of the most common forms of 2FA. It involves sending a one-time code via text message to the user's registered phone number. While widely accessible and requiring no internet connection, it is vulnerable to SIM swapping attacks and relies on the reliability of the cellular network.</p>\n<p>Authenticator Apps, such as Google Authenticator, Microsoft Authenticator, and Authy, generate time-based codes for authentication. These apps provide offline functionality, making them useful in areas with no network coverage. They are also less susceptible to phishing attacks compared to SMS. However, they require installation and setup on a smartphone, and there is a risk of losing access if the device is lost or reset.</p>\n<p>Hardware Tokens, like YubiKey or RSA SecurID, are physical devices that generate codes for authentication. They offer a high level of security since they are not connected to the internet, providing protection against phishing attacks. However, they can be costly to implement for individuals, and there is a risk of losing the hardware token.</p>\n<p>Biometric Authentication uses features like fingerprint, face, or iris scans for verification. It offers convenience and a high level of security. However, it requires compatible devices and there is a risk of compromising biometric data.</p>\n<p>Backup Codes are pre-generated codes used as a backup when the primary 2FA method is unavailable. They provide access in emergencies but are limited in use and must be securely stored to prevent unauthorized access.</p>\n<h2 id=\"what-are-authenticator-apps\" style=\"position:relative;\"><a href=\"#what-are-authenticator-apps\" aria-label=\"what are authenticator apps permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>What are Authenticator Apps?</strong></h2>\n<p>Authenticator apps are meant to be installed on your smartphones to obtain passcodes to sign in to your accounts. They are intended to be more secure than texting; they provide<a href=\"https://www.loginradius.com/blog/identity/2018/12/use-multi-factor-authentication-dont-cell-phone-access/\"> flexibility if you are traveling to a place where there is no mobile service</a>.</p>\n<p>Some of the options include <a href=\"https://support.google.com/accounts/answer/1066447\">Google Authenticator</a>, <a href=\"https://authy.com/guides/microsoft/\">Microsoft Authenticator Authy</a>, or HDE OTP. </p>\n<p>All these apps follow the same procedure - when you are adding a new user account, you need to scan a QR code associated with the account, and it is saved in the app. </p>\n<p>The next time you sign in to your app or service, it will ask for a numerical code. You need to open up the authenticator app and check the randomly generated authentication code to access your account securely.</p>\n<h2 id=\"how-to-set-up-2fa-on-your-social-media-accounts\" style=\"position:relative;\"><a href=\"#how-to-set-up-2fa-on-your-social-media-accounts\" aria-label=\"how to set up 2fa on your social media accounts permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>How to Set up 2FA on Your Social Media Accounts?</strong></h2>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 60.61538461538461%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"how-to-set-up-2fa-on-your-social-media-accounts\"\n        title=\"how-to-set-up-2fa-on-your-social-media-accounts\"\n        src=\"/static/273ab25be8c7050b176fa9b264da745a/e5715/how-to-set-up-2fa-on-your-social-media-accounts.png\"\n        srcset=\"/static/273ab25be8c7050b176fa9b264da745a/a6d36/how-to-set-up-2fa-on-your-social-media-accounts.png 650w,\n/static/273ab25be8c7050b176fa9b264da745a/e5715/how-to-set-up-2fa-on-your-social-media-accounts.png 768w,\n/static/273ab25be8c7050b176fa9b264da745a/2bef9/how-to-set-up-2fa-on-your-social-media-accounts.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>A lot of applications offer 2FA currently, especially if you are storing important and sensitive data, financial information, emails, social media, files, contact details, etc. </p>\n<p>2FA needs more than one factor to login. This might include parameters like \"something you are,\" for example, biometrics in the form of iris scan or fingerprints, \"something you know,\" a password, and \"something you have,\" like a smartphone or hardware key. </p>\n<p>Find out how to set up 2FA on your accounts: </p>\n<h3 id=\"1-google\" style=\"position:relative;\"><a href=\"#1-google\" aria-label=\"1 google permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. Google</h3>\n<p>If you want to set up an authenticator on the Google account, first you need to download the Google Authenticator app available on the Play Store. Once downloaded, do the following:</p>\n<ul>\n<li>Go to Gmail and click the profile icon.</li>\n<li>Choose My account and click on Sign-in &#x26; Security. </li>\n</ul>\n<p>You can add the two-<strong>step verification</strong> process here.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 640px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 62.5%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAANCAIAAAAmMtkJAAAACXBIWXMAAAsTAAALEwEAmpwYAAACGklEQVQoz42QTWsTQRjH+yUsHv0OIqhXhaIeJNJDD2o8FKTaD9CbiIgHra0gWj15KVXbCrHbVEFarFViQexLEpJUTbLJbpLNvO7rzM4m42ysxaJg//xnGHie3/wfnr5Op0MIMQyj1WrVarWqrgMA6oaZuHT1VOLiwODlM0PDiSujyueT1wcGkxeSI2eHhmdTi1LKPgVTSn+Uy2ZPlUrVahhb34xjj+uHJ2j/ODr6yDz5tHniSeP4lHHkAei/jw/da0++b+7CjuMsaFqpp0wmk8tm1798XSmiVT1aKfO1Kl/T+SedKX+s8uWyWNphhTqK4W43Tp6emcnmcgghNTkiVLjk2TpIvvZG0/Y1jY5oJDHvn5tlp5/zsXfuqw2gN9Gv5Mhx3Xyh1Gy1eRgxLlgoCEafd6z5TZjasLRt8LbgLBY9reinCv6Hir9dt00LxrAQkeC+lKHsMCm5lJFUr8Ah7WallP2e37SMiqp2hS+j2F0RcN9BsAer7tV8cDvFJtJsPM0n3/CpZfFwieiGZTYaVb1mAWg77p7VmIRSsAcvb7lj0+jmS3TjBbo1h+6m8J25htGCYcj8noL98jwPwt9jh8wVPmQO4C5kLgwcSKGJMRJCMMb4X1L8LhxFUfwbY+rEjttDABHG+P9wvG2PAcIQZdhmyGZeEBKCMSEK5v/SvmTb8TD1iO1RO749P64dKLnbk/zTUrpqpQdI/glHxa6UvpsTvgAAAABJRU5ErkJggg=='); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"how-to-setup-2fa-in-google\"\n        title=\"how-to-setup-2fa-in-google\"\n        src=\"/static/c0bacbd3e54b16138246bdaa360c4e57/6af66/how-to-setup-2fa-in-google.png\"\n        srcset=\"/static/c0bacbd3e54b16138246bdaa360c4e57/6af66/how-to-setup-2fa-in-google.png 640w\"\n        sizes=\"(max-width: 640px) 100vw, 640px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>Source: Google</p>\n<h3 id=\"2-snapchat\" style=\"position:relative;\"><a href=\"#2-snapchat\" aria-label=\"2 snapchat permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. Snapchat</h3>\n<p>To set up 2FA on your Snapchat account, you will need to:</p>\n<ul>\n<li>Go to the app’s main camera screen and tap on the profile icon. </li>\n<li>Find the gear icon to access Settings.</li>\n<li>Tap on Two-Factor Authentication and choose whether to obtain verification via a text message or an authenticator app. </li>\n</ul>\n<p>You can add trusted devices or request a recovery code for when you intend to be somewhere without cellular coverage once 2FA has been activated on your Snapchat account. Safety key logins do not currently appear to be supported by Snapchat.</p>\n<h3 id=\"3-whatsapp\" style=\"position:relative;\"><a href=\"#3-whatsapp\" aria-label=\"3 whatsapp permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3. Whatsapp</h3>\n<p>To set up 2FA on your WhatsApp account, you will need to:</p>\n<ul>\n<li>Open WhatsApp on your device. </li>\n<li>Under the upper-right hamburger icon, find the Settings menu.</li>\n<li>Go to Look under Account > Two-step verification > Allow.</li>\n<li>You will be prompted to end a six-digit PIN to verify your account. If you forget your PIN, you can optionally add an email address.  </li>\n</ul>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 512px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 71.2890625%; position: relative; bottom: 0; left: 0; background-image: url('data:image/jpeg;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"how-to-set-up-2fa-in-whatsapp\"\n        title=\"how-to-set-up-2fa-in-whatsapp\"\n        src=\"/static/fc235cf472e72141128d2d15ca80f1f6/36dd4/how-to-set-up-2fa-in-whatsapp.jpg\"\n        srcset=\"/static/fc235cf472e72141128d2d15ca80f1f6/36dd4/how-to-set-up-2fa-in-whatsapp.jpg 512w\"\n        sizes=\"(max-width: 512px) 100vw, 512px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>Source: lifewire</p>\n<p>It is important to have an associated email with your WhatsApp account as the service will not allow you to reverify yourself if you have used WhatsApp and forgotten your PIN within the last seven days. </p>\n<h3 id=\"4-outlook\" style=\"position:relative;\"><a href=\"#4-outlook\" aria-label=\"4 outlook permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>4. Outlook</h3>\n<p>To set up 2FA on your Outlook account, you will need to:</p>\n<ul>\n<li>Sign in to your Outlook account.</li>\n<li>Click on your name and then click View Account. </li>\n<li>Under the Basic Options, click on the link that says Explore more security options.</li>\n</ul>\n<p>If you have not set up 2FA yet, you can click on the link and proceed with that. You can switch to Microsoft Authenticator by clicking the Set up identity verification app if you already have it.</p>\n<h3 id=\"5-facebook\" style=\"position:relative;\"><a href=\"#5-facebook\" aria-label=\"5 facebook permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>5. Facebook</h3>\n<p>To set up 2FA on your Facebook account, you will need to:</p>\n<ul>\n<li>Sign in to your Facebook account.</li>\n<li>Click on Settings and choose Security and Login.</li>\n<li>Check for the use of two-factor authentication in the Setting Up Extra Security section. </li>\n<li>Enable the code generator.</li>\n</ul>\n<p>You can also use the Facebook mobile app for approving sign-ins on the web or set up a third-party authentication app for generating codes.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 512px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 66.6015625%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"how-to-set-up-2fa-in-facebook\"\n        title=\"image_tooltip\"\n        src=\"/static/da495ad00f525f0905f9a856f515fa59/01e7c/how-to-set-up-2fa-in-facebook.png\"\n        srcset=\"/static/da495ad00f525f0905f9a856f515fa59/01e7c/how-to-set-up-2fa-in-facebook.png 512w\"\n        sizes=\"(max-width: 512px) 100vw, 512px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>Source: Facebook</p>\n<h3 id=\"6-twitter\" style=\"position:relative;\"><a href=\"#6-twitter\" aria-label=\"6 twitter permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>6. Twitter</h3>\n<p>To set up 2FA on your Twitter account, you will need to:</p>\n<ul>\n<li>Sign in to your Twitter account.</li>\n<li>Click on your Profile Icon and then click Settings and Privacy.</li>\n<li>Click the checkbox next to Verify login requests, under the Security heading.</li>\n<li>Verify your mobile number and then click Set up a code generator app. </li>\n<li>Scan the QR code with the third-party authenticator app. </li>\n</ul>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 53.07692307692308%; position: relative; bottom: 0; left: 0; background-image: url('data:image/jpeg;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"how-to-set-up-2fa-in-twitter\"\n        title=\"how-to-set-up-2fa-in-twitter\"\n        src=\"/static/0b4ba884ab0cedb6ce56d12f2efdf4d4/212bf/how-to-set-up-2fa-in-twitter.jpg\"\n        srcset=\"/static/0b4ba884ab0cedb6ce56d12f2efdf4d4/6aca1/how-to-set-up-2fa-in-twitter.jpg 650w,\n/static/0b4ba884ab0cedb6ce56d12f2efdf4d4/212bf/how-to-set-up-2fa-in-twitter.jpg 768w,\n/static/0b4ba884ab0cedb6ce56d12f2efdf4d4/6c74b/how-to-set-up-2fa-in-twitter.jpg 915w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<h3 id=\"7-apple-icloud\" style=\"position:relative;\"><a href=\"#7-apple-icloud\" aria-label=\"7 apple icloud permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>7. Apple iCloud</h3>\n<ul>\n<li>You can log in to your account at <a href=\"https://appleid.apple.com/\">appleid</a>, then search for Two-Factor Authentication under Security.</li>\n<li>The next step would be to verify your location, and it will send a code to your other Apple devices.</li>\n<li><strong>iOS</strong></li>\n</ul>\n<p>To set up 2FA on your iOS account, the steps will be a bit different. Majorly, it will depend on how you have updated your iOS software. </p>\n<ul>\n<li>For users using iOS 10.3 or later versions, click on Settings > your Name > Password &#x26; Security. </li>\n<li>You can turn on 2FA to receive a text message with a code every time you log in. </li>\n</ul>\n<p>For users using iOS 10.2 or earlier versions, go to Settings under iCloud > Apple ID > Password &#x26; Security.</p>\n<ul>\n<li><strong>macOS</strong></li>\n</ul>\n<p>Similar to iOS, a few of the steps may vary depending on the version of macOS.</p>\n<ul>\n<li>If you are using Catalina, click the Apple icon, then click System Preferences > Apple ID. </li>\n<li>The next step would be to click on Password &#x26; Security under your name and finally click Turn On Two-Factor Authentication.</li>\n</ul>\n<h3 id=\"8-instagram\" style=\"position:relative;\"><a href=\"#8-instagram\" aria-label=\"8 instagram permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>8. Instagram</h3>\n<p>In 2017, two-factor authentication was added by Instagram to the mobile app, which can be activated via the web. If you want to activate 2FA on your mobile device, you need to go to Profile and click on the menu and look for Settings &#x26; Security. There you will find two-factor authentication. </p>\n<p>With Instagram, you also get to choose between SMS-based verification and a code sent to the authentication app. </p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 60%; position: relative; bottom: 0; left: 0; background-image: url('data:image/jpeg;base64,/9j/2wBDABALDA4MChAODQ4SERATGCgaGBYWGDEjJR0oOjM9PDkzODdASFxOQERXRTc4UG1RV19iZ2hnPk1xeXBkeFxlZ2P/2wBDARESEhgVGC8aGi9jQjhCY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2P/wgARCAAMABQDASIAAhEBAxEB/8QAGAAAAgMAAAAAAAAAAAAAAAAAAAMBAgX/xAAUAQEAAAAAAAAAAAAAAAAAAAAB/9oADAMBAAIQAxAAAAHdiqkeMB//xAAZEAEAAgMAAAAAAAAAAAAAAAACAQMAEBH/2gAIAQEAAQUC2p4a7JSz/8QAFBEBAAAAAAAAAAAAAAAAAAAAEP/aAAgBAwEBPwE//8QAFREBAQAAAAAAAAAAAAAAAAAAEBH/2gAIAQIBAT8Bh//EABcQAAMBAAAAAAAAAAAAAAAAAAABEBH/2gAIAQEABj8CrMc//8QAGxAAAgIDAQAAAAAAAAAAAAAAAAERIRAxQYH/2gAIAQEAAT8hWjwmOMa4uFWNTWP/2gAMAwEAAgADAAAAEOcv/8QAFxEBAAMAAAAAAAAAAAAAAAAAARARIf/aAAgBAwEBPxBdqP/EABYRAQEBAAAAAAAAAAAAAAAAAAEREP/aAAgBAgEBPxAouf/EABoQAQEBAQADAAAAAAAAAAAAAAERACEQMWH/2gAIAQEAAT8Qu6E1pye5fI/0MTZRS52BD1PH/9k='); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"how-to-set-up-2fa-in-instagram\"\n        title=\"image_tooltip\"\n        src=\"/static/5933cb3ce0455c2d21e3264192832e1c/212bf/how-to-set-up-2fa-in-instagram.jpg\"\n        srcset=\"/static/5933cb3ce0455c2d21e3264192832e1c/6aca1/how-to-set-up-2fa-in-instagram.jpg 650w,\n/static/5933cb3ce0455c2d21e3264192832e1c/212bf/how-to-set-up-2fa-in-instagram.jpg 768w,\n/static/5933cb3ce0455c2d21e3264192832e1c/00cd3/how-to-set-up-2fa-in-instagram.jpg 1460w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>Source: Kaspersky</p>\n<h2 id=\"why-is-2fa-important\" style=\"position:relative;\"><a href=\"#why-is-2fa-important\" aria-label=\"why is 2fa important permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>Why is 2FA important?</strong></h2>\n<p>As cybercriminals are getting smarter, 2FA has become more mandatory than ever. Without it, you might end up leaving your <a href=\"https://www.loginradius.com/blog/identity/2020/12/login-security/\">accounts vulnerable to hackers</a> for sealing your personal information, hacking your online credit card details, and accessing your bank account. By adding the additional step to your account, you get the edge to prevent hackers from accessing your account. </p>\n<h2 id=\"common-2fa-mistakes-to-avoid\" style=\"position:relative;\"><a href=\"#common-2fa-mistakes-to-avoid\" aria-label=\"common 2fa mistakes to avoid permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Common 2FA Mistakes to Avoid</h2>\n<p>Using SMS as the Sole Method is a common mistake, as SMS codes are vulnerable to interception through SIM swapping attacks. It is advised to use authenticator apps or hardware tokens for added security.</p>\n<p>Not Storing Backup Codes Securely renders them useless if lost or compromised. It is crucial to store backup codes in a secure location, such as a password manager or a locked safe.</p>\n<p>Using Predictable Codes is another mistake, as codes generated by apps can be predictable if not set up correctly. It is important to ensure apps are configured for random, time-based codes rather than sequential ones.</p>\n<p>Ignoring Biometric 2FA Options is a missed opportunity for added security. Biometric methods offer high security but may not be utilized if available on devices.</p>\n<p>Sharing 2FA Codes undermines the purpose of 2FA. Users should be educated not to share codes with anyone, including family and friends, to maintain security.</p>\n<h2 id=\"comparison-of-popular-authenticator-apps\" style=\"position:relative;\"><a href=\"#comparison-of-popular-authenticator-apps\" aria-label=\"comparison of popular authenticator apps permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Comparison of Popular Authenticator Apps</h2>\n<p>Google Authenticator is known for its simple setup with QR codes and offline functionality. However, it lacks backup or sync options and does not support multi-device use.</p>\n<p>Microsoft Authenticator supports both Microsoft accounts and third-party apps. It offers cloud backup for easy recovery. However, it requires a Microsoft account and may not be as straightforward for non-Microsoft services.</p>\n<p>Authy provides multi-device support and offers cloud backup and sync for easy recovery. However, it requires an account for backup, and some users prefer fully offline solutions.</p>\n<p>HDE OTP (One-Time Password) is secure and easy-to-use, working offline for added convenience. However, it is less widely adopted than other options and offers limited additional features.</p>\n<p>YubiKey, a Hardware Token, boasts high-security standards and does not rely on mobile devices. However, it can be costly for individual users and poses a risk of being lost or damaged.</p>\n<p>Users can consider these factors when choosing the most suitable authenticator app based on their needs for security, convenience, and compatibility with various services.</p>\n<h2 id=\"setting-up-2fa-login-with-loginradius-adaptive-2fa-mfa-solution\" style=\"position:relative;\"><a href=\"#setting-up-2fa-login-with-loginradius-adaptive-2fa-mfa-solution\" aria-label=\"setting up 2fa login with loginradius adaptive 2fa mfa solution permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>Setting Up 2FA Login with LoginRadius Adaptive 2FA/ MFA solution</strong></h2>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 54.61538461538461%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"setting-up-2fa-with-loginradius\"\n        title=\"setting-up-2fa-with-loginradius\"\n        src=\"/static/64f8c8444cfce867e34a035922061380/e5715/setting-up-2fa-with-loginradius.png\"\n        srcset=\"/static/64f8c8444cfce867e34a035922061380/a6d36/setting-up-2fa-with-loginradius.png 650w,\n/static/64f8c8444cfce867e34a035922061380/e5715/setting-up-2fa-with-loginradius.png 768w,\n/static/64f8c8444cfce867e34a035922061380/d0143/setting-up-2fa-with-loginradius.png 1025w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>LoginRadius provides multi-factor authentication via SMS, email, automated phone calls, account <a href=\"https://www.loginradius.com/blog/identity/2019/01/best-practices-choosing-good-security-questions/\">security questions</a>, and authenticator apps to allow you a customized user experience.  </p>\n<p>Based on your business, you can choose to use LoginRadius's Identity Platform's Multi-factor authentication, which is an easy process. </p>\n<p>Currently, LoginRadius provides its support authentication methods via SMS workflow and Google Authenticator workflow.</p>\n<h3 id=\"for-sms-workflow\" style=\"position:relative;\"><a href=\"#for-sms-workflow\" aria-label=\"for sms workflow permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>For SMS Workflow</h3>\n<p>You can enable 2FA <a href=\"https://www.loginradius.com/docs/api/v2/customer-identity-api/multi-factor-authentication/sms-authenticator/mfa-validate-otp/\">SMS verification</a> from the LoginRadius admin console. There's also an option to choose your preferred SMS template and SMS provider.</p>\n<p>As the first step, you'll need to apply a first verification factor, like standard email and password login, username and password, automated phone call, or access token. The second factor can be a one-time password or code sent via SMS. </p>\n<p><a href=\"https://www.loginradius.com/resource/ebook/buyers-guide-to-multi-factor-authentication/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"buyer-guide-to-multi-factor-authentication-ebook\"\n        title=\"buyer-guide-to-multi-factor-authentication-ebook\"\n        src=\"/static/dce0b5caab393383c0c906c5653faa64/e5715/buyer-guide-to-multi-factor-authentication-ebook.png\"\n        srcset=\"/static/dce0b5caab393383c0c906c5653faa64/a6d36/buyer-guide-to-multi-factor-authentication-ebook.png 650w,\n/static/dce0b5caab393383c0c906c5653faa64/e5715/buyer-guide-to-multi-factor-authentication-ebook.png 768w,\n/static/dce0b5caab393383c0c906c5653faa64/63ff0/buyer-guide-to-multi-factor-authentication-ebook.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<h3 id=\"google-authenticator-workflow\" style=\"position:relative;\"><a href=\"#google-authenticator-workflow\" aria-label=\"google authenticator workflow permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Google Authenticator Workflow</h3>\n<p>For enabling Google Authenticator, the <a href=\"https://www.loginradius.com/integrations/google-authenticator/\">first step will be</a> to set up your ID in the admin console for Google to identify your website or application on the authenticator.</p>\n<p>Next, you will need to set up your QR code specifications or make MFA mandatory. </p>\n<p>Similar to the SMS workflow, you can select standard email and password login, username, password, automated phone call, or access token as the verification factor.</p>\n<h2 id=\"final-thoughts\" style=\"position:relative;\"><a href=\"#final-thoughts\" aria-label=\"final thoughts permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Final Thoughts</h2>\n<p>With <a href=\"https://www.loginradius.com/blog/identity/2019/10/cybersecurity-attacks-business/\">cybercrimes on the rise</a>, it is essential to make your online security measures more robust. Hence, to protect your account and the history, you need to learn how to set up 2fa login on your accounts for an additional safety cover. It not only protects your online social accounts but other accounts as well.</p>\n<h2 id=\"faqs\" style=\"position:relative;\"><a href=\"#faqs\" aria-label=\"faqs permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>FAQs</h2>\n<p><strong>1. How do I enable 2FA login?</strong></p>\n<p>2FA login can be enabled once you have a reliable identity management solution. In the system dashboard, under authentication, you can find 2FA and enable the same.</p>\n<p><strong>2. How do I activate my 2FA code?</strong></p>\n<p>Choose your method (SMS or authenticator app) during setup, then link the code to your account.</p>\n<p><strong>3. What is 2FA and how do you set it up?</strong></p>\n<p>2FA adds a second verification step (like a code from an app). Set it up by downloading an authenticator app, scanning a QR code, and entering the code generated.</p>\n<p><strong>4. Is 2FA easy to use?</strong></p>\n<p>Yes, 2FA is user-friendly. It involves entering a code or approving a notification on your phone during logins.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-loginradius\"\n        title=\"book-a-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"January 12, 2021","updated_date":null,"description":"2FA is one of the best security methods that use two layers to verify a consumer’s identity. This means, rather than simply entering the password to log into an account, two-factor authentication requires a code to be sent via text message to a consumer's phone number or generated through an app","title":"How to Set Up Two-factor Authentication on All Your Online Accounts?","tags":["2fa","mfa","cx"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.408450704225352,"src":"/static/77348c75b6cf25e28b8f7f2daf5442b2/9a31d/how-to-setup-2fa-online-accounts.jpg","srcSet":"/static/77348c75b6cf25e28b8f7f2daf5442b2/f836f/how-to-setup-2fa-online-accounts.jpg 200w,\n/static/77348c75b6cf25e28b8f7f2daf5442b2/2244e/how-to-setup-2fa-online-accounts.jpg 400w,\n/static/77348c75b6cf25e28b8f7f2daf5442b2/9a31d/how-to-setup-2fa-online-accounts.jpg 767w","sizes":"(max-width: 767px) 100vw, 767px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},{"node":{"excerpt":"Fundamentally, digital transformation is the accumulation of modern tools and processes to solve market challenges and provides…","fields":{"slug":"/identity/what-is-digital-transformation/"},"html":"<p>Fundamentally, digital transformation is the accumulation of modern tools and processes to solve market challenges and provides possibilities for upbeat consumer intimacy.</p>\n<p>When it comes to businesses, every era brings its own <em>buzzword</em>. </p>\n<p>For example, for the '90s, it was the internet. Towards the beginning of this century, it was social media. And now, it's digital transformation. </p>\n<p>Companies need to gear up and leverage technologies to satisfy their employees and consumers today. </p>\n<p>We can further gauge the importance of organizations having to invest in new-age transformation, when former Executive Chairman of Cisco System, <a href=\"https://www.linkedin.com/in/johnchambersjc?challengeId=AQGj82b-dklBrwAAAXbhY6du4U1xpb-eEQscCsXGTjVf1-tgV8O429bPJ6qulSCN0WBxVHl9o5Yd8iLIunNKF65tAy_kvO9Jzg&#x26;submissionId=e49444cc-aa38-5816-7489-798dda357e18\">John Chambers</a> stated, \"At least 40% of all businesses will die by 2025, if they don't figure out how to change their entire company to accommodate new technologies.\" </p>\n<p>But despite such affirmatives, digital transformation has a long way to go. In this blog, we have summarized its importance for organizations, what has changed during the pandemic, and what to look forward to in 2021. </p>\n<p>Let's start with the definition.</p>\n<h2 id=\"what-is-digital-transformation\" style=\"position:relative;\"><a href=\"#what-is-digital-transformation\" aria-label=\"what is digital transformation permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is Digital Transformation</h2>\n<p>Digital transformation is the process of leveraging digital technology to develop new business processes and consumer experiences to meet the changing market dynamics or to alter the existing ones. </p>\n<p>Beyond that, it is also an aggregation of cultural change that expects companies to experiment often and not get demotivated when new practices and not accepted in public. </p>\n<p>However, note that every company reimagines transformation differently. It isn't easy to define a concept that applies to all. </p>\n<p>You can start by outlining your organization's problem statement, opportunities, and goals. In most cases, that revolves around:</p>\n<ul>\n<li>Utilizing digital technologies</li>\n<li>Reducing friction</li>\n<li>Increasing productivity</li>\n<li>Improving consumer experience </li>\n<li>Elevating the scope of profitability</li>\n</ul>\n<p>Digital transformation is interconnected. One innovation leads to another. So when process improvements happen, it leads to better product and service gains. When consumers grow accustomed to those changes, they demand more, and the cycle continues.</p>\n<p>All-in-all, you need to understand what digital transformation really means for your organization and what you should do to articulate it.</p>\n<h2 id=\"why-is-digital-transformation-crucial-for-enterprises\" style=\"position:relative;\"><a href=\"#why-is-digital-transformation-crucial-for-enterprises\" aria-label=\"why is digital transformation crucial for enterprises permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Why is Digital Transformation Crucial for Enterprises</h2>\n<p><a href=\"https://www.loginradius.com/blog/identity/2018/11/enterprise-needs-digital-business-transformation-strategy/\">Organizations may idealize</a> digital transformation for many reasons. But the most likely explanation has to be <em>survival</em>. </p>\n<p>Think of it this way. The more simplicity you bring for consumers, the more likely are your chances of survival. </p>\n<p>The <a href=\"https://info.themanufacturer.com/amr-2020\">Annual Manufacturing Report 2020</a> showcases that senior manufacturing executives are clearly prioritizing digital transformation. The finding shows: </p>\n<ul>\n<li>87% of companies prefer digital technologies for future prosperity.</li>\n<li>89% of companies acknowledge how digital technologies improve their inbound and outbound supply chain relationships.</li>\n<li>91% of companies agree that digitalization has made their employees more productive.</li>\n<li>87% of companies find that digital technology has further accelerated innovation. </li>\n<li>66% of companies are already considering cloud computing, and 63% are inclining towards automation. </li>\n<li>Almost one in two businesses are implementing some form of cybersecurity policies. </li>\n</ul>\n<p>The world of business is changing. Organizations are willing to experiment, adopt, and adapt to new technologies. </p>\n<p>So, where do you stand? Are you still going traditional? </p>\n<p>Are you developers migrating to the cloud environment? Are you already making technological decisions? Or are you still waiting for a wake-up call? </p>\n<p>Wherever you are... START! </p>\n<h2 id=\"has-digital-transformation-changed-with-the-covid-19-pandemic\" style=\"position:relative;\"><a href=\"#has-digital-transformation-changed-with-the-covid-19-pandemic\" aria-label=\"has digital transformation changed with the covid 19 pandemic permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Has Digital Transformation Changed With the COVID-19 Pandemic</h2>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 60.61538461538461%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"digital-transformation-changed-with-covid-19-pandemic\"\n        title=\"digital-transformation-changed-with-covid-19-pandemic\"\n        src=\"/static/1d52789e76a4c88d76c71caea01b9e1d/e5715/digital-transformation-changed-with-covid-19-pandemic.png\"\n        srcset=\"/static/1d52789e76a4c88d76c71caea01b9e1d/a6d36/digital-transformation-changed-with-covid-19-pandemic.png 650w,\n/static/1d52789e76a4c88d76c71caea01b9e1d/e5715/digital-transformation-changed-with-covid-19-pandemic.png 768w,\n/static/1d52789e76a4c88d76c71caea01b9e1d/2bef9/digital-transformation-changed-with-covid-19-pandemic.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>The answer is <em>yes</em>. The COVID-19 pandemic has pushed businesses over the \"technology\" edge forever. </p>\n<p>According to <a href=\"https://www.mckinsey.com/business-functions/strategy-and-corporate-finance/our-insights/how-covid-19-has-pushed-companies-over-the-technology-tipping-point-and-transformed-business-forever#\">McKinsey Global Survey</a>, the virus has accelerated the digitization of consumer and supply-chain interactions by three to four years. Also, the share of companies digitally-enabling product manufacture has accelerated by seven years.</p>\n<p>The survey also shows that the rates of digital adoption are three times likelier now than before the crisis.</p>\n<p><img src=\"/9eb2fc80034954d57222032429559347/covid-19-stats-digital-transformation.png\" alt=\"covid-19-stats-digital-transformation\"></p>\n<p>Source: Mckinsey</p>\n<p>Needless-to-say, the global pandemic has exposed the clear digital divide between companies across the globe. </p>\n<p>On one side, some businesses have invested in digital enablement as part of their <a href=\"https://www.loginradius.com/blog/identity/2020/03/loginradius-business-continuity-covid-19-outbreak/\">continuity plan</a> (and fared with almost zero setbacks). On the other side, there are those companies that are struggling to achieve the bare minimum. </p>\n<h2 id=\"what-will-the-structure-for-digital-transformation-look-like-in-2021\" style=\"position:relative;\"><a href=\"#what-will-the-structure-for-digital-transformation-look-like-in-2021\" aria-label=\"what will the structure for digital transformation look like in 2021 permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What Will the Structure for Digital Transformation Look Like in 2021</h2>\n<p>Looking ahead to 2021, digital transformation is set to <a href=\"/blog/growth/4-things-consider-starting-digital-transformation/\">become a crucial topic of discussion</a> in all boardrooms. </p>\n<p>Speaking of the positives, <a href=\"https://www.mckinsey.com/~/media/McKinsey/Industries/Retail/Our%20Insights/Perspectives%20on%20retail%20and%20consumer%20goods%20Number%208/Perspectives-on-Retail-and-Consumer-Goods_Issue-8.pdf\">63% of the McKinsey survey</a> respondents were affirmative that countries will pick up pace after the setback of 2020 and do better six months from now. </p>\n<p>Meanwhile, the global outlook has also bounced back. </p>\n<p>As businesses race to adjust to the new normal, we anticipate the following parameters to play out exceptionally on the global canvas. </p>\n<h3 id=\"digital-nationalism-will-be-the-buzzword\" style=\"position:relative;\"><a href=\"#digital-nationalism-will-be-the-buzzword\" aria-label=\"digital nationalism will be the buzzword permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Digital nationalism will be the buzzword.</h3>\n<p>Lately, new, emerging technologies are being responsible for a huge part of any country's economic value. This clearly means that businesses (no matter the size) are investing in big tech solutions to retain their edge in their respective industries. </p>\n<p>However, in these trying times, it is also crucial that countries invest in digital products and services that aid in national security and the economy at large. We should anticipate strengthened regulatory structures and increased scrutiny on activities related to merger and acquisition (M&#x26;A).</p>\n<p><a href=\"https://www.loginradius.com/resource/customer-identity-the-core-of-digital-transformation/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"customer-identity-the-core-of-digital-transformation\"\n        title=\"customer-identity-the-core-of-digital-transformation\"\n        src=\"/static/5585e9b7c984efdccda767c38763e342/e5715/customer-identity-the-core-of-digital-transformation.png\"\n        srcset=\"/static/5585e9b7c984efdccda767c38763e342/a6d36/customer-identity-the-core-of-digital-transformation.png 650w,\n/static/5585e9b7c984efdccda767c38763e342/e5715/customer-identity-the-core-of-digital-transformation.png 768w,\n/static/5585e9b7c984efdccda767c38763e342/63ff0/customer-identity-the-core-of-digital-transformation.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<h3 id=\"futuristic-workspaces-will-rule\" style=\"position:relative;\"><a href=\"#futuristic-workspaces-will-rule\" aria-label=\"futuristic workspaces will rule permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Futuristic workspaces will rule.</h3>\n<p>The COVID-19 pandemic seems to have hit the reset button on how people work. We are witnessing a changing approach of people towards jobs, mobility, and versatile work models. </p>\n<p>Nonetheless, we expect to see new work delivery models, along with a major transformation in employment constructs. Most of these latest models will be driven by digital realization platforms.</p>\n<h3 id=\"tech-debts-will-be-channelized\" style=\"position:relative;\"><a href=\"#tech-debts-will-be-channelized\" aria-label=\"tech debts will be channelized permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Tech debts will be channelized.</h3>\n<p>Technology debts is a common liability witnessed in large enterprises. This happens because businesses go through multiple cycles of tech acquisitions and implementations over time. </p>\n<p>The ongoing crisis may provide leaders with an opportunity to carefully assess their tech environment and recognize opportunities where such debts can be withdrawn. So, companies can leverage the cash flow for future digital investments when debts are taken care of. </p>\n<h3 id=\"digital-skills-will-take-the-lead\" style=\"position:relative;\"><a href=\"#digital-skills-will-take-the-lead\" aria-label=\"digital skills will take the lead permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Digital skills will take the lead.</h3>\n<p>Technologies will drive digital transformation, and they will also power a competitive edge for businesses. Only those with a triad of skills, viz. digital, professional, domain, and functional skills, will rule the future. </p>\n<p>For companies, this is an ideal time to focus on a digital talent pool and use the opportunity to create a universal foundation of digital skills.</p>\n<h3 id=\"digital-labour-will-witness-a-paradigm-shift\" style=\"position:relative;\"><a href=\"#digital-labour-will-witness-a-paradigm-shift\" aria-label=\"digital labour will witness a paradigm shift permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Digital labour will witness a paradigm shift.</h3>\n<p>The world was already onboarding digital labor and bots. But when COVID-19 happened, this shift towards automation further intensified. </p>\n<p>Now, companies will want to exploit digital channels that can stay unaffected in the event of a crisis and minimize dependency on workers.</p>\n<p>Moving on.</p>\n<p>Digital transformation will be a powerful lever in the response of companies to the current crisis. Therefore, it is expected of companies to formulate plans that will give them the ability to adapt their business models in accordance with the rapidly evolving business environment. </p>\n<ul>\n<li><strong>Understand your channel</strong>: Understand, in particular, which intermediary sites impact purchasing and how consumers toggle between channels.</li>\n<li><strong>Set targets</strong>: This includes monthly targets for direct sales, as well as indirect sales.</li>\n<li><strong>Identify target prospects and prioritize them</strong>: Targeting the right demographics or personas is important. And digital media makes micro-targeting possible for your business.</li>\n<li><strong>Leverage the use of channels</strong>: Articulate the advantages of using multiple digital platforms. </li>\n<li><strong>Highlight the differences, build suggestions</strong>: This involves the differences between online platforms and other channels. </li>\n<li><strong>Offer integration between channels</strong>: Seamlessly integrate different channels throughout the consumer journey.</li>\n<li><strong>Review competitors</strong>: Find out who your competitors are targeting and where do you lag.</li>\n<li><strong>Develop channel partners</strong>: Identify the leading players and influencers in your business ecosystem, and form strategic alliances.</li>\n</ul>\n<h2 id=\"what-drives-digital-transformation\" style=\"position:relative;\"><a href=\"#what-drives-digital-transformation\" aria-label=\"what drives digital transformation permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What Drives Digital Transformation</h2>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 54.769230769230774%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAALCAYAAAB/Ca1DAAAACXBIWXMAAAsSAAALEgHS3X78AAAB5UlEQVQoz11TXU/bQBC0CtwHkZAQeWhViVI1ITgJzQekpU4MDiQhWASKQjEtAQlRqQ+tVIk3fv2wuz47goeR7zZ3szM7F89s9mDLXUIgX94LeF0fYKl9hpX9Gd6Pf8PsJVDdG6jeLfTXH1C8J5itKL/ryaKyL5dNtU/FMCXz+wLbOEE9eURw/4Ty979Y2L2EDu+gvl0T6ZUQm62DV4RMQkUhdoqlAa2XqUnl4h+a14/4ePoHi7tT6O4MKvhJ6oiUHLA7kxHmlktB+oPs6Vs9hKUGipqt9hJsXPyHje5Tm0zItjtTEkHqKiGsHwlprlD5h4S+FC3P8PMxTI1Ubo9ojud407nEUvRAyn4JdGsijuynPdj6ELYZizCPyQrNMYo7MdbaJzCNMdkdpiNgQoLlGbFyrlEDw5ez0ZA6Oe9H4sxjZe86MYrhFdajBIXtITTbKLnUybqpHTkM5gGwA4LlWVNw0pgVamJeaYzQjmeoDRLo6pHMLkstm6txteyJMQHPd7E+gmqdEvlYmnksXREJEymSrrlTKZinnb9Tt3bgO2/bx/gQTlFoxdDOtpeHsMlJ9WWGnFpWf/HYHVihprPFLxOUumdYawxEDDvz5oeYIEzTkrSDXE2OjLycrhX9QxZ8cuaCYxHPMflFqxM6bDUAAAAASUVORK5CYII='); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"what-drives-digital-transformation\"\n        title=\"what-drives-digital-transformation\"\n        src=\"/static/a94484bd83522808963b83f62b512b10/e5715/what-drives-digital-transformation.png\"\n        srcset=\"/static/a94484bd83522808963b83f62b512b10/a6d36/what-drives-digital-transformation.png 650w,\n/static/a94484bd83522808963b83f62b512b10/e5715/what-drives-digital-transformation.png 768w,\n/static/a94484bd83522808963b83f62b512b10/d0143/what-drives-digital-transformation.png 1025w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>As we speak of digital transformation or digital conversion, we are often focused on technology. With technology evolving so rapidly, it is tempting to believe it's the main force that has been driving digital transformation all along the way.</p>\n<p>But is it really so?</p>\n<p>Turns out, <em>no</em>, it isn't. </p>\n<p>According to <a href=\"https://www.pwc.com/us/en/library/digital-iq.html\">PwC's CFO Pulse survey</a>, nearly 50% of the organizations list consumer engagement and loyalty as their leading influencers when it comes to adopting digital transformation strategies in their company. </p>\n<p>This means companies that are undergoing digital transformation are also creating highly engaged consumers. According to <a href=\"https://www.prnewswire.com/news-releases/rosetta-consulting-study-shows-that-customer-engagement-increases-market-share-and-drives-revenue-growth-267184761.html\">Rosetta Consulting Study</a>, these consumers are:</p>\n<ul>\n<li>Six times more likely to experiment with new products and services launched by their favorite brand.</li>\n<li>Four times more likely to refer a brand to their friends and connections. </li>\n<li>Two times more likely to buy from their favorite brand, even when a competitor has a better product. </li>\n</ul>\n<p>There is one thing clear—_consumers _are running the show today. </p>\n<p>Businesses need to understand who these new kinds of digital customers are in order to offer better experiences and win big.</p>\n<p>You have to rethink new ways of interacting with your consumers. This means:</p>\n<ul>\n<li><strong>For B2B sales teams</strong>: Replace cold calling with social selling. You need to be always active where your consumers are. So, where else can you find them other than social media? Instead of waiting for them to contact you, take the first step, and reach out to them. Lure them to build a relationship with your brand.</li>\n<li><strong>For marketing teams</strong>: Cut off your expenses on offline marketing activities. No one uses billboards and direct mails anymore. Your consumers will benefit from highly personalized, data-driven marketing strategies instead.</li>\n<li><strong>For customer service teams</strong>: Your consumer's phone is not the only medium anymore. From social media, forums, and communities to review sites, there is a wide range of channels to seek support.</li>\n</ul>\n<h3 id=\"get-started-with-digital-transformation\" style=\"position:relative;\"><a href=\"#get-started-with-digital-transformation\" aria-label=\"get started with digital transformation permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Get Started with Digital Transformation</h3>\n<ul>\n<li><strong>Personalize your consumer experience.</strong></li>\n</ul>\n<p>Today's consumers want businesses to regard them as a distinctive individual and consider their personal preferences and purchasing background. </p>\n<p><a href=\"https://www.accenture.com/us-en/about/accenture-interactive-index\">According to Accenture</a>, 75% of consumers admit that they are more likely to purchase from an organization that:</p>\n<ul>\n<li>Identifies them by their name.</li>\n<li>Knows their purchase history.</li>\n<li>Recommends products based on their purchase history.</li>\n</ul>\n<p>Consumers today do mind companies using their data to make their lives easier. </p>\n<p>Moreso, as businesses, you should invest in a CRM system. They help you analyze data based on consumer's previous interactions. </p>\n<p>For example, you can get a clear understanding of your consumers by analyzing their product requests. This information can then be used to produce highly tailored messages, resulting in a more personalized experience.</p>\n<ul>\n<li><strong>Offer instant gratification.</strong></li>\n</ul>\n<p>Speed is more important than ever. Consumers expect responses from companies within seconds. They also anticipate the same response time on weekends as on weekdays—on-demand, 24 hours a day, 7 days per week.</p>\n<ul>\n<li><strong>Define your digital vision.</strong></li>\n</ul>\n<p>Identify why you are shifting and what you plan to accomplish. This is the basic component that will lead the rest of your journey.</p>\n<ul>\n<li><strong>Map your digital journey.</strong></li>\n</ul>\n<p>You must build a vision of how digitalization applies to your processes and where it can make a difference in achieving better consumer experiences. </p>\n<ul>\n<li><strong>Understand your digital maturity.</strong></li>\n</ul>\n<p>Perform a digital maturity assessment to find how much you have fared in leveraging digital transformation and the areas where you require improvement. </p>\n<h2 id=\"digital-transformation-trends-to-watch-out-in-2021\" style=\"position:relative;\"><a href=\"#digital-transformation-trends-to-watch-out-in-2021\" aria-label=\"digital transformation trends to watch out in 2021 permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Digital Transformation Trends to Watch Out in 2021</h2>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 60.61538461538461%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"digital-transformation-trends-to-watch-out-in-2021\"\n        title=\"digital-transformation-trends-to-watch-out-in-2021\"\n        src=\"/static/791f66f4f7e8410c3b9faeeba75f0499/e5715/digital-transformation-trends-to-watch-out-in-2021.png\"\n        srcset=\"/static/791f66f4f7e8410c3b9faeeba75f0499/a6d36/digital-transformation-trends-to-watch-out-in-2021.png 650w,\n/static/791f66f4f7e8410c3b9faeeba75f0499/e5715/digital-transformation-trends-to-watch-out-in-2021.png 768w,\n/static/791f66f4f7e8410c3b9faeeba75f0499/d0143/digital-transformation-trends-to-watch-out-in-2021.png 1025w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>2020 witnessed a massive undertaking of digital transformation across industries. Simultaneously, digital transformation fatigue became a regular appearance. </p>\n<p>Therefore, it is high time that you introspect your team and understand if they are getting tired or less engaged.</p>\n<p>2021 will also see the best of digital transformation in transit. Many have already stated the journey, and the rest is expected to follow soon. </p>\n<p>The uncertain way of global pandemic has introduced new patterns. Businesses and IT leaders should be aware of what's in the making. The following key digital transformation trends will take over the upcoming new normal in 2021.  </p>\n<h3 id=\"explosion-of-customer-data-platforms-cdp\" style=\"position:relative;\"><a href=\"#explosion-of-customer-data-platforms-cdp\" aria-label=\"explosion of customer data platforms cdp permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Explosion of Customer Data Platforms (CDP).</h3>\n<p>Data is growing exponentially, and it definitely won't stop anytime shortly. Data warehouse, analytics platforms, and visualization software will not lose significance. Still, at the same time, the world is about to witness a rapid adoption of customer data platforms (CDP) in 2021. </p>\n<p>So, what are these CDPs? A CDP is a packaged software that collects and organizes data from all available sources, tags it, and makes it accessible for anybody who wants to use it. </p>\n<p>Now that business processes have become much more decentralized, courtesy of the new work-from-home models and the ongoing growth of data collection, CDPs will become increasingly important in 2021. </p>\n<p>Companies such as Adobe, SAP, Oracle, and Microsoft are already invested heavily to bring new CDPs to the market.</p>\n<h3 id=\"automation-will-increase-financial-proficiency\" style=\"position:relative;\"><a href=\"#automation-will-increase-financial-proficiency\" aria-label=\"automation will increase financial proficiency permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Automation will increase financial proficiency.</h3>\n<p>As the world is trying to recover from the pandemic, financial institutions are particularly concerned about their shrinking revenue and loan losses. This has encouraged them to lean towards automation and robotics. </p>\n<p>While still in its earliest stages, Robotic Process Automation (RPA) can increase productivity by providing a cost-effective substitute to Human Resources. </p>\n<p>Other recorded advantages of RPA include improved consumer experiences, flexibility, upgraded precision, and proficiency in work. </p>\n<h3 id=\"utilization-of-ai\" style=\"position:relative;\"><a href=\"#utilization-of-ai\" aria-label=\"utilization of ai permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Utilization of AI.</h3>\n<p>When the pandemic hit, AI and data were suddenly liberalized and accelerated to a massive extent. It happened almost overnight that governments and organizations found themselves working together to establish a quicker way to avoid the spread of the virus.</p>\n<p>Everyone was turning their heads to AI, machine learning, and data. So, what began as an emergency in 2020 will continue to scale in 2021 and is likely to spread across a wide variety of opportunities. AI will be addressing global and business issues quicker, better, and on a broader scale.</p>\n<p>While many may still consider AI to be more of a future trend, it is already here and driving our everyday lives. For example, when you receive recommendations on Netflix or while shopping on Amazon, that's the work of an AI.  </p>\n<h3 id=\"quantum-computing-will-go-mainstream\" style=\"position:relative;\"><a href=\"#quantum-computing-will-go-mainstream\" aria-label=\"quantum computing will go mainstream permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Quantum computing will go mainstream.</h3>\n<p>2020 witnessed a number of achievements from various pioneers in the quantum industry, including IBM, Amazon, <a href=\"https://www.cnet.com/news/honeywell-fires-up-the-h1-its-second-generation-quantum-computer/\">Honeywell</a>, and Google.</p>\n<p>These companies have been favoring quantum advantage or supremacy by claiming that a quantum computer can calculate hundreds or thousands of times faster than a classical computer. Also, the technology in question is efficient enough to complete calculations that classical supercomputers can not do at all. </p>\n<p>Quantum computing was also at the forefront of digital transformation during the pandemic endeavors to stop the spread of infection, as well as the development of therapeutics and future vaccines. </p>\n<p>2021 will be no different. Quantum computing will continue to rise and bring more efficiencies to the table</p>\n<h3 id=\"work-from-home-will-outlast-the-pandemic\" style=\"position:relative;\"><a href=\"#work-from-home-will-outlast-the-pandemic\" aria-label=\"work from home will outlast the pandemic permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Work From Home will outlast the pandemic.</h3>\n<p>For quite a while, employees were pushing for greater job flexibility, and organizations opting to allow remote work were only a handful. In 2020, when the pandemic caught most companies off-guard, telecommuting seemed the only rational solution.</p>\n<p>Now, even when things are gradually getting back to normal, organizations are still allowing people to work from home—as a possible shield to protect from future outbreaks. Large tech organizations like <a href=\"https://www.indiatvnews.com/business/news-google-extends-work-from-home-policy-till-september-2021-671463\">Google</a> and Facebook have already extended their remote arrangements for parts of 2021. </p>\n<p>Now that companies know how remote setups work for them, also how they are more productive despite physical distance, work from home models may continue to exist for a few more years, and maybe beyond. </p>\n<h3 id=\"cybersecurity-will-gain-momentum\" style=\"position:relative;\"><a href=\"#cybersecurity-will-gain-momentum\" aria-label=\"cybersecurity will gain momentum permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Cybersecurity will gain momentum.</h3>\n<p>Between January and April 2020 alone, there was a <a href=\"https://www.mcafee.com/enterprise/en-us/assets/reports/rp-cloud-adoption-and-risk-report-work-from-home-edition.pdf\">630% rise in cyberattacks</a> on cloud accounts and a 238% rise in banks. Cybersecurity was the talk of the town throughout the pandemic. </p>\n<p>Because there were fewer employees onsite on the same network, it became crucial for companies to upgrade their cybersecurity strategies and extend them beyond their corporate network. </p>\n<p>Despite the attacks, 2021 may witness an accelerated workload migration to the cloud. A <a href=\"https://www.gartner.com/smarterwithgartner/the-cios-guide-to-distributed-cloud/\">Gartner analysis</a> finds \"distributed cloud\" may take over along with some profound security implications.  </p>\n<h2 id=\"the-role-of-culture-in-digital-transformation\" style=\"position:relative;\"><a href=\"#the-role-of-culture-in-digital-transformation\" aria-label=\"the role of culture in digital transformation permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>The Role of Culture in Digital Transformation</h2>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 54.769230769230774%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"the-role-of-culture-in-digital-transformation\"\n        title=\"the-role-of-culture-in-digital-transformation\"\n        src=\"/static/fc2697ed3b7bffa1d3c6a0060fe90505/e5715/the-role-of-culture-in-digital-transformation.png\"\n        srcset=\"/static/fc2697ed3b7bffa1d3c6a0060fe90505/a6d36/the-role-of-culture-in-digital-transformation.png 650w,\n/static/fc2697ed3b7bffa1d3c6a0060fe90505/e5715/the-role-of-culture-in-digital-transformation.png 768w,\n/static/fc2697ed3b7bffa1d3c6a0060fe90505/d0143/the-role-of-culture-in-digital-transformation.png 1025w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>Culture in digital transformation has no mysterious or unseen presence. Digital is about embedding culture into business operations to succeed, and not just update technology, redesign products, and improve client relationships. </p>\n<p>So, if you fail to align your business initiatives with employee values and expectations, you end up generating additional risks to your company's culture. The consequences include slow adoption of digital technologies, lost productivity, loss of market competitiveness, and an ultimate decrease in ROI. </p>\n<p>And that's not how digital transformation functions. You need a more systematic and collaborative attitude towards cultural change instead.  </p>\n<p>For organizations trying to shape their digital aspirations, what's lacking is transparent and realistic guidance on shaping their culture for the road ahead. </p>\n<p>Our best tip for any organization will be to invest in a sustained effort that allows teams to cultivate a more profound passion and empathy for their business.</p>\n<h2 id=\"how-do-you-measure-roi-on-digital-transformation\" style=\"position:relative;\"><a href=\"#how-do-you-measure-roi-on-digital-transformation\" aria-label=\"how do you measure roi on digital transformation permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How Do You Measure ROI on Digital Transformation</h2>\n<p>The ability to define and calculate the return on investment (ROI) of digital transformation can be very difficult for transformation leaders. </p>\n<p>After all, it is not possible to measure consumer experiences. Instead, you need to assess your business as a whole and consider the changes in your processes and workflows.</p>\n<p>How do you start? Simple. By creating a strong investment case. The following steps below will help you build a practical ROI model for your business. </p>\n<p><strong>Step 1: Narrow down your objectives for digital transformation</strong>: Do you want to digitize your data? Integrate touchpoints? Increase productivity in operations? Or repeat purchases? </p>\n<p>It can be one or a combination of many objectives. Jot down your roadmap to understand what KPIs you should measure. </p>\n<p><strong>Step 2: Define your cost centers</strong>: List out all your business areas where you have incorporated digital transformation. </p>\n<p>For example, it will include not just your IT department (which is an obvious choice for your technology upgrade). You should also consider the additional cost of training your employees to help them understand your new web portal.</p>\n<p><strong>Step 3: Allocate a figure to all consumer metrics</strong>: Make sure to include all potential impacts on sales from improvements in consumer experience like: </p>\n<ul>\n<li>Consumer churn</li>\n<li>Repeat purchases</li>\n<li>Referrals</li>\n<li>Satisfaction scores</li>\n<li>Operational costs (training, recruitment)</li>\n<li>Employee incentive schemes</li>\n</ul>\n<p><strong>Step 4: Set realistic timelines and milestones</strong>: When will you calculate the progress of each aspect of your digital transformation? The timeline is essential.</p>\n<p>For example, if you are launching a new self-serve application, your inbound call levels are bound to decrease in the first year. But your KPIs will gradually pick up as consumers enjoy the benefits of your product. Therefore, do not set your aspirations too high in the beginning. </p>\n<h2 id=\"meet-the-industry-experts\" style=\"position:relative;\"><a href=\"#meet-the-industry-experts\" aria-label=\"meet the industry experts permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Meet the Industry Experts</h2>\n<p>We have caught a few digital transformation leaders in action as they offer valuable perspective and guidance. </p>\n<ul>\n<li><strong><a href=\"https://www.linkedin.com/in/jimdswanson/\">Jim Swanson</a>, CIO at Johnson &#x26; Johnson</strong>: We talk about automating operations, people, and new business models. You could have all those things – but if leadership and culture aren't at heart, it fails.</li>\n<li><strong><a href=\"https://www.linkedin.com/in/dhinchcliffe\">Dion Hinchcliffe</a>, VP at Constellation Research</strong>: The top IT executives today must match the pace of change, fall behind, or lead the pack. That's the existential issue at stake, where bold action must be actively supported by out-of-the-box experimentation and pathfinding. </li>\n<li><strong><a href=\"https://www.linkedin.com/in/brysonkoehler\">Bryson Koehler</a>, CTO at Equifax</strong>: If you look at the vast majority of startups, they're not starting with giant, shrink-wrapped software packages as their company's base. If you're trying to create innovation inside a large enterprise, you shouldn't start with it either. You're not here to run the mainframe anymore. </li>\n<li><strong><a href=\"https://www.linkedin.com/in/svengerjets\">Sven Gerjets</a>, CTO at Mattel</strong>: If you don't have an organization that is supportive and entirely onboard with the transformation efforts, it's impossible to succeed. You need to have leaders that know what \"good\" looks like. </li>\n</ul>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>Digital transformation is an amalgamation of strategy, roadmap, goals, stakeholders, and all the parameters needed to succeed. </p>\n<p>Right now, businesses are rapidly including the creative use of data, be it via analytics, IoT, or machine learning etc. for their transformation activities. Clearly, in many ways, digital-led transitions are evolving and are here to stay. </p>\n<p>Only the adapters will survive!</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-loginradius\"\n        title=\"book-a-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"January 11, 2021","updated_date":null,"description":"Digital transformation is the process of leveraging digital technology to develop new business processes and consumer experiences to meet the changing market dynamics or to alter the existing ones. So, has the dynamics changed with the COVID-19 pandemic? You are about to find out.","title":"What is Digital Transformation","tags":["digital transformation","cybersecurity","cx"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.408450704225352,"src":"/static/1bde7f901817a3bbf2229ed97ea8977c/9a31d/what-is-digital-transformation.jpg","srcSet":"/static/1bde7f901817a3bbf2229ed97ea8977c/f836f/what-is-digital-transformation.jpg 200w,\n/static/1bde7f901817a3bbf2229ed97ea8977c/2244e/what-is-digital-transformation.jpg 400w,\n/static/1bde7f901817a3bbf2229ed97ea8977c/9a31d/what-is-digital-transformation.jpg 767w","sizes":"(max-width: 767px) 100vw, 767px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},{"node":{"excerpt":"No conversation on digital security is complete without a well-rounded discussion on how to choose a strong password.  Passwords are the…","fields":{"slug":"/identity/how-to-choose-a-secure-password/"},"html":"<p>No conversation on digital security is complete without a well-rounded discussion on how to choose a strong password. </p>\n<p>Passwords are the digital keys to our daily lives. They are the gateway to our professional services, our network of friends, and all our financial applications. </p>\n<p>No wonder we want to keep our passwords private and secure! </p>\n<p>If someone gains access to your email ID, they can easily opt for the \"forgot your password?\" link on (for example, an online shopping or banking site) you use. </p>\n<p>Also, if a cybercriminal successfully hacks into your social media account, they can post fraudulent messages asking for money or sending out links to scammer websites. </p>\n<p>So, what's the solution? A good password. </p>\n<p>But before finding how to choose a strong password in 2021, let's first look at the most common methods of how passwords are being hacked today.    </p>\n<h2 id=\"how-does-a-password-get-hacked-top-5-threats\" style=\"position:relative;\"><a href=\"#how-does-a-password-get-hacked-top-5-threats\" aria-label=\"how does a password get hacked top 5 threats permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How Does a Password Get Hacked? Top 5 Threats</h2>\n<p>Hackers utilize numerous techniques to crack your passwords. One technique is to gain access by guessing the password directly. </p>\n<p>They could do it by closely following your social media presence, security questions, and similar details. This is why industry experts do not favor the use of personal details on passwords. </p>\n<p>Other tactics that hackers use include: </p>\n<h3 id=\"1-phishing-attacks\" style=\"position:relative;\"><a href=\"#1-phishing-attacks\" aria-label=\"1 phishing attacks permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. Phishing attacks</h3>\n<p>Phishing is a <a href=\"https://www.loginradius.com/blog/identity/2020/10/social-engineering-attacks/\">social engineering attack</a> that occurs when the hacker dupes a victim into opening an email using fraudulent ads or scareware tactics. </p>\n<p>Unfortunately, such attacks are no longer just an email problem. It has somewhat expanded to instant/ text messages, social networks, videoconferencing, and gaming applications. </p>\n<p>As phishing threats grew to over 50,000 a day around December 2020, <a href=\"https://www.slashnext.com/blog/zero-hour-phishing-attack-on-googles-app-engine-targeting-office-365-users-pushes-holiday-spike-above-100/\">SlashNext Threat Labs reported</a> a 30% increase throughout 2019. </p>\n<p>Both organizations and individuals should know how to choose a strong password and take a zero-trust approach beyond domain credibility. </p>\n<h3 id=\"2-dictionary-attack\" style=\"position:relative;\"><a href=\"#2-dictionary-attack\" aria-label=\"2 dictionary attack permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. Dictionary attack</h3>\n<p>A dictionary attack is a method of attacking the victim's account by entering every word in a dictionary as a password. They usually run through a list of common words and phrases or easy to guess passwords. </p>\n<p>Users frequently reuse their passwords or do not change them even after a breaching attempt. That makes this form of attack easy to execute. </p>\n<p>In fact, the <a href=\"https://enterprise.verizon.com/resources/reports/dbir/2019/results-and-analysis/\">2019 Verizon Data Breach Investigations Report</a> (DBIR) reveals that compromised and reused passwords are involved in 80 percent of hacking-related breaches.</p>\n<h3 id=\"3-brute-force-attacks\" style=\"position:relative;\"><a href=\"#3-brute-force-attacks\" aria-label=\"3 brute force attacks permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3. Brute force attacks</h3>\n<p>Similar to a dictionary attack, brute force uses trial-and-error to guess the victim's login credentials, find a hidden web page, or access network resources. </p>\n<p>Later, those tainted accounts are used to send phishing emails, sell credentials to third parties, or spread fake content. </p>\n<p><a href=\"https://enterprise.verizon.com/resources/reports/dbir/2020/introduction/\">Verizon's Data Breach Investigations Report 2020</a> reveals that around 20% of breaches happening within SMBs involve brute force. The number is approximately 10% for large enterprises. </p>\n<p>The trend essentially remained unchanged in 2018 and 2019, but the coronavirus pandemic may have impacted the number last year.</p>\n<h3 id=\"4-keystroke-logging\" style=\"position:relative;\"><a href=\"#4-keystroke-logging\" aria-label=\"4 keystroke logging permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>4. Keystroke logging</h3>\n<p>Keystroke logging or keyboard capturing is the method of tracking and recording the keystrokes of the victim, thereby capturing any information typed during the session. </p>\n<p>The hacker uses tools to record the data captured by each keystroke, which are retrieved later on. Moreso, a majority of these tools can record calls, GPS data, copy-cut-paste clipboard, and microphone or camera footage. The recorded data are later used for phishing attacks, stalking, and identity theft. </p>\n<h3 id=\"5-man-in-the-middle-attacks\" style=\"position:relative;\"><a href=\"#5-man-in-the-middle-attacks\" aria-label=\"5 man in the middle attacks permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>5. Man-in-the-middle attacks</h3>\n<p>In this attack, the hacker positions themselves in the middle of a conversation between a user and an application to eavesdrop or impersonate a website or application. </p>\n<p>In return, the hacker <a href=\"https://www.loginradius.com/blog/identity/2019/09/prevent-credential-stuffing-attacks/\">steals the victim's login credentials</a>, account numbers, social security numbers, etc. </p>\n<p>SaaS businesses, e-commerce sites, and users of financial services majorly fall victim to man-in-the-middle attacks.  </p>\n<h2 id=\"the-dos-and-dont-on-how-to-choose-a-strong-password\" style=\"position:relative;\"><a href=\"#the-dos-and-dont-on-how-to-choose-a-strong-password\" aria-label=\"the dos and dont on how to choose a strong password permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>The Do's and Don't on How to Choose a Strong Password</h2>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 60.61538461538461%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"do&#39;s-and-don&#39;t-to-choose-a-strong-password\"\n        title=\"do&#39;s-and-don&#39;t-to-choose-a-strong-password\"\n        src=\"/static/abb33a13f561a652b46fab1060593c58/e5715/do's-and-don't-to-choose-a-strong-password.png\"\n        srcset=\"/static/abb33a13f561a652b46fab1060593c58/a6d36/do's-and-don't-to-choose-a-strong-password.png 650w,\n/static/abb33a13f561a652b46fab1060593c58/e5715/do's-and-don't-to-choose-a-strong-password.png 768w,\n/static/abb33a13f561a652b46fab1060593c58/d0143/do's-and-don't-to-choose-a-strong-password.png 1025w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>What does a secure password look like? It is usually the one that cannot be guessed easily or cracked using software tools. </p>\n<p>Not that it should only be unique and complex, here is a collection of the do's and don't on how to choose a strong password to avoid being a victim of the attacks mentioned above.</p>\n<h3 id=\"the-dos\" style=\"position:relative;\"><a href=\"#the-dos\" aria-label=\"the dos permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>The Do's</h3>\n<p><strong>Use two-factor authentication (2FA)</strong>: <a href=\"https://www.loginradius.com/multi-factor-authentication/\">2FA</a> adds an additional layer of security to your existing account. Even if the hacker is able to crack your password, they will still have an extra layer to authenticate. </p>\n<p>The following are a few types of layers that businesses choose to provide:</p>\n<ul>\n<li>A PIN or password.</li>\n<li>A physical asset such as the last 4 digits of your credit card.</li>\n<li>An OTP sent to your mobile device.</li>\n<li>A biometric authenticator such as a fingerprint or voiceprint. </li>\n</ul>\n<p><strong>Follow standard password rules</strong>: There are a few basic rules on how to choose a strong password that you should closely follow.</p>\n<ul>\n<li>Short passwords are very easy to crack. Use a minimum of 10 characters.</li>\n<li>Include a mixture of numbers, capital letters, lower-case letters, and symbols to make the password difficult to crack. </li>\n</ul>\n<p><strong>Choose sufficiently random combinations of words</strong>: Yes, it is possible to use an easy-to-remember password and make it secure at the same time. The following are a few ways to do that:</p>\n<ul>\n<li>Pick a sentence that you probably won't forget, like \"When I was fifteen, I had my first international trip.\" Then use the first letters, add the numbers, and punctuation to make \"wIw15,ihmfit.\"</li>\n<li>Pick any three random words like Jack Book Pen. Choose your birth date, put the words together, and split up the date like 1jackbookpen4. Next, capitalize each letter and add a few special characters like 1J@ckBookPen4!</li>\n</ul>\n<p><strong>Pick something that does not make sense</strong>: How to choose a <a href=\"https://www.loginradius.com/blog/engineering/password-security-best-practices-compliance/\">strong password</a>? Go for something that has no meaning. For example, it could be:</p>\n<ul>\n<li>A familiar word using odd characters like phnybon instead of funnybone.</li>\n<li>A deliberately misspelled term like Win-G8 (Wooden Gate)</li>\n<li>Replace letters with the least expected symbols. Like for \"O\" use \"()\" instead of \"0\".</li>\n<li>Use phonetically pronounceable words that make no sense, like good-eits.</li>\n</ul>\n<p><strong>Change your passwords regularly</strong>: Also, do not reuse the same password for a long time. The more sensitive your data is, the more frequently you should change your password.</p>\n<p><a href=\"https://www.loginradius.com/resource/ebook/buyers-guide-to-multi-factor-authentication/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"EB-buyers-GD-to-MFA\"\n        title=\"EB-buyers-GD-to-MFA\"\n        src=\"/static/5093fa5ddf26d3a3ec38a96c3e0387e6/e5715/EB-buyers-GD-to-MFA.png\"\n        srcset=\"/static/5093fa5ddf26d3a3ec38a96c3e0387e6/a6d36/EB-buyers-GD-to-MFA.png 650w,\n/static/5093fa5ddf26d3a3ec38a96c3e0387e6/e5715/EB-buyers-GD-to-MFA.png 768w,\n/static/5093fa5ddf26d3a3ec38a96c3e0387e6/81501/EB-buyers-GD-to-MFA.png 2886w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<p><strong>Always remember to log out</strong> of websites and devices once you are done using them. </p>\n<h3 id=\"the-donts\" style=\"position:relative;\"><a href=\"#the-donts\" aria-label=\"the donts permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>The Don’ts</h3>\n<ul>\n<li>Do not use your name in your passwords in any form - first, last, spelled backward, or nicknames.</li>\n<li>Do not use passwords that are fewer than eight characters.</li>\n<li>Do not use the name of your pets, friends, or close relatives.</li>\n<li>Do not use special dates like your birthdays and anniversaries. </li>\n<li>Do not use your phone number or office number.</li>\n<li>Do not use your user ID, even when spelled backward.</li>\n<li>Do not use acronyms, technical terms, or names of places.</li>\n<li>Do not use names from popular culture like Harry_Potter, Hogwarts. </li>\n<li>Do not use all numeric passwords like your license plate numbers.</li>\n<li>Do not use dictionary words. </li>\n<li>Do not use commonly used passwords like 123456, qwerty, 11111111, asdfgh.</li>\n<li>Do not write down your passwords or share them with anyone else.</li>\n<li>Do not save your passwords in unfamiliar computers or browsers.</li>\n<li>Do not use the secret question option. It does not make any sense to use a strong password and back it up with an easily guessable security question.</li>\n<li>Do not use obvious substitutions like \"H0me\" for \"Home\" or \"D00R8377\" for \"DOORBELL.\"</li>\n</ul>\n<h2 id=\"the-20-worst-passwords-of-2020\" style=\"position:relative;\"><a href=\"#the-20-worst-passwords-of-2020\" aria-label=\"the 20 worst passwords of 2020 permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>The 20 Worst Passwords of 2020</h2>\n<p><a href=\"https://nordpass.com/most-common-passwords-list/\">According to Nordpass.com</a>, here are the 20 worst passwords of 2020. The list also offers an overview of how many times the password has been breached, among other parameters. </p>\n<p>Disclaimer: Stay away from these passwords. </p>\n<table>\n  <tr>\n   <td><strong>Position </strong>\n   </td>\n   <td><strong>Password </strong>\n   </td>\n   <td><strong>Number of users</strong>\n   </td>\n   <td><strong>Time to crack it</strong>\n   </td>\n   <td><strong>Times exposed</strong>\n   </td>\n  </tr>\n  <tr>\n   <td>1\n   </td>\n   <td>123456\n   </td>\n   <td>2,543,285\n   </td>\n   <td>Less than a second\n   </td>\n   <td>23,597,311\n   </td>\n  </tr>\n  <tr>\n   <td>2\n   </td>\n   <td>123456789\n   </td>\n   <td>961,435\n   </td>\n   <td>Less than a second\n   </td>\n   <td>7,870,694\n   </td>\n  </tr>\n  <tr>\n   <td>3\n   </td>\n   <td>picture1\n   </td>\n   <td>371,612\n   </td>\n   <td>Three hours\n   </td>\n   <td>11,190\n   </td>\n  </tr>\n  <tr>\n   <td>4\n   </td>\n   <td>password\n   </td>\n   <td>360,467\n   </td>\n   <td>Less than a second\n   </td>\n   <td>3,759,315\n   </td>\n  </tr>\n  <tr>\n   <td>5\n   </td>\n   <td>12345678\n   </td>\n   <td>322,187\n   </td>\n   <td>Less than a second\n   </td>\n   <td>2,944,615\n   </td>\n  </tr>\n  <tr>\n   <td>6\n   </td>\n   <td>111111\n   </td>\n   <td>230,507\n   </td>\n   <td>Less than a second\n   </td>\n   <td>3,124,368\n   </td>\n  </tr>\n  <tr>\n   <td>7\n   </td>\n   <td>123123\n   </td>\n   <td>189,327\n   </td>\n   <td>Less than a second\n   </td>\n   <td>2,238,694\n   </td>\n  </tr>\n  <tr>\n   <td>8\n   </td>\n   <td>12345\n   </td>\n   <td>188,268\n   </td>\n   <td>Less than a second\n   </td>\n   <td>2,389,787\n   </td>\n  </tr>\n  <tr>\n   <td>9\n   </td>\n   <td>1234567890\n   </td>\n   <td>171,724\n   </td>\n   <td>Less than a second\n   </td>\n   <td>2,264,884\n   </td>\n  </tr>\n  <tr>\n   <td>10\n   </td>\n   <td>senha\n   </td>\n   <td>167,728\n   </td>\n   <td>Ten seconds\n   </td>\n   <td>8,213\n   </td>\n  </tr>\n  <tr>\n   <td>11\n   </td>\n   <td>1234567\n   </td>\n   <td>165,909\n   </td>\n   <td>Less than a second\n   </td>\n   <td>2,516,606\n   </td>\n  </tr>\n  <tr>\n   <td>12\n   </td>\n   <td>qwerty\n   </td>\n   <td>156,765\n   </td>\n   <td>Less than a second\n   </td>\n   <td>3,946,737\n   </td>\n  </tr>\n  <tr>\n   <td>13\n   </td>\n   <td>abc123\n   </td>\n   <td>151,804\n   </td>\n   <td>Less than a second\n   </td>\n   <td>2,877,689\n   </td>\n  </tr>\n  <tr>\n   <td>14\n   </td>\n   <td>Million2\n   </td>\n   <td>143,664\n   </td>\n   <td>Three hours\n   </td>\n   <td>162,609\n   </td>\n  </tr>\n  <tr>\n   <td>15\n   </td>\n   <td>000000\n   </td>\n   <td>122,982\n   </td>\n   <td>Less than a second\n   </td>\n   <td>1,959,780\n   </td>\n  </tr>\n  <tr>\n   <td>16\n   </td>\n   <td>1234\n   </td>\n   <td>112,297\n   </td>\n   <td>Less than a second\n   </td>\n   <td>1,296,186\n   </td>\n  </tr>\n  <tr>\n   <td>17\n   </td>\n   <td>iloveyou\n   </td>\n   <td>106,327\n   </td>\n   <td>Less than a second\n   </td>\n   <td>1,645,337\n   </td>\n  </tr>\n  <tr>\n   <td>18\n   </td>\n   <td>aaron431\n   </td>\n   <td>90,256\n   </td>\n   <td>Three hours\n   </td>\n   <td>30,576\n   </td>\n  </tr>\n  <tr>\n   <td>19\n   </td>\n   <td>password1\n   </td>\n   <td>87,556\n   </td>\n   <td>Less than a second\n   </td>\n   <td>2,418,984\n   </td>\n  </tr>\n  <tr>\n   <td>20\n   </td>\n   <td>qqww1122\n   </td>\n   <td>85,476\n   </td>\n   <td>Fifty two minutes\n   </td>\n   <td>122,481\n   </td>\n  </tr>\n</table>\n<h2 id=\"5-tips-on-how-to-choose-a-strong-password-manager\" style=\"position:relative;\"><a href=\"#5-tips-on-how-to-choose-a-strong-password-manager\" aria-label=\"5 tips on how to choose a strong password manager permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>5 Tips on How to Choose a Strong Password Manager</h2>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 60.61538461538461%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"how-to-choose-a-strong-password\"\n        title=\"how-to-choose-a-strong-password\"\n        src=\"/static/f3dee84ff01c6019335478ccd1a0aa33/e5715/how-to-choose-a-strong-password.png\"\n        srcset=\"/static/f3dee84ff01c6019335478ccd1a0aa33/a6d36/how-to-choose-a-strong-password.png 650w,\n/static/f3dee84ff01c6019335478ccd1a0aa33/e5715/how-to-choose-a-strong-password.png 768w,\n/static/f3dee84ff01c6019335478ccd1a0aa33/d0143/how-to-choose-a-strong-password.png 1025w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>A password manager helps you auto-generate strong passwords and stores them in encrypted, centralized locations on your behalf. You can access all your passwords with a master password. </p>\n<p>A lot of password managers are free to use and provide optional features such as synchronizing new passwords across several devices. If allowed, they also audit users’ actions to ensure that they are not repeating their passwords in multiple locations. </p>\n<p>So, (to be on the right track), how to choose a strong password manager? Well, it should at least have the following core features:</p>\n<ul>\n<li><strong>Storage</strong>: While some password managers store passwords in a local hard-drive, some others use cloud storage. The latter is usually preferable if your employees or users use multiple devices. They can access their account credentials from any device with an internet connection. Also, if their devices are stolen, they won't lose their passwords. </li>\n<li><strong>Encryption</strong>: Go for a strong <a href=\"https://www.loginradius.com/blog/engineering/encryption-and-hashing/\">encryption standard</a>. The next time you wonder how to choose a strong password manager, go for the one that uses 256-bit Advanced Encryption Standard (AES) encryption.  </li>\n<li><strong>Easy-to-use</strong>: The password manager you choose should have an intuitive interface so that it's easy to use. Otherwise, your users or employees will stick to their old habits of creating weak, familiar passwords. Some managers also offer automated password changers that automatically change old passwords to new stronger ones.</li>\n<li><strong>Security</strong>: It should support two-factor authentication, track password usage, and generate audit reports. The password manager should also end sessions when a device is idle for a predefined amount of time. Also, ensure it has a built-in VPN and the ability to restrict access to blacklisted Internet sites. </li>\n<li>\n<p><strong>Value</strong>: The password manager should also have additional nice-to-have features:</p>\n<ul>\n<li>Automated support for directory services integration.</li>\n<li>The ability to generate a portable vault.</li>\n<li>An account recovery feature in case of forgotten master passwords.</li>\n<li>The ability to encrypt and store sensitive files in secure vaults. </li>\n</ul>\n</li>\n</ul>\n<h2 id=\"reduce-password-vulnerabilities-using-the-loginradius-password-management-solution\" style=\"position:relative;\"><a href=\"#reduce-password-vulnerabilities-using-the-loginradius-password-management-solution\" aria-label=\"reduce password vulnerabilities using the loginradius password management solution permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Reduce Password Vulnerabilities Using the LoginRadius Password Management Solution</h2>\n<p>To answer the popular question \"how to choose a strong password in 2021\", LoginRadius offers a range of robust Password Policy features. </p>\n<p><a href=\"https://www.loginradius.com/\">The CIAM platform</a> captures the following categories of password management in the LoginRadius Admin Console:</p>\n<ul>\n<li><strong>Password Expiration</strong>: You can customize how often you want your consumers to reset their passwords. There's a password expiry configuration setting to help you out.</li>\n<li><strong>Password History</strong>: You can configure the number of unique passwords a consumer must set before allowing them to reuse one of their older passwords. </li>\n<li><strong>Password Complexity</strong>: You can configure the password complexity for your consumer's account by forcing validation rules, preventing them from using common passwords and dictionary words.</li>\n<li><strong>Password Compliance Check</strong>: You can identify which consumers are abiding by your password complexity requirements and flag those who aren't. </li>\n</ul>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>By now, you know how to choose a strong password. However, hackers will still try to crack your passwords, no matter how secure you are trying to make them. </p>\n<p>Follow the steps listed above to make your passwords as strong and unique as possible. Remember, if your password is too easy to remember, it is probably not secure at all.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-loginradius\"\n        title=\"book-a-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"January 06, 2021","updated_date":null,"description":"Passwords are the digital keys to our daily lives. They are the gateway to our professional services, and our network of friends. So, what does a secure password look like? Here is a collection of the do's and don't on how to choose a strong password to avoid being a victim of cyberattack.","title":"The Do's and Don'ts of Choosing a Secure Password","tags":["data security","password management","ciam solution","cx"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.3986013986013985,"src":"/static/3744865801c829fc49bb5b4c058eb440/9a31d/how-to-choose-a-secure-password-in-2021.jpg","srcSet":"/static/3744865801c829fc49bb5b4c058eb440/f836f/how-to-choose-a-secure-password-in-2021.jpg 200w,\n/static/3744865801c829fc49bb5b4c058eb440/2244e/how-to-choose-a-secure-password-in-2021.jpg 400w,\n/static/3744865801c829fc49bb5b4c058eb440/9a31d/how-to-choose-a-secure-password-in-2021.jpg 767w","sizes":"(max-width: 767px) 100vw, 767px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}}]},"markdownRemark":{"excerpt":"Identity is evolving, and developers are at the forefront of this transformation. Every day brings a new learning—adapting to new standards…","fields":{"slug":"/identity/developer-first-identity-provider-loginradius/"},"html":"<p>Identity is evolving, and developers are at the forefront of this transformation. Every day brings a new learning—adapting to new standards and refining approaches to building secure, seamless experiences.</p>\n<p>We’re here to support developers on that journey. We know how important simplicity, efficiency, and well-structured documentation are when working with identity and access management solutions. That’s why we’ve redesigned the <a href=\"https://www.loginradius.com/\">LoginRadius website</a>—to be faster, more intuitive, and developer-first in every way.</p>\n<p>The goal? Having them spend less time searching and more time building.</p>\n<h2 id=\"whats-new-and-improved-on-the-loginradius-website\" style=\"position:relative;\"><a href=\"#whats-new-and-improved-on-the-loginradius-website\" aria-label=\"whats new and improved on the loginradius website permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What’s New and Improved on the LoginRadius Website?</h2>\n<p>LoginRadius’ vision is to give developers a product that simplifies identity management so they can focus on building, deploying, and scaling their applications. To enhance this experience, we’ve spent the last few months redesigning our interface— making navigation more intuitive and reassuring that essential resources are easily accessible.</p>\n<p>Here’s a closer look at what’s new and why it’s important:</p>\n<h3 id=\"a-developer-friendly-dark-theme\" style=\"position:relative;\"><a href=\"#a-developer-friendly-dark-theme\" aria-label=\"a developer friendly dark theme permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>A Developer-Friendly Dark Theme</h3>\n<p><img src=\"/f46881583c7518a93bb24e94c32320de/a-developer-friendly-dark-theme.webp\" alt=\"This image shows how LoginRadius offers several authentication methods like traditional login, social login, passwordless login, passkeys and more in a dark mode.\">    </p>\n<p>Developers spend long hours working in dark-themed IDEs and terminals, so we’ve designed the LoginRadius experience to be developer-friendly and align with that preference.</p>\n<p>The new dark mode reduces eye strain, enhances readability, and provides a seamless transition between a coding environment and our platform. Our new design features a clean, modern aesthetic with a consistent color scheme and Barlow typography, ensuring better readability. High-quality graphics and icons are thoughtfully placed to enhance the content without adding visual clutter.</p>\n<p>So, whether you’re navigating our API docs or configuring authentication into your system, our improved interface will make those extended development hours more comfortable and efficient.</p>\n<h3 id=\"clear-categorization-for-loginradius-capabilities\" style=\"position:relative;\"><a href=\"#clear-categorization-for-loginradius-capabilities\" aria-label=\"clear categorization for loginradius capabilities permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Clear Categorization for LoginRadius Capabilities</h3>\n<p><img src=\"/e5358b82be414940f3fb146013845933/capabilities.webp\" alt=\"This image shows a breakdown of all the LoginRadius CIAM capabilities, including authentication, security, UX, scalability and multi-brand management.\"></p>\n<p>We’ve restructured our website to provide a straightforward breakdown of our customer identity and access management platform capabilities, helping you quickly find what you need:</p>\n<ul>\n<li>Authentication: Easily understand <a href=\"https://www.loginradius.com/blog/identity/authentication-option-for-your-product/\">how to choose the right login method</a>, from traditional passwords and OTPs to social login, federated SSO, and passkeys with few lines of code.</li>\n<li>Security: Implement no-code security features like bot detection, IP throttling, breached password alerts, DDoS protection, and adaptive MFA to safeguard user accounts.</li>\n<li>User Experience: Leverage AI builder, hosted pages, and drag-and-drop workflows to create smooth, branded sign-up and login experiences.</li>\n<li>High Performance &#x26; Scalability: Confidently scale with sub-100ms API response times, 100% uptime, 240K+ RPS, and 28+ global data center regions.</li>\n<li>Multi-Brand Management: Efficiently manage multiple identity apps, choosing isolated or shared data stores based on your brand’s unique needs.</li>\n</ul>\n<p>This structured layout ensures you can quickly understand each capability and how it integrates into your identity ecosystem.</p>\n<h3 id=\"developer-first-navigation\" style=\"position:relative;\"><a href=\"#developer-first-navigation\" aria-label=\"developer first navigation permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Developer-First Navigation</h3>\n<p><img src=\"/a8c155c2b6faf3d5f4b4de4e2b14d763/developers-menu.webp\" alt=\"This image shows the LoginRadius menu bar, highlighting the developer dropdown.\">   </p>\n<p>We’ve been analyzing developer workflows to identify how you access key resources. That’s why we redesigned our navigation with one goal in mind: to reduce clicks and make essential resources readily available.</p>\n<p>The new LoginRadius structure puts APIs, SDKs, and integration guides right at the menu bar under the Developers dropdown so you can get started faster. Our Products, Solutions, and Customer Services are also clearly categorized, helping development teams quickly find the right tools and make informed decisions.</p>\n<h3 id=\"quick-understanding-of-integration-benefits\" style=\"position:relative;\"><a href=\"#quick-understanding-of-integration-benefits\" aria-label=\"quick understanding of integration benefits permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Quick Understanding of Integration Benefits</h3>\n<p><img src=\"/b2f9a964a2da0ea83e2f8596b833bba7/we-support-your-tech-stack.webp\" alt=\"This image shows a list of popular programming languages and frameworks offered by LoginRadius.\"></p>\n<p>Developers now have a clear view of the tech stack available with LoginRadius, designed to support diverse business needs.</p>\n<p>Our platform offers pre-built SDKs for Node.js, Python, Java, and more, making CIAM integration seamless across popular programming languages and frameworks.</p>\n<h2 id=\"over-to-you-now\" style=\"position:relative;\"><a href=\"#over-to-you-now\" aria-label=\"over to you now permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Over to You Now!</h2>\n<p>Check out our <a href=\"https://www.loginradius.com/\">revamped LoginRadius website</a> and see how the improved experience makes it easier to build, scale, and secure your applications.</p>\n<p>Do not forget to explore the improved navigation and API documentation, and get started with our free trial today. We’re excited to see what you’ll build with LoginRadius!</p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"February 21, 2025","updated_date":null,"description":"LoginRadius’ vision is to give developers a product that simplifies identity management so they can focus on building, deploying, and scaling their applications. To enhance this experience, we’ve redesigned our website interface, making navigation more intuitive and reassuring that essential resources are easily accessible.","title":"Revamped & Ready: Introducing the New Developer-First LoginRadius Website","tags":["Developer tools","API","Identity Management","User Authentication"],"pinned":true,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.7857142857142858,"src":"/static/80b4e4fbe176a10a327d273504607f32/58556/hero-section.webp","srcSet":"/static/80b4e4fbe176a10a327d273504607f32/61e93/hero-section.webp 200w,\n/static/80b4e4fbe176a10a327d273504607f32/1f5c5/hero-section.webp 400w,\n/static/80b4e4fbe176a10a327d273504607f32/58556/hero-section.webp 800w,\n/static/80b4e4fbe176a10a327d273504607f32/99238/hero-section.webp 1200w,\n/static/80b4e4fbe176a10a327d273504607f32/7c22d/hero-section.webp 1600w,\n/static/80b4e4fbe176a10a327d273504607f32/1258b/hero-section.webp 2732w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},"pageContext":{"limit":6,"skip":618,"currentPage":104,"type":"///","numPages":161,"pinned":"ee8a4479-3471-53b1-bf62-d0d8dc3faaeb"}},"staticQueryHashes":["1171199041","1384082988","2100481360","23180105","528864852"]}