{"componentChunkName":"component---src-templates-blog-list-template-js","path":"/138","result":{"data":{"allMarkdownRemark":{"edges":[{"node":{"excerpt":"At LoginRadius, we are passionate about creating efficient processes to provide seamless online login experiences. At the KuppingerCole…","fields":{"slug":"/identity/kuppingercole-ciw-presentation/"},"html":"<p>At LoginRadius, we are passionate about creating efficient processes to provide seamless online login experiences. At the <a href=\"https://www.kuppingercole.com/events/ciwusa2019\">KuppingerCole Consumer Identity World</a> event in Seattle, our CEO, Rakesh Soni, gave an insightful presentation on the importance of Marketing and Engineering collaboration to achieve this goal. In essence, working together maximize's each team's strength by eliminating each team's limitations. His presentation can be downloaded <a href=\"http://go.pardot.com/l/547662/2019-10-01/725pkx/547662/299407/LoginRadiusBlog_KCCIW2019.pdf\">here</a> and you can read the summary below. </p>\n<h1 id=\"what-is-consumer-identity-world\" style=\"position:relative;\"><a href=\"#what-is-consumer-identity-world\" aria-label=\"what is consumer identity world permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is Consumer Identity World?</h1>\n<p>Consumer Identity World is a three-day annual conference hosted by KuppingerCole for leaders who secure consumer digital identities. Topics for discussion often include Customer Identity &#x26; Access Management (CIAM) strategies, customer privacy and consent management, and methods for improving customer experience.  </p>\n<p>KuppingerCole is a renowned, independent analyst organization that specializes in neutral advice, thought leadership, and practical relevance regarding CIAM, as well as IAM. The latter acronym stands for Identity &#x26; Access Management. Simply put, IAM is a platform built for managing and securing <em>employee</em> identities, rather than customer identities. More information about the difference between IAM vs. CIAM can be found <a href=\"https://www.loginradius.com/blog/2019/03/iam-vs-ciam/\">here</a>.</p>\n<h1 id=\"improving-security-and-service-for-customer-digital-identities\" style=\"position:relative;\"><a href=\"#improving-security-and-service-for-customer-digital-identities\" aria-label=\"improving security and service for customer digital identities permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Improving security and service for customer digital identities</h1>\n<p>Throughout the three days at Consumer Identity World, attendees networked and learned about the latest news in data security, privacy regulations, and login authentication. Our CEO, Rakesh, contributed to this conversation with a presentation on the vital need for Marketing and Engineering teams to unite. By combining the skills and insights of both teams, companies can better serve today’s modern digital user. </p>\n<h2 id=\"characteristics-of-the-modern-digital-user\" style=\"position:relative;\"><a href=\"#characteristics-of-the-modern-digital-user\" aria-label=\"characteristics of the modern digital user permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Characteristics of the modern digital user</h2>\n<p>Society is constantly becoming more digitalized. Online services completely changed consumer behavior—we shop, pay bills, and call rides online. So, when businesses provide services, they should understand the characteristics of today’s digital users. Here are a few:  </p>\n<ul>\n<li>Digital users are aware of what new technology can do (<a href=\"https://www.superoffice.com/blog/digital-transformation/\">SuperOffice</a>)</li>\n<li>They expect a frictionless experience (<a href=\"https://www.globenewswire.com/news-release/2018/08/21/1554497/0/en/New-Report-Shows-Identity-Verification-a-Priority-for-eCommerce-and-Online-Lending-Businesses.html\">Whitepages Pro</a>)</li>\n<li>They prefer self-service over human assistance (<a href=\"https://www.superoffice.com/blog/customer-self-service/\">Whitepages Pro</a>)</li>\n<li>They expect an <a href=\"https://www.loginradius.com/blog/growth/omnichannel-customer-experience/\">omnichannel</a> experience.</li>\n</ul>\n<p>Rakesh also stressed that digital users want quick, hassle-free service when: </p>\n<ul>\n<li>Arriving at a website—pages should load quickly </li>\n<li>Registering or requesting forgotten passwords </li>\n<li>Logging in or authenticating—systems should not crash</li>\n</ul>\n<h2 id=\"challenge-marketing--engineering-teams-are-so-different\" style=\"position:relative;\"><a href=\"#challenge-marketing--engineering-teams-are-so-different\" aria-label=\"challenge marketing  engineering teams are so different permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Challenge: Marketing &#x26; Engineering teams are so different</h2>\n<p><strong>Marketing Team Strengths</strong></p>\n<ul>\n<li>Messaging</li>\n<li>Visuals</li>\n<li>UX</li>\n</ul>\n<p><strong>Marketing Team Weaknesses</strong></p>\n<ul>\n<li>Software technicalities</li>\n<li>Influence on website speed</li>\n</ul>\n<p><strong>Engineering Team</strong> <strong>Strengths</strong></p>\n<ul>\n<li>Customer identity data input/output </li>\n<li>Web development</li>\n</ul>\n<p><strong>Engineering Team</strong> <strong>Weaknesses</strong></p>\n<ul>\n<li>Addressing Customer Experience (CX) </li>\n<li>Improving and implementing CX </li>\n</ul>\n<h2 id=\"solution-marketing-and-engineering-teams-can-collaborate\" style=\"position:relative;\"><a href=\"#solution-marketing-and-engineering-teams-can-collaborate\" aria-label=\"solution marketing and engineering teams can collaborate permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Solution: Marketing and Engineering teams can collaborate.</h2>\n<p> By combining their different skills and insights two teams become a stronger whole.</p>\n<h2 id=\"initiating-collaboration\" style=\"position:relative;\"><a href=\"#initiating-collaboration\" aria-label=\"initiating collaboration permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Initiating collaboration</h2>\n<p>There are two main ways to join Marketing and Engineering teams, so you can create a modern online experience. Here’s how your Executive Team can help implement this.</p>\n<p>The first way is for the Executive team to create a culture of collaboration between Marketing and Engineering. </p>\n<p>Make it clear that they both have the same goal:</p>\n<p>Both teams want to provide a frictionless online experience for customers. </p>\n<p><a href=\"https://www.loginradius.com/resource/kuppingercole-2019-consumer-authentication-report\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"kuppingercole\"\n        title=\"kuppingercole\"\n        src=\"/static/2614fdd2bd71f0e75288127a247194b4/e5715/kuppingercole.png\"\n        srcset=\"/static/2614fdd2bd71f0e75288127a247194b4/a6d36/kuppingercole.png 650w,\n/static/2614fdd2bd71f0e75288127a247194b4/e5715/kuppingercole.png 768w,\n/static/2614fdd2bd71f0e75288127a247194b4/63ff0/kuppingercole.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<p>Next, highlight each team’s strengths and how the other team contributes to the overall goal. Management should ensure their teams feel empowered and excited to work with each other. </p>\n<p>Additionally, the Executive team should seek to build a team of experts. This team should be responsible for developing and maintaining a high-performance system. </p>\n<p>Vital features of this system include:</p>\n<ul>\n<li>Unified experience across different brands under a parent organization</li>\n<li>Quick API response time of less than 400 ms</li>\n<li>Handle large peak loads of 100,000 logins/second</li>\n<li>Guarantee 99.99% system uptime</li>\n<li>Send password reset emails in less than 3 seconds</li>\n<li>Load pages in less than 750 ms</li>\n</ul>\n<p>Your collaborative dream team should include individuals who specialize in identity, DevOps, third-party integrations, UX, and consumer behaviour. They should continue to research and develop a high performing customer ID and experience engine. Once this in place, this team of experts should work to continuously maintain it. </p>\n<h3 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h3>\n<p>Creating collaboration between Marketing and Engineering can greatly improve online services. This culture and structure of working together is key in meeting these needs and evolving in the future. And it is up to the Executive team to ensure that this collaboration is successful. <br>\n<a href=\"http://go.pardot.com/l/547662/2019-10-01/725pkx/547662/299407/LoginRadiusBlog_KCCIW2019.pdf\">Click here</a> to download a PDF of the full presentation.</p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"October 04, 2019","updated_date":null,"description":"We are enthusiastic about building successful processes at LoginRadius to provide smooth online login experiences. Our CEO, Rakesh Soni, gave an informative presentation at the KuppingerCole Customer Identity World event in Seattle on the importance of collaboration between Marketing and Engineering to achieve this objective. In essence, working together maximises the power of each team by minimising the shortcomings of each team. It is possible to download his presentation here and you can read the review below.","title":"LoginRadius presents at KuppingerCole Consumer Identity World","tags":["media-and-publication"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.3333333333333333,"src":"/static/6d446adbeb752e6209ce6162d3ddeb67/33aa5/kuppingercole-ciw-presentation.jpg","srcSet":"/static/6d446adbeb752e6209ce6162d3ddeb67/f836f/kuppingercole-ciw-presentation.jpg 200w,\n/static/6d446adbeb752e6209ce6162d3ddeb67/2244e/kuppingercole-ciw-presentation.jpg 400w,\n/static/6d446adbeb752e6209ce6162d3ddeb67/33aa5/kuppingercole-ciw-presentation.jpg 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},{"node":{"excerpt":"In business, digital identity management primarily refers to the way a customer’s personal information is safely collected, stored, and…","fields":{"slug":"/identity/digital-identity-management/"},"html":"<p>In business, <a href=\"https://www.loginradius.com/blog/growth/identity-management-critical-revenue-generation/\">digital identity management</a> primarily refers to the way a customer’s personal information is safely collected, stored, and accessed.</p>\n<p>While this may appear simple, many businesses fall prey to misconceptions about building or managing a customer’s digital identity. To help you leverage customer identity data, let’s discuss the top three misconceptions that trip businesses up.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 56.30769230769231%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"Digital Identity Management 5 Ways to Win V01 02 02 1024x576\"\n        title=\"Digital Identity Management 5 Ways to Win V01 02 02 1024x576\"\n        src=\"/static/cf812201218c75e95d3906fa4df1fa74/e5715/Digital-Identity-Management-5-Ways-to-Win-V01.02-02-1024x576.png\"\n        srcset=\"/static/cf812201218c75e95d3906fa4df1fa74/a6d36/Digital-Identity-Management-5-Ways-to-Win-V01.02-02-1024x576.png 650w,\n/static/cf812201218c75e95d3906fa4df1fa74/e5715/Digital-Identity-Management-5-Ways-to-Win-V01.02-02-1024x576.png 768w,\n/static/cf812201218c75e95d3906fa4df1fa74/2bef9/Digital-Identity-Management-5-Ways-to-Win-V01.02-02-1024x576.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<h2 id=\"3-common-misconceptions-around-digital-identity\" style=\"position:relative;\"><a href=\"#3-common-misconceptions-around-digital-identity\" aria-label=\"3 common misconceptions around digital identity permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3 Common misconceptions around digital identity</h2>\n<ol>\n<li><strong>“<em>A digital identity must use highly personal identifiable information</em>.”</strong> </li>\n</ol>\n<p>Many businesses make the mistake of putting sensitive personal information like full names or social insurance numbers in their system to track customer identities. Due to the proliferation of data breaches, this is risky. Safer methods should be used instead, such as coded customer numbers.</p>\n<p>2. <strong>“<em>You can only get customer insights from surveys or forms.</em>”</strong></p>\n<p>Sure, one way of getting consumer insights is having them fill out a form on your site. Another way is to use a device ID to identify customer behavior</p>\n<p>But what about consumers who own multiple devices, have separate digital IDs at work and home, and access the internet through multiple IP addresses or 3rd-party apps? When you gather data from multiple sources, you’ll need to compile this and store it in one place. But how?</p>\n<p>With <a href=\"https://www.loginradius.com/blog/2019/06/customer-identity-and-access-management/\">customer identity and access management</a> (CIAM) software, you can access an individual’s extensive data from multiple sources. Even “anonymous” user data can help you create a customer identity. You can even gather data through <a href=\"https://www.loginradius.com/progressive-profiling/\">progressive profiling</a>—a gradual, more natural way for customers to share their personal information.   </p>\n<p>3. <strong>“<em>Consumer behavior analytics is all you need.</em>”</strong></p>\n<p>Due to marketing’s reliance on user experience mapping, session analytics, and content engagements, this myth is rampant. As a result, many businesses mistakenly think “behavioral” data is all they need for digital identity management. Not true. In the next section, we’ll explain why.  </p>\n<ul>\n<li><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 84.46153846153845%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"01 dashboard 1024x865\"\n        title=\"01 dashboard 1024x865\"\n        src=\"/static/7b84fa57112652b9ebbac7f00d938f89/e5715/01-dashboard-1024x865.png\"\n        srcset=\"/static/7b84fa57112652b9ebbac7f00d938f89/a6d36/01-dashboard-1024x865.png 650w,\n/static/7b84fa57112652b9ebbac7f00d938f89/e5715/01-dashboard-1024x865.png 768w,\n/static/7b84fa57112652b9ebbac7f00d938f89/2bef9/01-dashboard-1024x865.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></li>\n</ul>\n<h2 id=\"why-is-digital-identity-management-important\" style=\"position:relative;\"><a href=\"#why-is-digital-identity-management-important\" aria-label=\"why is digital identity management important permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Why is digital identity management important?</h2>\n<p>We live in an era where data is the most valuable commodity in the world. However, where there is <em>value,</em> there is also <em>risk</em>. For instance...</p>\n<p><strong>Did you know that <a href=\"https://www.inc.com/thomas-koulopoulos/the-biggest-risk-to-your-business-cant-be-eliminated-heres-how-you-can-survive-i.html\">60% of companies fail</a> within 6 months of a cyber attack?</strong></p>\n<p>Malicious software, hackers, online fraud, and user errors all pose a danger to the digital identification data that you collect or store. </p>\n<p><a href=\"https://www.loginradius.com/resource/digital-identity-trends-2019/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"digital-identity-trends-2019\"\n        title=\"digital-identity-trends-2019\"\n        src=\"/static/d58a9a4fc495f2ffccb7ca98a6b8e20b/e5715/digital-identity-trends-2019.png\"\n        srcset=\"/static/d58a9a4fc495f2ffccb7ca98a6b8e20b/a6d36/digital-identity-trends-2019.png 650w,\n/static/d58a9a4fc495f2ffccb7ca98a6b8e20b/e5715/digital-identity-trends-2019.png 768w,\n/static/d58a9a4fc495f2ffccb7ca98a6b8e20b/63ff0/digital-identity-trends-2019.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<p>For businesses that collect or store customer data, security is vital to winning and maintaining customer trust. If you’re uncertain how, here are 5 methods that can help.</p>\n<h2 id=\"5-gold-standards-for-winning-customer-trust\" style=\"position:relative;\"><a href=\"#5-gold-standards-for-winning-customer-trust\" aria-label=\"5 gold standards for winning customer trust permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>5 Gold Standards for Winning Customer Trust</h2>\n<p>1. <strong>Collect only what’s needed</strong></p>\n<p>Many businesses are quick to collect an array of customer data during the registration process. If you don’t take the time to consider if/why/how you’ll use all of this data— or determine the right time to collect this information—you’ll run into a lot of issues. </p>\n<p>Collecting unnecessary data wastes resources and increases the risk of identity theft. Plus, gathering too much data also causes customers to abandon registration, as it slows down the process and feels intrusive.  </p>\n<p>2. <strong>Invest in data encryption and hashing.</strong></p>\n<p>When data is in transit from one server to another, it’s at its most vulnerable. That’s why <a href=\"https://www.loginradius.com/data-governance/\">encryption in transit</a> is crucial to data protection. Likewise, encryption at rest is necessary for data governance and compliance efforts. </p>\n<p>When it comes to hackers, anything that has been coded can be decoded. Thus, utilizing <a href=\"https://www.loginradius.com/docs/infrastructure-and-security/cryptographic-hashing-algorithms/\">one-way hashing</a> for safeguarding sensitive data like passwords is a must-do.</p>\n<p>Safety Tip: When you implement encryption at rest and encryption in transit, be sure that you’re using a platform with an ISO 27001 certification. This ensures that your system complies with industry-leading standards for information security and risk management.   </p>\n<p>3. <strong>Limit access to data.</strong></p>\n<p>Not all data is in use continuously. That’s why sensitive customer data should not be accessible to everyone, all the time. </p>\n<p>Utilizing field-level encryption allows you to set up access based on an individual’s role. In other words, field-level encryption is the ability to encrypt data within specific <a href=\"https://searchoracle.techtarget.com/definition/field\">data fields</a>, making this data unreadable to anyone who lacks access or the keys to decrypt this data.  </p>\n<p>4. <strong>Require safer authentication.</strong></p>\n<p>While some tech-savvy users know how to look after their personal information, many are unaware of how digital identity verification impacts security. </p>\n<p>To reduce risk, it’s important to invest in systems that enable a higher level of passwordless login. One method, <a href=\"https://www.loginradius.com/blog/identity/what-is-multi-factor-authentication/\">multi-factor authentication</a> (MFA), uses an SMS or a call-in code, and/or an email link as extra levels of security. </p>\n<p>Another method, risk-based authentication (RBA), recognizes user patterns and alerts your system if this pattern suddenly changes. For example, if someone tries to log in from a foreign country or a new IP address, an email will be sent to the registered user, asking them to validate the action.   </p>\n<p>5. <strong>Respect your customers.</strong></p>\n<p>In the past, digital identity management practices were not very respectful of customer privacy. But soon, customers demanded better—and <a href=\"https://en.wikipedia.org/wiki/Regulatory_compliance\">compliance regulations</a> were born. </p>\n<p>Compliance regulations require businesses to communicate with customers about why their data is collected, by whom, and what will be done with it. It also demands customer consent before collecting their data.</p>\n<p>Did you know that requesting consent can also strengthen your brand reputation and build customer trust? That’s why it’s smart to employ a <a href=\"https://www.loginradius.com/compliances/\">compliance-ready platform</a> now. This will prepare your business for global data regulations while also fostering customer loyalty.</p>\n<h3 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h3>\n<p><strong>Is there one way to achieve all 5 gold standards?</strong>  </p>\n<p>Yes—with CIAM software. LoginRadius CIAM offers a variety of highly-secure customer identity management features. For added peace of mind, LoginRadius keeps its platforms ahead of emerging data regulations and consistently performs rigorous updates.</p>\n<p><a href=\"https://www.loginradius.com/resource/digital-identity-trends-2020/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAGCAYAAADDl76dAAAACXBIWXMAAAsTAAALEwEAmpwYAAABcElEQVQY0z2QTUsCURiFXZSODoqKI6SmiJk6fpDi5PdHyiiaBi7SsDZBEhoUFOiioEVEBUGL/kC7Fq6iWrSoZYvatOn3nN47moszc+E+73nvOSrtchZMOl8OvD8/1eSsm979i1tKQxcswSQ1YQ6XoBVL4PwFaL2ZGaNiH57MjATwATIJ5JS/PrQGIV6DQSyCmw5oPCnwYRnO8jbEchuc1II6VIGWFnHerMIphuzgybcQlDtwpptwZTZgiVXAiwUYgkVoaMAcKcORWIdjtY4FurNJNdjjVbhSDTiTDQgr8uSF/9ttBNoSdViiMowRikOxmfRkyhhWCeNMlMQaqyqGQrSiiFU0i8xg1pedtloJFkg22mYnY7dUn3TlI3AxjsPzW3z9/OLx6Q0P42fSCz4+vzF+fSeuDDVVokRmA/LmPpo7R6h0DtDdG6K9e4JubwgnxZwncM6dRGmrj9HVPQZnNxicXqNPOr64Q290qXTNqvkD15rHCllLj7YAAAAASUVORK5CYII='); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"LoginRadius Consumer Identity Trend Report\"\n        title=\"LoginRadius Consumer Identity Trend Report\"\n        src=\"/static/cebed5675feefa92419eb94658dede02/e5715/LoginRadius-Consumer-Identity-Trend-Report-1-1024x310.png\"\n        srcset=\"/static/cebed5675feefa92419eb94658dede02/a6d36/LoginRadius-Consumer-Identity-Trend-Report-1-1024x310.png 650w,\n/static/cebed5675feefa92419eb94658dede02/e5715/LoginRadius-Consumer-Identity-Trend-Report-1-1024x310.png 768w,\n/static/cebed5675feefa92419eb94658dede02/2bef9/LoginRadius-Consumer-Identity-Trend-Report-1-1024x310.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"October 01, 2019","updated_date":null,"description":"In industry , digital identity management relates specifically to how the personal information of a customer is obtained, processed, and accessed safely.","title":"Digital Identity Management: 5 Ways to Win Customer Trust","tags":["digital identity management","ciam solution","cx"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.7241379310344827,"src":"/static/d19a663d4d5e27408cda225deb50f0f8/33aa5/digital-identity-mngmnt.jpg","srcSet":"/static/d19a663d4d5e27408cda225deb50f0f8/f836f/digital-identity-mngmnt.jpg 200w,\n/static/d19a663d4d5e27408cda225deb50f0f8/2244e/digital-identity-mngmnt.jpg 400w,\n/static/d19a663d4d5e27408cda225deb50f0f8/33aa5/digital-identity-mngmnt.jpg 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},{"node":{"excerpt":"Last week, we had a great time participating in Vancouver Startup Week's Community Crawl.   The Community Crawl is like a pub crawl except…","fields":{"slug":"/growth/how-to-throw-a-tiki-tech-party/"},"html":"<p>Last week, we had a great time participating in Vancouver Startup Week's Community Crawl. </p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 52.307692307692314%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"VWS V01 03 LinkedIn 1 1200x627 1 1024x536\"\n        title=\"VWS V01 03 LinkedIn 1 1200x627 1 1024x536\"\n        src=\"/static/573169116baffc1c98a046e612c30052/e5715/VWS-V01.03_LinkedIn-1-1200x627-1-1024x536.png\"\n        srcset=\"/static/573169116baffc1c98a046e612c30052/a6d36/VWS-V01.03_LinkedIn-1-1200x627-1-1024x536.png 650w,\n/static/573169116baffc1c98a046e612c30052/e5715/VWS-V01.03_LinkedIn-1-1200x627-1-1024x536.png 768w,\n/static/573169116baffc1c98a046e612c30052/2bef9/VWS-V01.03_LinkedIn-1-1200x627-1-1024x536.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>The Community Crawl is like a pub crawl except you hop from startup offices to startup offices. It’s an engaging open house event where guests can check out different startups. Over a dozen startups opened their doors, so <strong>thanks to everyone who took the time to check us out!</strong> </p>\n<p>Those who attended immediately noticed our new spacious office space, complete with a custom-made tiki bar! Because, why not, right?</p>\n<p>To celebrate our move and christen our new space and tiki bar, we hosted a tiki party, replete with festive Hawaiian leis and shirts. </p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 64.3076923076923%; position: relative; bottom: 0; left: 0; background-image: url('data:image/jpeg;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"IMG 1257a 1 1024x658\"\n        title=\"IMG 1257a 1 1024x658\"\n        src=\"/static/a2ac2c7a2c35353c3aed20eee963e715/212bf/IMG_1257a-1-1024x658.jpg\"\n        srcset=\"/static/a2ac2c7a2c35353c3aed20eee963e715/6aca1/IMG_1257a-1-1024x658.jpg 650w,\n/static/a2ac2c7a2c35353c3aed20eee963e715/212bf/IMG_1257a-1-1024x658.jpg 768w,\n/static/a2ac2c7a2c35353c3aed20eee963e715/72e01/IMG_1257a-1-1024x658.jpg 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p><em>LoginRadius founder &#x26; CEO, Rakesh Soni, enjoying our new custom-made tiki bar.</em> </p>\n<p>Our “Tiki Tech” party was a great way to bring our team together and mingle with the Vancouver Startup community. Want to know how to throw a tiki party? Here’s an easy guide…</p>\n<h2 id=\"create-a-tiki-tastic-atmosphere\" style=\"position:relative;\"><a href=\"#create-a-tiki-tastic-atmosphere\" aria-label=\"create a tiki tastic atmosphere permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Create a tiki-tastic atmosphere</h2>\n<p>What’s a tiki-tastic atmosphere? You’ll know it when it feels like summer at your office despite the Raincouver weather. Here are some fun motifs you can buy for <em>cheap!</em></p>\n<h3 id=\"start-with-fun-decorations\" style=\"position:relative;\"><a href=\"#start-with-fun-decorations\" aria-label=\"start with fun decorations permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Start with fun decorations</h3>\n<p>Being a startup with a modest budget, we had to be creative with the DIY decor. </p>\n<p>We painted colourful signs on cardboard and made little pineapple lanterns which we strung across the room. Then, to brighten the room, we added flamingo-pink dangling paper tissue balls from the ceiling. Hanging decorations from the ceiling are better than sticking them on walls. It makes a room look full and festive with very little material.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 64.3076923076923%; position: relative; bottom: 0; left: 0; background-image: url('data:image/jpeg;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"IMG 1132a 1024x658\"\n        title=\"IMG 1132a 1024x658\"\n        src=\"/static/ed31734f0005e230a16d7a218462ff03/212bf/IMG_1132a-1024x658.jpg\"\n        srcset=\"/static/ed31734f0005e230a16d7a218462ff03/6aca1/IMG_1132a-1024x658.jpg 650w,\n/static/ed31734f0005e230a16d7a218462ff03/212bf/IMG_1132a-1024x658.jpg 768w,\n/static/ed31734f0005e230a16d7a218462ff03/72e01/IMG_1132a-1024x658.jpg 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p><em>We bought yellow lanterns and turned them into pineapples.</em> </p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 64.3076923076923%; position: relative; bottom: 0; left: 0; background-image: url('data:image/jpeg;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"IMG 1215a 1 1024x658\"\n        title=\"IMG 1215a 1 1024x658\"\n        src=\"/static/14744fe631c5a4c99449b64651bea697/212bf/IMG_1215a-1-1024x658.jpg\"\n        srcset=\"/static/14744fe631c5a4c99449b64651bea697/6aca1/IMG_1215a-1-1024x658.jpg 650w,\n/static/14744fe631c5a4c99449b64651bea697/212bf/IMG_1215a-1-1024x658.jpg 768w,\n/static/14744fe631c5a4c99449b64651bea697/72e01/IMG_1215a-1-1024x658.jpg 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p><em>We placed hand-painted signs, including our drinks menu, all over the room.</em></p>\n<h3 id=\"provide-ambiance-with-music\" style=\"position:relative;\"><a href=\"#provide-ambiance-with-music\" aria-label=\"provide ambiance with music permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Provide ambiance with music</h3>\n<p>Another easy way to add more tiki into a room is by playing music. We found a pre-made tiki playlist on a streaming app and let it loop throughout the night. There wasn’t any official dancing at our party, but we had lots of people bobbing their heads or tapping their feet to the beat. </p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 64.3076923076923%; position: relative; bottom: 0; left: 0; background-image: url('data:image/jpeg;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"IMG 1178a 1024x658\"\n        title=\"IMG 1178a 1024x658\"\n        src=\"/static/0ea74b51b0365d4faf69dd6e13596514/212bf/IMG_1178a-1024x658.jpg\"\n        srcset=\"/static/0ea74b51b0365d4faf69dd6e13596514/6aca1/IMG_1178a-1024x658.jpg 650w,\n/static/0ea74b51b0365d4faf69dd6e13596514/212bf/IMG_1178a-1024x658.jpg 768w,\n/static/0ea74b51b0365d4faf69dd6e13596514/72e01/IMG_1178a-1024x658.jpg 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p><em>Our team members and guests having fun at our tiki tech party.</em> </p>\n<h2 id=\"decorate-your-glorious-tiki-bar\" style=\"position:relative;\"><a href=\"#decorate-your-glorious-tiki-bar\" aria-label=\"decorate your glorious tiki bar permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Decorate your glorious tiki bar</h2>\n<p>The tiki bar was made by a local carpenter. He came by our office to look at the space where the tiki bar will be housed, take measurements, and listen to vision for this piece of resistance. </p>\n<p>What he built was better than what we expected! The frame is made of durable wood and lined with the bamboo-like exterior. On the inside, we have a fridge for the keg and another fridge for other drinks. On the surface of the bar is the tap for the beer. The front was lined with LED lights that changed colours. Everything is covered by a thatched roof, completing the tiki look. </p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 64.3076923076923%; position: relative; bottom: 0; left: 0; background-image: url('data:image/jpeg;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"IMG 1238 1a 1024x658\"\n        title=\"IMG 1238 1a 1024x658\"\n        src=\"/static/563578dd28b0097f605df6d741e21edb/212bf/IMG_1238-1a-1024x658.jpg\"\n        srcset=\"/static/563578dd28b0097f605df6d741e21edb/6aca1/IMG_1238-1a-1024x658.jpg 650w,\n/static/563578dd28b0097f605df6d741e21edb/212bf/IMG_1238-1a-1024x658.jpg 768w,\n/static/563578dd28b0097f605df6d741e21edb/72e01/IMG_1238-1a-1024x658.jpg 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p><em>To the left is Mark from Torlay, our local carpenter, who designed and built our lovely tiki bar!</em></p>\n<h2 id=\"provide-delicious-tropical-cocktails\" style=\"position:relative;\"><a href=\"#provide-delicious-tropical-cocktails\" aria-label=\"provide delicious tropical cocktails permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Provide delicious tropical cocktails </h2>\n<p>No tiki party is complete without tropical cocktails…especially on a Friday afternoon after a long workweek. Luckily for us, we had an impressive tiki bar where we served endless drinks to our team members and guests. </p>\n<p>So that you’re prepared for guests, it’s wise to plan a drink menu a few days or weeks ahead of time. This gives you time to get cool ingredients or tiki-themed cups, umbrellas—whatever moves you!</p>\n<p>To ensure a fun relaxing night for everyone, we hired a bartender. His lime margaritas were to die for—and the sound of a cocktail in a shaker just adds to the festive vibe.</p>\n<p>The tap beer on the tiki bar was also a celebration on its own. Plus, right before the event, one of our team members whipped up some killer tropical sangria.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 64.3076923076923%; position: relative; bottom: 0; left: 0; background-image: url('data:image/jpeg;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"IMG 1149a 1024x658\"\n        title=\"IMG 1149a 1024x658\"\n        src=\"/static/67841f0996bdf0a1eda6446ee679ae6c/212bf/IMG_1149a-1024x658.jpg\"\n        srcset=\"/static/67841f0996bdf0a1eda6446ee679ae6c/6aca1/IMG_1149a-1024x658.jpg 650w,\n/static/67841f0996bdf0a1eda6446ee679ae6c/212bf/IMG_1149a-1024x658.jpg 768w,\n/static/67841f0996bdf0a1eda6446ee679ae6c/72e01/IMG_1149a-1024x658.jpg 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p><em>Our bartender, Sam, making amazing tropical drinks for us all night long.</em> </p>\n<p>Whether you do or don’t have a tiki bar, you can create the vibe around your cocktail table. Just use festive decorations or painted signs, plus fun tropical cups. And of course, use some tropical beverage ingredients, if you can! Then lean back and watch your guests get into tiki mood. </p>\n<h2 id=\"lei-on-a-warm-welcome-to-your-guests\" style=\"position:relative;\"><a href=\"#lei-on-a-warm-welcome-to-your-guests\" aria-label=\"lei on a warm welcome to your guests permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Lei on a warm welcome to your guests</h2>\n<p>The first impression is everything. Each guest who came through our doors received a flower lei over their heads. It’s a great way to create that instant tiki environment. We went a step further and created little tags for each lei with our company logo and a QR code that took them to our <a href=\"https://www.loginradius.com/careers/\">Careers page</a> for those who are interested in joining us for more than just a tiki party. </p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 64.3076923076923%; position: relative; bottom: 0; left: 0; background-image: url('data:image/jpeg;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"IMG 1244a 1024x658\"\n        title=\"IMG 1244a 1024x658\"\n        src=\"/static/026ba725189503bf71758b0fb34bb8d8/212bf/IMG_1244a-1024x658.jpg\"\n        srcset=\"/static/026ba725189503bf71758b0fb34bb8d8/6aca1/IMG_1244a-1024x658.jpg 650w,\n/static/026ba725189503bf71758b0fb34bb8d8/212bf/IMG_1244a-1024x658.jpg 768w,\n/static/026ba725189503bf71758b0fb34bb8d8/72e01/IMG_1244a-1024x658.jpg 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p><em>Lovely volunteers from Vancouver Startup Week helped us give leis to our guests.</em> </p>\n<h2 id=\"include-an-engaging-tech-activity\" style=\"position:relative;\"><a href=\"#include-an-engaging-tech-activity\" aria-label=\"include an engaging tech activity permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Include an engaging tech activity</h2>\n<p>On our TV, we displayed a one-minute online survey that can be taken on mobile phones. Since LoginRadius secures digital identities, we asked our guests to check all the different digital identities they used in the past week. This included emails, online banking, various video games, social media, and more. </p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 64.3076923076923%; position: relative; bottom: 0; left: 0; background-image: url('data:image/jpeg;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"IMG 1159a 1024x658\"\n        title=\"IMG 1159a 1024x658\"\n        src=\"/static/5d3b2173d8fc7f14ece0e118789f6382/212bf/IMG_1159a-1024x658.jpg\"\n        srcset=\"/static/5d3b2173d8fc7f14ece0e118789f6382/6aca1/IMG_1159a-1024x658.jpg 650w,\n/static/5d3b2173d8fc7f14ece0e118789f6382/212bf/IMG_1159a-1024x658.jpg 768w,\n/static/5d3b2173d8fc7f14ece0e118789f6382/72e01/IMG_1159a-1024x658.jpg 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p><em>Individuals scanned the QR code on our TV to take our one-minute digital identity survey.</em> </p>\n<p>We had close to 90 guests and team member join our party. Based on our study, the most popular digital identity was work and personal emails. Nearly 100% of respondents used these two digital identities in the past week! </p>\n<p>Work and personal emails are closely followed by LinkedIn. Our survey states that 91.3% of respondents used LinkedIn in the past week. This is interesting because according to Hootsuite, Facebook is the most popular social media website. Yet, Facebook/Instagram fell behind LinkedIn at 82.6%. This data may be influenced by Vancouver Startup Week. In preparing for this networking event, individuals might have recently checked and updated their professional profile on LinkedIn. </p>\n<p>On average, respondents used about 13 different digital identities that week. This not only raised awareness for our guests as consumers, but it also encouraged us as an identity management platform to continue creating stronger security and easier login authentication methods that organizations can use for their customers. </p>\n<h2 id=\"be-open-to-a-spontaneous-after-party\" style=\"position:relative;\"><a href=\"#be-open-to-a-spontaneous-after-party\" aria-label=\"be open to a spontaneous after party permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Be open to a spontaneous after party</h2>\n<p>On a weekend night, what better way to end a party than with an after-party? We had a group of people who were interested in continuing the fun after the predestined party time. This included both the CEO and CTO. Originally, they were going to move locations. However, since our office space was available for further into the night, everyone decided to stay there. Instead, we ordered pizza and took advantage of the overabundant storage of drinks supplied for the original party. </p>\n<p>Planning fun parties can be exhausting. Allowing spontaneous after parties can help you feel free and serve as a reminder that an enjoyable event doesn’t always have to be stringently planned. </p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 64.3076923076923%; position: relative; bottom: 0; left: 0; background-image: url('data:image/jpeg;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"IMG 20190913 200408a 1024x659\"\n        title=\"IMG 20190913 200408a 1024x659\"\n        src=\"/static/703bf368a16b1a768cd28708721cdaa1/212bf/IMG_20190913_200408a-1024x659.jpg\"\n        srcset=\"/static/703bf368a16b1a768cd28708721cdaa1/6aca1/IMG_20190913_200408a-1024x659.jpg 650w,\n/static/703bf368a16b1a768cd28708721cdaa1/212bf/IMG_20190913_200408a-1024x659.jpg 768w,\n/static/703bf368a16b1a768cd28708721cdaa1/72e01/IMG_20190913_200408a-1024x659.jpg 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p><em>The after-party selfie—no party is complete without it!</em></p>\n<h3 id=\"final-thoughts\" style=\"position:relative;\"><a href=\"#final-thoughts\" aria-label=\"final thoughts permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Final Thoughts</h3>\n<p>Sharing our tiki bar with the community led to lots of memorable meetings. Thanks to everyone who enjoyed our tropical drinks, embraced our leis, basked in our tiki atmosphere, and participated in our survey. We loved having the Vancouver Startup Community visit our office and we hope to see you at our future tiki events!</p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"September 20, 2019","updated_date":null,"description":"Except that you hop from start-up offices to start-up offices, Neighborhood Crawl is like a pub crawl. It's an interesting open house event where tourists can check out various start-ups. More than a dozen startups have opened their doors, so thank you to anyone who has taken the time to check us out!","title":"How To Throw A Tiki Tech Party","tags":null,"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.550387596899225,"src":"/static/fc79693488b45fdec73ed791b9de6aed/14b42/how-to-throw-a-tiki-tech-party.jpg","srcSet":"/static/fc79693488b45fdec73ed791b9de6aed/f836f/how-to-throw-a-tiki-tech-party.jpg 200w,\n/static/fc79693488b45fdec73ed791b9de6aed/2244e/how-to-throw-a-tiki-tech-party.jpg 400w,\n/static/fc79693488b45fdec73ed791b9de6aed/14b42/how-to-throw-a-tiki-tech-party.jpg 800w,\n/static/fc79693488b45fdec73ed791b9de6aed/47498/how-to-throw-a-tiki-tech-party.jpg 1200w,\n/static/fc79693488b45fdec73ed791b9de6aed/0e329/how-to-throw-a-tiki-tech-party.jpg 1600w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Karl Wittig","github":null,"avatar":null}}}},{"node":{"excerpt":"In a world where data is the most valuable resource, it’s logical that there will be new regulations to protect consumer data. With media…","fields":{"slug":"/identity/ccpa-vs-gdpr-the-compliance-war/"},"html":"<p>In a world where data is the <strong>most valuable resource,</strong> it’s logical that there will be new regulations to protect consumer data. With media outlets covering more data scandal stories than ever, consumers are increasingly more aware of data collection and how it affects them. With this in mind, global compliance regulations support consumer rights to data privacy and consent.</p>\n<p>Two such regulations are the EU’s GDPR (General Data Protection Regulation, in effect May 25, 2018) and the CCPA (California Consumer Privacy Act, in effect January 1, 2020). These are two of the first regulations that directly impact data collection, use, and storage on a widespread scale. </p>\n<p>Understanding the impact of GDPR and <a href=\"https://www.loginradius.com/blog/identity/ccpa-introduction/\">CCPA regulations is crucial for global compliance</a> today—and in the future. In fact, these regulations foreshadow a certain trend toward data collection and management: More governing bodies will implement privacy and consent regulations with heftier repercussions for noncompliance.</p>\n<p>To help you understand <a href=\"https://www.loginradius.com/blog/identity/2020/03/how-loginradius-helps-enterprises-stay-ccpa-compliant-in-2020/\">how these regulations can affect you</a>, here’s an overview of GDPR vs CCPA.</p>\n<h2 id=\"similarities-and-differences-ccpa-vs-gdpr\" style=\"position:relative;\"><a href=\"#similarities-and-differences-ccpa-vs-gdpr\" aria-label=\"similarities and differences ccpa vs gdpr permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Similarities and Differences: CCPA vs GDPR </h2>\n<p><strong>Here are the most notable <em>similarities</em></strong> <strong>between the CCPA and the GDPR:</strong> </p>\n<ul>\n<li><strong>Where are these in effect?</strong> Anywhere within the government’s jurisdiction.</li>\n<li><strong>Who do the laws protect?</strong> Any residents of this jurisdiction.</li>\n<li><strong>When is a business responsible?</strong> Anytime they interact with the data of a resident.</li>\n<li><strong>What rights do customers have over their data?</strong> Both CCPA and GDPR compliance rules allow users the right to access, correct, stop the processing of, and delete their data.</li>\n</ul>\n<p><a href=\"https://www.loginradius.com/resource/the-ccpa-and-customer-identity\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"WP The CCPA and Customer Identity Reaping the Benefits of Compliance 1024x310\"\n        title=\"WP The CCPA and Customer Identity Reaping the Benefits of Compliance 1024x310\"\n        src=\"/static/f33233280c3b9df57a5a3b7ae3a84b9e/e5715/WP-The-CCPA-and-Customer-Identity-Reaping-the-Benefits-of-Compliance-1024x310.png\"\n        srcset=\"/static/f33233280c3b9df57a5a3b7ae3a84b9e/a6d36/WP-The-CCPA-and-Customer-Identity-Reaping-the-Benefits-of-Compliance-1024x310.png 650w,\n/static/f33233280c3b9df57a5a3b7ae3a84b9e/e5715/WP-The-CCPA-and-Customer-Identity-Reaping-the-Benefits-of-Compliance-1024x310.png 768w,\n/static/f33233280c3b9df57a5a3b7ae3a84b9e/2bef9/WP-The-CCPA-and-Customer-Identity-Reaping-the-Benefits-of-Compliance-1024x310.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<p><strong>For more info on CCPA compliance, check out our white paper.</strong></p>\n<p><strong>Here are the most notable <em>differences</em></strong> <strong>between CCPA and GDPR compliance:</strong></p>\n<ul>\n<li><strong>Who do the laws affect?</strong> Any business that collects data from these residents, <em>regardless of where the business is based</em>. The GDPR does not look at the size of the business when implementing its regulations. The CCPA, however, requires businesses to be a certain size or possess a certain amount of data before the law will be enforced.</li>\n<li><strong>How are compliance violations punished?</strong> Directly through fines and indirectly through the media and public relations. Fines accrued via the GDPR are linked to and capped based on a company’s annual revenue, whereas CCPA fines have no ceiling and are assessed on a per violation basis.</li>\n<li><strong>How do consumers opt-in/out?</strong> Prior to collecting data, the GDPR requires that businesses ask consumers to opt-in. The CCPA takes a slightly less intensive approach, requiring that businesses allow users to opt-out of collection.</li>\n<li><strong>How are third-party transfers affected?</strong> The CCPA requires that you give a customer notice before the sale and transfer of their data, so that they may stop it. The GDPR requires explicit consent from customers before third-party processing or transfers occur.</li>\n</ul>\n<p>For more tips on CCPA and GDPR compliance, check out the infographic by LoginRadius.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 523.5384615384615%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAABpCAIAAAC1V5RFAAAACXBIWXMAAAsSAAALEgHS3X78AAASM0lEQVRYw5VZZ3QUV5YuBUA5gHIOKIGEWjmDsAIiWRLBYAwztoHBXvCs48zsOXO8e/xnbJ89Z3Z212uvxx6P0ziMjW2CxWAyCEkoodhqqXPOobq6q3PtV9VCxoY/+87VO6/qvftuvnVvi4hZ3xBb2hZT2pZQ1pZasSVt09bY9Q0xhfUPhej1jZEFDdEF9fFFjXFFjUR0YWNCy6HYjhNl2470/eLU3qMv5NVtW5NTE1vIHgpCTCGua1iTW5tV013evgf4icVNACIqvw4QXdQclVeLc5F5deGZvDBAxqawzMrwLF5I+qZQbr06pyanrqdx15H4ktbIvNqogvpl5Ki8mugCFm1taeuuIye3P/5s98ETG7f0VXbs23fsxf3HXtx5+GRCSTPwI/Lro9Y3RYOvQrBdUB/LcYXLUiva8+t7eh5/BrC5/8lH9h7ddvDEriOn2vc8vf3QM4UN29eWtoBG9PomkI3Kr2WR121oSyhpWp1T3XXgV4dP/cuBE6+073lq++PP9D35z0+c/G3vk7/e0v8Urjv07G/7n3oeZKKKWuJq+6JLNhNxRU3QcEJJSyw0yYkdX9yEdXxR07qyVnZR3ASGcQxbIIg3cUXNCXW9CdU7CSJtEwupFURKOZFaHpJakVbRnl3diRtTy9uTN25O29SOdfqm9vCMSiK5nD2ZVkmsKyGSNxA9h09uP3xyx+FT2znoOXxq55GTu1g4tQyHTwJ2ssdO/QhH2JlwMYwrwDj9jJdhwcXNDw5vgKH97C7NMB6GcWMRYAiS9nw8bf6abxHKVOMLErnRZnR4aLfH41m+xOv14kFNun5zRa2wuaUa44RAKlKbcIyY0NKPnlb+/qbxq/OX/v3Pn92eFpAelo7D4RybmhubniPtlA+kfIF3Ji1vjtnGZwVvffzN+et3bC4/IbZ65g20wuoyO9xmp9fmDlhov9vP3J1d+PbClS++u3BrZIL2+Kwuv432zhucOrtLT9IWmn1DUB5GotSAwug0/8bImERjsLkZp9dPOTCcIAtweX1Wd0AgVY7dnZ0TykRK3ZJcA0oEFACaapNNa6HUJtLidEMZgQcUBiUZKZfGROptTpPDbbTTTn+AOHt16OzVYcgQBKwvXB++eO32hSu3Bi7fHMB8dfDS9aGLN0bOXRsJnjl3dRjrs1eGiFVZPCK9PCS9IhTRwwUQkVaevmlrVlVncfOu3Jru3Npu+BaRVoGtUPZYRcg9YN0TURWRW4sYjsitgYciDIuadlZ17a/ueqx228GKrXtw16rsKmytycWZWjY2uDgn4Ojxxc1Z1V159T3ZNV2ZVZ25dT3rNmyOyKvD0fDsqqTyLZlVXdm123Amu7Y7ndeRWNqKWMBdLDIe8ht2rm/aVdCwo7BxR3Hz7pya7mjufWJpS2HTLrxEqAKKmneBALaWkZGxwDkSWEp5eybvEcQAQjOlfAtkiS9pwVZcSWsGr6OgvgfpKZPXEWQ4/n7kxA1b0iofARr0lF3dlVH5CBebbCQmlLYFkUE5q6ojmNt+RMah2KKmTF4n2Cto2M6GYUV7UBdBpnAdVMjt9iBPRa0gI4cklLYkVWyFqnJquvJqt0EqiASVrmUzTPO6je05td3IQbBcUlkbcJB015a1IhMTISkbEeWhmbzI/LoYNmM3xKxvXJVVhaQZllEZll4Rnl0DtXOiNiBVweDIrasyecS6UmLfiVf2/oqF3qdfXIG+Yy/1H3s5uO4/9lLv0y/1HuXeH2XfA/rw+NQLhNJIygw2+C28F+Hu5MDh+wk4Md/3Ho8UB4TCSCqNNrnZuWh2aeweg8Mntri1lE9D+dV2n5ryqUgvFiq7T0l6gyC3ek1OH6KSDUm7lzHSfqXNA2Szm7k1I7o4MnPmxvgXFwcvDE0DPhu4OTwvNdCMmvToKK/Q7DE6fTa3n0BCUOBuym90MzoXo3cxoCOzuJd05KKOFOrtEpNTanap7V4Ddmn2gNzmNdN+NhmAutoRkOksEzP8mfnFKf7i9MISXyyjvAzlDUBCg80xIxBOCMRTC8Ip/tKMQES62DTCIltpP8STGKkbfMX1efnUknRiVjAvVljZfOSzexiFmfphVnF9QTUlkIzPLiCfIFXdQ3b5oQykJbnJDsbwaHF6rTQrEpIZZgPlEeqsSB14idSDGy0uvymYw/DHKpD0BvUJ+SGS3OYRWzwyqwdHTRwCJ2SQYEDv9OkdPhPtJ2hvAODw+h3sHHB6A0idPi5p+RnGF2DzWSCY9LmTNHfGyS2I+7NcIMBmPqVaOzkzr9bqhsenhBLZ9LxgYmZeodKsHFgZP0NmZ5JyqLQGo9kqU6r1JotIqhBKFRqd8eHIeGWz2SwWC0mSmCnK7qAop8Oxcsjn8zmctNGGDedDkDUajVqt1mq1CoUCM5/PFwgEDCety+VWanSD04s3ZsRzSjPpcDH3EvsyMmharVa73Y4FuMCM71vwepqmNSbb1WnxucGpBR0l1llXBFxGBkGZTKZUKrHALBQKpVJpcMtoMmvM9imFeVSonlZZ4A4/QX7oAJqdcpgsVqeTtthIgUI/JlQLVGavP/Bzbfv97JfNhq+pzw/12Eh7EG1Fvf5AAGgPNxXlcErkKoDBZDZbSSf9IxpUABWaTCaLxeyi6fu3iCBZs42ck2oBWr0RVcEKNcwwxDQ3YAKRWIzZ6Vw2GBG8BTa8PCG4PDav0Bqgaytpd7s9QWRo22Qys1aAPUDdbAKxn3uY3kZrrY57dYjPTjltJIXZ64OnM06XR2l2qEm3y/+AzChZII+Lhl/Buyi32w3pYHY4ltVm1xtNczLdD+OLYyKd0IigYFbYXhbs3Lnzly5dHh8fv3PnztTU1O3btycmJtxsncBYbaTE6Lg8uSQyOacVZtr3c207xBJJ0E/gHlAMhKRdLpiNdrn1BqNYpR8XqSckepnZ+ZCoghpgBs89VYMjJ+0yWeCrdlwBh1EbzAarw/+gnYEp1lruirVipQ7nIKvJbHXc5yQPHURw02h3TcpMQwKVQGNT64wUF3pGo1HODTi8SqWSSNkhkUjMZvNPkC1Oz6hIe3mcP7ogs9jsQYJisXhwcPDatWs3b97EAu6Bi36KHFj2WLXZPifRKLRGGDm4xxkMWmPHii5WNIJBMP/PAe386Nstu3/x4Zdnrt0ebdhxaPeR57buPXr8pX8L3u3noi/ojK+++mpzc3NLS8uzzz77xhtv1NTUdHV1EURice22AwKRtLy9n0gsAZRt7gWTA5dvXR0c1RlMQTp9fX0EziYmvvbaa++//358fDweCVQK+Ni/+dYHiCf0QugUmnYehrU++vuZz74Z+PT0ef6SCMgHDhzA4ePHjw8PD0NnoMwio45AUReSVoFeCPUOLkPhB69YFEtm+YuzAuHduQUg7927F4d5PF5aWlpmZiYRHHHrG5M2tAHW5FSjfMHM69jHqjrAfi5WZN6zZ094ePjq1avDuLFq1SoWObGkpaytd8Pmvg2be1HBoZSp6twPa80uLM3zBfNzczBvkDJoFhcXZ2dn5+bmYh0eFkagbUJpFwRUaij8Kjv2QtkqpQJgMBiQA4KUWRljYkJCQkJDQ8NCQ7FgZY4sbIwsbALElrSG59RWdh/0BNhvnZfj3MOx3bePVRj4JULCiZAwIjSck7moEdyiQARABBTbVV2P4bxEZ9VZ2MxjMls4tvetiYhIz8hITklNS0+PjIoCfVSAzaWtu0tbHt3Q9iiqw/DMyqrOfUi/CwuCBf6CgM8XC4VBmVOSk8s3biwsKMjJyc7OyoqIWMPWnollbYllmxNKW5Mrtkbk1/E6HwO3ZovFyOZbG+VEG8L0790HNmPjE1ZHRBJECBEaxrLNVr3FzfGlbWip0duGZPB43QchLellqzZI7vKwcbJn32M4vCYqZk1kNCAEwuOKhOLmomZU6jvWN+5AdYuSEw0CTDU8MXVn/C54Dmbp/v5+mAdsl5eX19XVYs1STihugoVLWnZhBj66EF7nPoSFSiGXy6RI1D4u9e7Z019dVdXTs21re3tXZ2dLczN8Bmw3plZ2ANJ4XUnlW8Oyayq7DgQTVbAacXuX2Y6OS8jMzknNyFybnBoZE8dqG8hoR9Zt3LJ2w+akjVvCsqp4XQdYhTm9esqD2e3zrygsOjZuTWTU6sio0LBlOzexbUt1F8IraUPrsqn8/jnBEtrJGb7AoDdwptqzetXqjPT0uLjYyIgI1jfZywobYCG0FplVHegOUMjzOvezid5itphNkBmVAss2G1UhCGN4aHxcfGRk5HJIJle0w72An1qxBR1ZJRdVwSyFXOLh2OaQQxMSEmJjYzHjimXkpHL2RwK0PQjMsMzKYEi63B6720e6fW6v/15ghKanpyclJUVHRyM2l9lOqXgEyCC+thS+XYGQdHu8pIMeU1F8vVNDupZIZldvPxHCIqekpCAZLcczKKds2gpkju12OAlSmkSpnVqUCUzuOYPLSPvgJb39/TiMYAZlSM4aGSMyvxaNUGr5FkDyhjYiZSNkxldKbiDHtK4JheWu1BD0MBxOTU0FcuLatWwwY6xv3p1b34PmE1DQuDOjqrPjwAn2G+LyDyqdQ0L9yKIaj08fPRYTF5eVk5uWmZWakZWXk1WYm00I9BRgkQOBzo5v95LBoaICSrsfHYCS8rNg94vN9JKBPbCks8mN9itC00eTOgIbcjvaDJ/ayYyJtF9fHb04yv/84tAHZ65+e2PyhzH+V5fvYPHJwK2Pv781siCXUMxzl/Wlf5Fmvi0mUJSj+cEstnqkVs+ClhRoyQWNja+2BteLOjtmPIpMtMTs3v+tKvm/Fjd9IC57T8RWQyi7EbNooaRW79iS4tb00uCMaHhOMjQnHpoTDc1LBmeEdyU6i5v57wlLwp8WeX+VbPqABeL1YWPfaeU/XdSOaGg0RRITLdSiIyKX9BRAaHBgBnGx2Y0+4unvNbUfSsvfFxe9K8p/R0SU/Fm04ysFnrd9qRCa3UMS07CcHNc61Q6/zOZV2P0qBwOA8qSkf/93qmMDmoNnVEBp/FhKVH8o7f5C3vyJrPg9ycCC8Y9nhv90fuyP50Yhp5z0wQSzcsOMTI95UWs7fFb1xFn1U99raj6U8sB2wf+Kek8rOz+X7ftOPae2vv7Op48++fzv3nh7XkNa/cywmv7rLPnRPPXhnP3TGfPvbxji/mOx5VPpL89rXrisJ169adj9tfL4Be1tlVPr8Bn9zF2Z8dMLg+99c+ntLwcGRhd+/eZfnvjNm8f+9T/PjS4uWAOl74n2fqt65h9aYBE6ygcfltk8MLXE6oU9YDCTj/n8H7ej8uuP/+7119/9/OU/vHX6yh14iM7hHxBR2/+u6PpCvvlvMkJs9SqpgNwekNi8Mg5YxTqYgZHZ19/94vTVMaQCNR3Q0Ay2RGY3LDpvdP/PpOX5yzoCpO4squ8sqiQWNzSEE6C8ZHRqXT6KYcy+AC7SorV1BrjZL7F4FDZ0en7KEyAWtPYrE0vXp8ULOjvwwcWwQHlrVnpXZhhbUl0amf3bwM0vL42cH5r+8ofhi6PzYAFnpDafyOIhIMngnAzEr0wu3Z6XIiRGl1STEv1dqX5IZvuebxhaVI0usVXniEA5JTPempPenpfBhAgYFhlvR4WaKZlhSGz4XkQNLFonpMZpmeG6yPLdrG5EqBucl9+ck06IdaB5bUr4yfkbaJMmpQaW7VtzMrAqNNFnRc4LIuqbRfs1hQt1KF9lmZFoJ8W6UaF2RmGWsd2tF2S+uT7++cXbCEFCYnYJdBRiWGhyTevdkzr3sIqe0LrwBoJJoULSfx/4FBRrF76Owi4BDcOBMQOUXPOs4LpoLeVTmkgD6dTbnLogWB3oIwwkbXP5HD6GdPtZyuJ7ILo3I0LUFodEqdHq9BK5QiZXypWqJZFELFNIZAotineTGU0EYfAwOvcyGLzLoPcycDKLl7EFGHR/K0BygJdwewCx85fP9x59qe/YK33HXt52+LnuQ6e6nziFuesedD5+8n7oOgRgz+AwEVtQn486qqY7r7Y7BR/Kstak0lbMKRs3J5e1JaPWKGtFSgawb1DucbsxBfXsb0sp5VvWN+7Mr+spatpZ2vpobk13DvfRZH935CCnujunhoPqbrzP5OHz0JVRic9LK7GurBW1W2HDdtCPyquLyKuNfADwElXm2rJW1CCJpS1AQyXD/kMAyKgdi5t3AWJR0AX/P/AAABmY8UVNKEOwYH+cz6/7P9GBUlhQjkZ6AAAAAElFTkSuQmCC'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"new CCPA VS GDPR V01 06 PNG 01 1 2\"\n        title=\"new CCPA VS GDPR V01 06 PNG 01 1 2\"\n        src=\"/static/2160fa84e2f14e474ebc773d6988405c/e5715/new_CCPA-VS-GDPR-V01.06-PNG-01-1-2.png\"\n        srcset=\"/static/2160fa84e2f14e474ebc773d6988405c/a6d36/new_CCPA-VS-GDPR-V01.06-PNG-01-1-2.png 650w,\n/static/2160fa84e2f14e474ebc773d6988405c/e5715/new_CCPA-VS-GDPR-V01.06-PNG-01-1-2.png 768w,\n/static/2160fa84e2f14e474ebc773d6988405c/4fa52/new_CCPA-VS-GDPR-V01.06-PNG-01-1-2.png 1241w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>Want to get your company compliance-ready and keep it up-to-date, automatically? Contact a LoginRadius expert to learn how.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-free-demo-loginradius\"\n        title=\"book-free-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"September 18, 2019","updated_date":null,"description":"It's natural that there will be new legislation to protect customer data in a world where data is the most important resource. With more data scandal storeys than ever before reported by media outlets, users are constantly aware of data collection and how it impacts them. With this in mind, enforcement laws foster data protection and consent rights for users.","title":"CCPA vs GDPR: Global Compliance Guide [Infographic]","tags":["data privacy","compliance","data security"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5267175572519085,"src":"/static/665c98e19e81752929bebdb238058019/33aa5/ccpa-vs-gdpr.jpg","srcSet":"/static/665c98e19e81752929bebdb238058019/f836f/ccpa-vs-gdpr.jpg 200w,\n/static/665c98e19e81752929bebdb238058019/2244e/ccpa-vs-gdpr.jpg 400w,\n/static/665c98e19e81752929bebdb238058019/33aa5/ccpa-vs-gdpr.jpg 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},{"node":{"excerpt":"If you have been operating a web application where consumers need to authenticate themselves, the term 'credential stuffing' shouldn't be…","fields":{"slug":"/identity/prevent-credential-stuffing-attacks/"},"html":"<p>If you have been operating a web application where consumers need to authenticate themselves, the term 'credential stuffing' shouldn't be new to you. </p>\n<p>In case you haven’t heard it before, credential stuffing is a cybersecurity threat where hackers use stolen credentials to attack web infrastructures and take over user accounts. </p>\n<p>Someone or the other is always out there freely distributing breached databases on hacker forums and torrents to help criminals evolve their velocity of attack. </p>\n<p>Their strategy is pretty straightforward.</p>\n<p>Hackers use automated bots to stuff those credentials into the login pages across multiple sites to unlock multiple accounts. Also, since people do not change their passwords often, even older credential lists record relative success. </p>\n<p>The threat gets further elevated when hackers use credentials from organizations to login and hijack consumer accounts. Not only the company suffers revenue loss and brand damage, consumers feel the blow too. </p>\n<p>In this blog, we will walk you through the credential stuffing attack lifecycle and discuss the best ways to respond to attacks and <a href=\"https://www.loginradius.com/blog/2020/05/cyber-threats-business-risk-covid-19/\">mitigate damage to your business</a>. </p>\n<h2 id=\"examples-of-recent-credential-stuffing-attacks\" style=\"position:relative;\"><a href=\"#examples-of-recent-credential-stuffing-attacks\" aria-label=\"examples of recent credential stuffing attacks permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Examples of Recent Credential Stuffing Attacks</h2>\n<p>As new vulnerabilities and exploits are discovered every day, various instances demonstrate that each attack is more sophisticated than the last. Let's look at a few recent examples: </p>\n<ul>\n<li>According to a <a href=\"https://www.cbc.ca/news/politics/canada-revenue-agency-cra-cyberattack-1.5688163\">report by CBC Canada</a>, the Canada Revenue Agency has confirmed that out of roughly 12 million active GCKey accounts, 9,041 user credentials were acquired fraudulently through credential stuffing. They have temporarily shut down their online services.</li>\n<li>According to an <a href=\"https://www.documentcloud.org/documents/7208239-FBI-PIN-on-credential-stuffing-attacks.html\">FBI security advisory</a> obtained by ZDNet, between January and August 2020, hackers used a bulk load of credential pairs to conduct more than <a href=\"https://www.zdnet.com/article/fbi-says-credential-stuffing-attacks-are-behind-some-recent-bank-hacks/\">$3.5 million fraudulent check withdrawals</a> and ACH transfers from a mid-sized financial institution in the US. </li>\n<li>Another NY-based investment firm reported experiencing credential stuffing attacks between June 2019 and January 2020 against their mobile APIs. Although no fraud was reported, it could have resulted in nearly $2 million in revenue.</li>\n</ul>\n<h2 id=\"what-is-credential-stuffing\" style=\"position:relative;\"><a href=\"#what-is-credential-stuffing\" aria-label=\"what is credential stuffing permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is Credential Stuffing</h2>\n<p>Credential stuffing is a kind of identity theft where hackers automatically inject breached username and password credentials to access numerous sites. </p>\n<p>Think of it as a brute force attack that focuses on infiltrating accounts. Once the hacker acquires access into the web application, they crack open a company's database that carries millions of personally identifiable information and exploits them for their own purpose.</p>\n<h2 id=\"how-credential-stuffing-works\" style=\"position:relative;\"><a href=\"#how-credential-stuffing-works\" aria-label=\"how credential stuffing works permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How Credential Stuffing Works</h2>\n<p>Want to know the methods behind the screen? In a nutshell, here's the hacker's process:</p>\n<ul>\n<li><strong>Hacker gets stolen data</strong>: Criminals share or sell data on public websites and the Dark Web.</li>\n<li><strong>Hacker utilizes data</strong>: Using stolen passwords and usernames, hackers attempt website logins.</li>\n<li><strong>Hacker achieves goal</strong>: After gaining access to a victim's site, hackers get more valuable <a href=\"https://www.loginradius.com/blog/2019/10/cybersecurity-attacks-business/\">information for more attacks</a> or to sell.</li>\n</ul>\n<h2 id=\"effects-of-credential-stuffing\" style=\"position:relative;\"><a href=\"#effects-of-credential-stuffing\" aria-label=\"effects of credential stuffing permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Effects of Credential Stuffing</h2>\n<p>As you can see, when a business suffers from stolen credentials, it can cost them dearly. In fact, it's been reported that in the USA, 75% of credential stuffing attacks are programmed at financial institutions. So what happens when you aren't prepared for an attack? </p>\n<ul>\n<li>It strains the security budget leading to an increase in security cost. </li>\n<li>There is a noticeable loss of revenue from downtime, alongside losing customers to the competition.</li>\n<li>The cleanup costs can cripple businesses to the core. </li>\n<li>Customers do not trust businesses that cannot protect their data leading to customers discontinuing their loyalty.  </li>\n</ul>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 37.99999999999999%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAICAYAAAD5nd/tAAAACXBIWXMAAAsTAAALEwEAmpwYAAABEklEQVQoz4VS207CQBDtI9vubg1vJqYUjJpURWihQApEJeAt3mOM1+gH+P+Ph9kppbWJ9uGkzeTcOlNL+D3YzT6j+F6eVfEyWBmhLBSNiFFp2orpGa9nFotaAx4KPzdw9iawd5KCWbQOzkNDiK12Ci9cNSQzHT9Ats9SUwpwglOo3h3c6ScbG6G9PeS5E5xwK+F1IfdncMfvhDfIgzlrLR0/Qh6dQ3YuobpXnOYY4vEX4Rv27pjFqn8PPXyCO/lgcW0zgJu8on7xgw3i6dFz+skqvIZOXtKUwwWLTXUV3XIIfyIlc2MyMDzTVHgdaj+F0avohrTz1Q794g7z5WdH+XUQ5pUORwV4l43w/yv/9etU8ZZMz+JbJKH5NwAAAABJRU5ErkJggg=='); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"icons security\"\n        title=\"icons security\"\n        src=\"/static/747f72c415821765835136f772bb56ae/e5715/icons_security.png\"\n        srcset=\"/static/747f72c415821765835136f772bb56ae/a6d36/icons_security.png 650w,\n/static/747f72c415821765835136f772bb56ae/e5715/icons_security.png 768w,\n/static/747f72c415821765835136f772bb56ae/9f82e/icons_security.png 820w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<h2 id=\"how-to-detect-credential-stuffing-attacks\" style=\"position:relative;\"><a href=\"#how-to-detect-credential-stuffing-attacks\" aria-label=\"how to detect credential stuffing attacks permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How to Detect Credential Stuffing Attacks</h2>\n<p>Hackers send armies of bots to conduct thousands of commands, resulting in millions of stolen data. But it gets worse. In what is called \"the biggest collection of breaches\" to date, billions of stolen records are compiled and shared for free on hacker forums. </p>\n<p>So, how can you detect bot attacks? Here are the warning signs. </p>\n<ul>\n<li>Check for changes in site traffic like multiple login attempts on multiple accounts, within a limited timeframe. </li>\n<li>Never overlook use cases where you witness a higher-than-usual login failure rate. </li>\n<li>Be aware of any recorded downtime caused by an increase in site traffic. </li>\n</ul>\n<p>But beware: These credential stuffing bot detection techniques aren't 100% effective. You'll need extra protection—called bot screening—to stop these bots. It is a sophisticated screening technology for detecting malware on your devices. </p>\n<p>It's built to monitor the telltale signs of bot activity such as the number of attempts, the number of failures, access attempts from unusual locations, unusual traffic patterns, and unusual speed. </p>\n<p>Luckily, you'll find bot detection in robust <a href=\"https://www.loginradius.com/blog/2019/06/customer-identity-and-access-management/\">customer identity and access management solutions</a>. A CIAM platform will also provide device authentication and customer data protection.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 56.30769230769231%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"How Credential Stuffing Threatens Your Company V01 01 02 1024x576\"\n        title=\"How Credential Stuffing Threatens Your Company V01 01 02 1024x576\"\n        src=\"/static/38f32c17cb9bc925bf1a6e310fad112a/e5715/How-Credential-Stuffing-Threatens-Your-Company-V01.01-02-1024x576.png\"\n        srcset=\"/static/38f32c17cb9bc925bf1a6e310fad112a/a6d36/How-Credential-Stuffing-Threatens-Your-Company-V01.01-02-1024x576.png 650w,\n/static/38f32c17cb9bc925bf1a6e310fad112a/e5715/How-Credential-Stuffing-Threatens-Your-Company-V01.01-02-1024x576.png 768w,\n/static/38f32c17cb9bc925bf1a6e310fad112a/2bef9/How-Credential-Stuffing-Threatens-Your-Company-V01.01-02-1024x576.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<h2 id=\"a-hackers-toolbox\" style=\"position:relative;\"><a href=\"#a-hackers-toolbox\" aria-label=\"a hackers toolbox permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>A Hacker’s Toolbox</h2>\n<p>Let's find out how hackers process their share of credential stuffing attacks.</p>\n<h3 id=\"step-1-download-a-combo-list\" style=\"position:relative;\"><a href=\"#step-1-download-a-combo-list\" aria-label=\"step 1 download a combo list permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Step 1: Download a combo list. </h3>\n<p>A combo list is a combined list of leaked credentials obtained from corporate data breaches conducted in the past. These are often available for free within hacking communities or listed for sale in underground markets (Darkweb). </p>\n<h3 id=\"step-2-upload-a-credential-stuffing-tool\" style=\"position:relative;\"><a href=\"#step-2-upload-a-credential-stuffing-tool\" aria-label=\"step 2 upload a credential stuffing tool permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Step 2: Upload a credential stuffing tool.</h3>\n<p>Sophisticated hackers develop plugins or tools called account checker tools. These contain custom configurations that can test the lists of username/password pairs (i.e., \"credentials\") against a target website. Hackers can attack sites either one by one or via tools that hit hundreds of sites at once.</p>\n<h3 id=\"step-3-analyze-and-access-accounts\" style=\"position:relative;\"><a href=\"#step-3-analyze-and-access-accounts\" aria-label=\"step 3 analyze and access accounts permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Step 3: Analyze and access accounts</h3>\n<p>Hackers use account-checking software to log into financial accounts successfully. </p>\n<h3 id=\"step-4-export-results-from-accounts\" style=\"position:relative;\"><a href=\"#step-4-export-results-from-accounts\" aria-label=\"step 4 export results from accounts permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Step 4: Export results from accounts.</h3>\n<p>Match found. What's next? When a match is found, they can easily view a victim's account balance and gain access to cash, reward points, or virtual currencies. </p>\n<h3 id=\"step-5-steal-funds-and-resell-access\" style=\"position:relative;\"><a href=\"#step-5-steal-funds-and-resell-access\" aria-label=\"step 5 steal funds and resell access permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Step 5: Steal funds and resell access.</h3>\n<p>Because hackers use genuine user credentials, they gain undetected access. What follows is a full-fledged <a href=\"https://www.loginradius.com/blog/2020/04/corporate-account-takeover-attacks/\">account takeover</a>. Next, the attacker can drain the account in seconds or resell access to other cybercriminals.  </p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 56.30769230769231%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"How Credential Stuffing Threatens Your Company V01 01 08 1024x577\"\n        title=\"How Credential Stuffing Threatens Your Company V01 01 08 1024x577\"\n        src=\"/static/dd0895aa905e8578281c9d6e517c61ff/e5715/How-Credential-Stuffing-Threatens-Your-Company-V01.01-08-1024x577.png\"\n        srcset=\"/static/dd0895aa905e8578281c9d6e517c61ff/a6d36/How-Credential-Stuffing-Threatens-Your-Company-V01.01-08-1024x577.png 650w,\n/static/dd0895aa905e8578281c9d6e517c61ff/e5715/How-Credential-Stuffing-Threatens-Your-Company-V01.01-08-1024x577.png 768w,\n/static/dd0895aa905e8578281c9d6e517c61ff/2bef9/How-Credential-Stuffing-Threatens-Your-Company-V01.01-08-1024x577.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<h2 id=\"how-to-prevent-credential-stuffing-attacks\" style=\"position:relative;\"><a href=\"#how-to-prevent-credential-stuffing-attacks\" aria-label=\"how to prevent credential stuffing attacks permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How to Prevent Credential Stuffing Attacks</h2>\n<p>But then, there is good news after all. Preventing these attacks is possible, and you can keep your business and customer safe by following the tips below:</p>\n<h3 id=\"1-bot-detection\" style=\"position:relative;\"><a href=\"#1-bot-detection\" aria-label=\"1 bot detection permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. Bot detection</h3>\n<p>One of the most effective ways to differentiate real users from <a href=\"https://www.loginradius.com/engineering/blog/a-bot-protection-overview/\">bots is with captcha</a>. It can provide defense against basic attacks. </p>\n<p>But beware: Solving captcha can also be automated. There are businesses out there that pay people to solve captchas by clicking on those traffic light pictures. To counter, there is reCAPTCHA that is available in three versions:</p>\n<ul>\n<li> The classic \"I'm not a robot\" checkbox.</li>\n<li> An \"invisible\" box, displayed only for suspicious users.</li>\n<li> A \"V3\" that evaluates users on reputation and behavior.</li>\n</ul>\n<h3 id=\"2-adopt-a-strong-password-guide\" style=\"position:relative;\"><a href=\"#2-adopt-a-strong-password-guide\" aria-label=\"2 adopt a strong password guide permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. Adopt a strong password guide</h3>\n<p>Set strict <a href=\"https://www.loginradius.com/blog/2019/12/worst-passwords-list-2019/\">password complexity rules</a> for all your password input fields like length, character, or special character validation. If a customer's password resembles that of a data breach, they should be asked to create new passwords and provide customers with tips on building stronger passwords during their password-creation process.</p>\n<h3 id=\"3-implement-multi-factor-authentication\" style=\"position:relative;\"><a href=\"#3-implement-multi-factor-authentication\" aria-label=\"3 implement multi factor authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3. Implement multi-factor authentication</h3>\n<p><a href=\"https://www.loginradius.com/multi-factor-authentication/\">Multi-factor authentication</a> (2FA or MFA) is the new-age method to block hackers using multiple security layers. MFA makes it extremely difficult for hackers to execute credential stuffing attacks. The more obstacles you give a hacker to verify user identities, the safer your site will be.</p>\n<h3 id=\"4-set-up-risk-based-authentication\" style=\"position:relative;\"><a href=\"#4-set-up-risk-based-authentication\" aria-label=\"4 set up risk based authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>4. Set up risk-based authentication</h3>\n<p>Risk-based authentication (RBA) calculates a risk score based on a predefined set of rules. For instance, it can be anything related to a login device, IP reputation, user identity details, geolocation, geo velocity, personal characteristics, data sensitivity, or preset amount of failed attempts. RBA comes handy in case of high-risk scenarios where you want your customers to use customizable password security.</p>\n<h3 id=\"5-set-up-passwordless-login\" style=\"position:relative;\"><a href=\"#5-set-up-passwordless-login\" aria-label=\"5 set up passwordless login permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>5. Set up passwordless login</h3>\n<p>Hackers can also deny access to customers' own resources once they break-in. Having passwords as a factor of authentication can leave corporate and business accounts vulnerable to credential stuffing. So, why not remove them altogether? Use <a href=\"https://www.loginradius.com/blog/2019/10/passwordless-authentication-the-future-of-identity-and-security/\">passwordless authentication</a> as a safer way to authenticate users for more confined access into their accounts.</p>\n<p><a href=\"https://www.loginradius.com/resource/understanding-credential-stuffing-attacks-whitepaper\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"credential-stuffing\"\n        title=\"credential-stuffing\"\n        src=\"/static/091051c0e36ccf509c9dea986078f13a/e5715/credential-stuffing.png\"\n        srcset=\"/static/091051c0e36ccf509c9dea986078f13a/a6d36/credential-stuffing.png 650w,\n/static/091051c0e36ccf509c9dea986078f13a/e5715/credential-stuffing.png 768w,\n/static/091051c0e36ccf509c9dea986078f13a/63ff0/credential-stuffing.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<h2 id=\"preventing-credential-stuffing-with-loginradius-identity-management\" style=\"position:relative;\"><a href=\"#preventing-credential-stuffing-with-loginradius-identity-management\" aria-label=\"preventing credential stuffing with loginradius identity management permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Preventing Credential Stuffing With LoginRadius Identity Management</h2>\n<p>LoginRadius advocates a number of alternative authentication methods to mitigate the risk of credential stuffing. The identity and access management solution provider promotes passwordless practices like social login, single sign-on, email-based passwordless login to address the <a href=\"https://www.loginradius.com/blog/2019/10/cybersecurity-attacks-business/\">vulnerabilities of businesses</a>. </p>\n<p><strong>Social Login</strong>: Social login is an authentication method that allows users to log in to a third-party platform using their existing social media login credentials. This eliminates the need to create a new account or enter credentials altogether.   </p>\n<p><strong>Single Sign-On</strong>: <a href=\"https://www.loginradius.com/blog/2019/05/what-is-single-sign-on/\">Single sign on</a> (SSO) minimizes the number of credential stuffing attacks because users need to login once using just one set of credentials, and subsequently logged into other accounts as well. This provides a more robust protective layer to user accounts. </p>\n<p><strong>Email-Based Passwordless Authentication</strong>: The user is required to enter the associated email address. Upon which a unique code or magic link is created and sent to the email ID. It is valid for a predefined time frame. As soon as the server verifies the code, the user is let in. </p>\n<p><strong>Multi-factor Authentication</strong>: MFA offers better security by providing additional protection to traditional credentials through multiple layers. They are mostly implemented through security questions, ReCaptcha, and others. Due to extra security checks, LoginRadius assures businesses that customers' data is safe.  </p>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>Credential stuffing is easy to perform, so its popularity with criminals will increase with time. Even if your business isn't affected yet, you must <a href=\"https://www.loginradius.com/blog/identity/digital-privacy-best-practices/\">protect your website</a> and watch for all the red flags listed in this blog. </p>\n<p>If you're looking for a solution to help prevent credential stuffing, LoginRadius is easy to deploy. It  provides robust security with bot detection and multi-factor authentication, among other safeguards.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-free-demo-loginradius\"\n        title=\"book-free-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"September 12, 2019","updated_date":null,"description":"Credential stuffing is a cybersecurity vulnerability in which hackers target web infrastructures and take over user accounts using stolen credentials. When hackers use organisational credentials to login and hijack user accounts, the threat gets further elevated. Not only does the business experience loss of sales and brand harm, the blow is also felt by customers.","title":"Credential Stuffing: How To Detect And Prevent It","tags":["data security","mfa","ciam solution"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5384615384615385,"src":"/static/753bbb6fc293974fa6240ca1873adab3/33aa5/credential-stuffing-attacks.jpg","srcSet":"/static/753bbb6fc293974fa6240ca1873adab3/f836f/credential-stuffing-attacks.jpg 200w,\n/static/753bbb6fc293974fa6240ca1873adab3/2244e/credential-stuffing-attacks.jpg 400w,\n/static/753bbb6fc293974fa6240ca1873adab3/33aa5/credential-stuffing-attacks.jpg 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},{"node":{"excerpt":"Sketch of a Māori chief by Sydney Parkinson (1784)  Source - MaoriChief1784 In Part II of the History of Human Identity, we showed examples…","fields":{"slug":"/identity/history-human-identity-part-3/"},"html":"<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 454px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 132.15859030837004%; position: relative; bottom: 0; left: 0; background-image: url('data:image/jpeg;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"454px MaoriChief1784\"\n        title=\"454px MaoriChief1784\"\n        src=\"/static/f667809b0bb91b0d136c20dcce41824d/835f3/454px-MaoriChief1784.jpg\"\n        srcset=\"/static/f667809b0bb91b0d136c20dcce41824d/835f3/454px-MaoriChief1784.jpg 454w\"\n        sizes=\"(max-width: 454px) 100vw, 454px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span> Sketch of a Māori chief by <a href=\"https://en.wikipedia.org/wiki/Sydney_Parkinson\">Sydney Parkinson</a> (1784) </p>\n<p>Source - <a href=\"https://commons.wikimedia.org/wiki/File:MaoriChief1784.jpg\">MaoriChief1784</a></p>\n<p>In Part II of the History of Human Identity, we showed examples of identity verification such as names and unique markings. This blog is the final instalment of our 3-part series. In it, we'll focus on cultural identifiers—their use <em>and</em> their abuse.</p>\n<p>One of the oldest forms of cultural identifiers is still alive today: physical alterations. In fact, the Maori of New Zealand use <a href=\"https://brewminate.com/the-ancient-and-mysterious-history-of-tattoos/\">tattoos</a> in part as a marker of identity; the earliest recording of this dates back to the 1700s. Maori facial decorations include tattoos with detailed and stylized designs called <em>moko.</em> Moko is used to communicate information about an individual’s heritage and rank in society. </p>\n<p>In fact, the <a href=\"https://www.smithsonianmag.com/history/tattoos-144038580/\">Smithsonian.com</a> notes that the Maori use of tattoos “has accurately been described as a form of id card or passport, a kind of aesthetic bar code for the face.”</p>\n<h2 id=\"personal-identification-documents\" style=\"position:relative;\"><a href=\"#personal-identification-documents\" aria-label=\"personal identification documents permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Personal identification documents</h2>\n<p>The earliest documented account of something resembling a passport can be found in the Hebrew Bible, in the book of Nehemiah, which refers to “<a href=\"https://www.theguardian.com/travel/2006/nov/17/travelnews\">safe passage</a>” to Judah. </p>\n<p>In 1540, the granting of “<a href=\"https://www.theguardian.com/travel/2006/nov/17/travelnews\">travelling papers</a>” became the business of Britain’s Privy Council. The actual term <em>passport</em> was also recognized at that point. Some say that the term reflects the act of passing through maritime ports, although that is up for debate.</p>\n<p><strong>Charles de Saint-Mémin’s United States passport, June 30, 1810</strong></p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 62.769230769230774%; position: relative; bottom: 0; left: 0; background-image: url('data:image/jpeg;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"human identity \"\n        title=\"human identity \"\n        src=\"/static/e8acade08f9ffe353ae9c2f1dee4f429/212bf/image-2.jpg\"\n        srcset=\"/static/e8acade08f9ffe353ae9c2f1dee4f429/6aca1/image-2.jpg 650w,\n/static/e8acade08f9ffe353ae9c2f1dee4f429/212bf/image-2.jpg 768w,\n/static/e8acade08f9ffe353ae9c2f1dee4f429/e5166/image-2.jpg 1200w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span> Charles de Saint-Mémin’s United States passport, June 30, 1810 </p>\n<p>Source - <a href=\"https://www.metmuseum.org/art/collection/search/656327\">metmuseum</a></p>\n<p>A passport is also a form of personal identification that indicates national identity.</p>\n<p>Around 100 countries now have compulsory <a href=\"https://en.wikipedia.org/wiki/List_of_national_identity_card_policies_by_country\">national identity cards</a>. Another 28 countries have optional national identity cards, but their citizens often use other forms of ID such as passports or driving licenses. </p>\n<p><a href=\"https://en.wikipedia.org/wiki/West_Germany\"><strong>West German</strong></a> <strong>identity card issued between 1 January 1951 and 31 March 1987</strong></p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 270px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 129.99999999999997%; position: relative; bottom: 0; left: 0; background-image: url('data:image/jpeg;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"human identity\"\n        title=\"human identity\"\n        src=\"/static/b98f8bef68ee5a4f3587604da4e2044a/6f81f/image-3.jpg\"\n        srcset=\"/static/b98f8bef68ee5a4f3587604da4e2044a/6f81f/image-3.jpg 270w\"\n        sizes=\"(max-width: 270px) 100vw, 270px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span> <a href=\"https://en.wikipedia.org/wiki/West_Germany\">West German</a> identity card issued between 1 January 1951 and 31 March 1987 </p>\n<p>Source - <a href=\"https://commons.wikimedia.org/wiki/File:1979_identity_card_of_West_Germany_original_size.jpg\">West German Identity Card</a></p>\n<p>A Social Security number (SSN) is another unique identifier. The US  government assigned this for taxation and benefits. Issued by the US Social Security Administration in November 1935, SSN numbers were part of the New Deal Social Security program. Today, US citizens still use SSNs to access benefits, pay taxes, receive wages, and show one’s identity.</p>\n<p><strong>A Social Security card issued by the</strong> <a href=\"https://en.wikipedia.org/wiki/Railroad_Retirement_Board\"><strong>Railroad Retirement Board</strong></a> <strong>in 1943 to a now-deceased person.</strong></p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 541px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 110.90573012939002%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"human identity\"\n        title=\"human identity\"\n        src=\"/static/fb5c9cf20987ff309fd01263c086d958/9d576/image-4.png\"\n        srcset=\"/static/fb5c9cf20987ff309fd01263c086d958/9d576/image-4.png 541w\"\n        sizes=\"(max-width: 541px) 100vw, 541px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span> A Social Security card issued by the <a href=\"https://en.wikipedia.org/wiki/Railroad_Retirement_Board\">Railroad Retirement Board</a> in 1943 to a now deceased person. </p>\n<p>Source - <a href=\"https://commons.wikimedia.org/wiki/File:PD_social_security_card.png\">Social Security Card</a></p>\n<p>A Social Insurance Number (SIN) is a 9-digit form of identification that every individual residing and/or working in Canada must have in order to access government benefits, file income taxes, and legally receive payment. <a href=\"https://blog.wagepoint.com/all-content/the-complete-history-of-the-social-insurance-number\">SIN cards were first issued in 1964</a> but have not been printed as cards since 2014 due to the risk of theft. Today, Canadian citizens do not carry SIN cards on their person.</p>\n<h2 id=\"name-changes\" style=\"position:relative;\"><a href=\"#name-changes\" aria-label=\"name changes permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Name changes</h2>\n<p>Many countries have a process for officially changing one’s legal name. </p>\n<p>In Western society, some marriage partners decide to change their surnames. However, taking a new surname is not as commonplace as it once was. In fact, sometimes men and women change both of their surnames to a hyphenated or a combined version of the two. </p>\n<p>A name change can pose issues for your personal identity, including <a href=\"https://www.healthyway.com/content/heres-why-changing-your-name-when-you-get-married-can-actually-be-a-terrible-idea/\">losing your professional identity or brand.</a> </p>\n<p>As a rule, US citizens who wish to change their surnames after marriage must endure a lengthy process. Here's what they must do:</p>\n<ul>\n<li>After you get a copy of your marriage license, you must visit the Social Security Administration online or in person.</li>\n<li>From there, you fill out the necessary paperwork and show proof of your US citizenship (for example, a birth certificate, passport, or a photo ID like a driver’s license). </li>\n<li>Once you receive your new social security card (new name, same number), you can change your driver’s license. This change also requires two forms of identification, proof of address, and a certified copy of your marriage license.</li>\n<li>With your new official identification in hand, you can change your name on your banking information, utility bills, and credit cards.</li>\n</ul>\n<h2 id=\"personal-vs-legal-identification\" style=\"position:relative;\"><a href=\"#personal-vs-legal-identification\" aria-label=\"personal vs legal identification permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Personal vs. legal identification</h2>\n<p>As governments began to regulate identity verification, conflicts arose between personal and legal identification. The ways that people identify themselves sometimes clash with the ways that governments want to identify them.</p>\n<p>For example, Canada has a controversial history when it comes to identifying Inuit communities. In the 1930s, a personal identification program in the Canadian Arctic <a href=\"https://www.thecanadianencyclopedia.ca/en/article/project-surname\">required Inuit fingerprints</a> to identify and document Inuit communities. Shortly after, missionaries and federal agents successfully halted the program, due to the association of fingerprinting with criminal activity. </p>\n<p>It took roughly 10 years for the Canadian government to approve and implement a substitute identification system for Canada’s Northern Territories. This was known as the <a href=\"https://www.vice.com/en_ca/article/xd7ka4/the-little-known-history-of-how-the-canadian-government-made-inuit-wear-eskimo-tags\">personal identification disk system</a>. The government required Inuit people to wear these small, numbered disks at all times. As a result, many complained that these looked and felt like dog tags. Due to public outcry, the government ceased the program in the 1970s (1980s in Quebec). And in its place, they created a new program called Project Surname.</p>\n<p><strong>Public domain photo: Inupiat family, 1929</strong></p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 76.46153846153847%; position: relative; bottom: 0; left: 0; background-image: url('data:image/jpeg;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"human identity\"\n        title=\"human identity\"\n        src=\"/static/6aeb53946ce05c899deb08926aa3fab4/212bf/image-5.jpg\"\n        srcset=\"/static/6aeb53946ce05c899deb08926aa3fab4/6aca1/image-5.jpg 650w,\n/static/6aeb53946ce05c899deb08926aa3fab4/212bf/image-5.jpg 768w,\n/static/6aeb53946ce05c899deb08926aa3fab4/b051d/image-5.jpg 783w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span> Public domain photo: Inupiat family, 1929 </p>\n<p>Source - <a href=\"https://commons.wikimedia.org/wiki/File:Inupiat_Family_from_Noatak,_Alaska,_1929,_Edward_S._Curtis_(restored).jpg\">Inupiat Family</a></p>\n<h2 id=\"project-surname\" style=\"position:relative;\"><a href=\"#project-surname\" aria-label=\"project surname permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Project Surname</h2>\n<p>In the 1940s the Canadian government created Project Surname as a way to identify the Inuit population. Instead of a number, Project Surname assigned Anglicized last names to Inuit peoples in northern Canada. </p>\n<p>While some Inuit and non-Inuit peoples viewed Project Surname as an effective new identification system, others saw it as a demeaning act of paternalism. </p>\n<p>In essence, it stripped people of a meaningful and spiritual tradition. </p>\n<p>Before the arrival of Europeans, the <a href=\"https://www.thecanadianencyclopedia.ca/en/article/inuit/\">Inuit</a> used a complex naming tradition that reflected their culture, environment, animals, family, and spirits. Today, Inuit surnames may contain both Euro-Canadian and traditional Inuit names. However, <a href=\"https://acresofsnow.ca/canadas-mandatory-eskimo-identification-tags/\">the sting of Project Surname remains</a>, demonstrating what happens when legal identification gets <em>too</em> personal.</p>\n<p>As cofounder and CTO of LoginRadius, a customer identity and access management solution, I enjoy researching and writing about cultural identifiers. Likewise, I hope that you enjoyed this History of Human Identity series and will return to read our next series.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-loginradius\"\n        title=\"book-a-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"September 04, 2019","updated_date":null,"description":"We showed examples of identity authentication in Part II of the History of Human Identity, such as names and distinctive markings. The final instalment of our 3-part series is this blog. In it, we will concentrate on cultural markers, their usage and violence.","title":"A History of Human Identity in Pictures Part 3","tags":["public-sector"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.408450704225352,"src":"/static/ca079987a26f88131d4d57e37ef38ae7/c3e3a/history-human-identity-part-3.jpg","srcSet":"/static/ca079987a26f88131d4d57e37ef38ae7/f836f/history-human-identity-part-3.jpg 200w,\n/static/ca079987a26f88131d4d57e37ef38ae7/2244e/history-human-identity-part-3.jpg 400w,\n/static/ca079987a26f88131d4d57e37ef38ae7/c3e3a/history-human-identity-part-3.jpg 769w","sizes":"(max-width: 769px) 100vw, 769px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}}]},"markdownRemark":{"excerpt":"Identity is evolving, and developers are at the forefront of this transformation. Every day brings a new learning—adapting to new standards…","fields":{"slug":"/identity/developer-first-identity-provider-loginradius/"},"html":"<p>Identity is evolving, and developers are at the forefront of this transformation. Every day brings a new learning—adapting to new standards and refining approaches to building secure, seamless experiences.</p>\n<p>We’re here to support developers on that journey. We know how important simplicity, efficiency, and well-structured documentation are when working with identity and access management solutions. That’s why we’ve redesigned the <a href=\"https://www.loginradius.com/\">LoginRadius website</a>—to be faster, more intuitive, and developer-first in every way.</p>\n<p>The goal? Having them spend less time searching and more time building.</p>\n<h2 id=\"whats-new-and-improved-on-the-loginradius-website\" style=\"position:relative;\"><a href=\"#whats-new-and-improved-on-the-loginradius-website\" aria-label=\"whats new and improved on the loginradius website permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What’s New and Improved on the LoginRadius Website?</h2>\n<p>LoginRadius’ vision is to give developers a product that simplifies identity management so they can focus on building, deploying, and scaling their applications. To enhance this experience, we’ve spent the last few months redesigning our interface— making navigation more intuitive and reassuring that essential resources are easily accessible.</p>\n<p>Here’s a closer look at what’s new and why it’s important:</p>\n<h3 id=\"a-developer-friendly-dark-theme\" style=\"position:relative;\"><a href=\"#a-developer-friendly-dark-theme\" aria-label=\"a developer friendly dark theme permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>A Developer-Friendly Dark Theme</h3>\n<p><img src=\"/f46881583c7518a93bb24e94c32320de/a-developer-friendly-dark-theme.webp\" alt=\"This image shows how LoginRadius offers several authentication methods like traditional login, social login, passwordless login, passkeys and more in a dark mode.\">    </p>\n<p>Developers spend long hours working in dark-themed IDEs and terminals, so we’ve designed the LoginRadius experience to be developer-friendly and align with that preference.</p>\n<p>The new dark mode reduces eye strain, enhances readability, and provides a seamless transition between a coding environment and our platform. Our new design features a clean, modern aesthetic with a consistent color scheme and Barlow typography, ensuring better readability. High-quality graphics and icons are thoughtfully placed to enhance the content without adding visual clutter.</p>\n<p>So, whether you’re navigating our API docs or configuring authentication into your system, our improved interface will make those extended development hours more comfortable and efficient.</p>\n<h3 id=\"clear-categorization-for-loginradius-capabilities\" style=\"position:relative;\"><a href=\"#clear-categorization-for-loginradius-capabilities\" aria-label=\"clear categorization for loginradius capabilities permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Clear Categorization for LoginRadius Capabilities</h3>\n<p><img src=\"/e5358b82be414940f3fb146013845933/capabilities.webp\" alt=\"This image shows a breakdown of all the LoginRadius CIAM capabilities, including authentication, security, UX, scalability and multi-brand management.\"></p>\n<p>We’ve restructured our website to provide a straightforward breakdown of our customer identity and access management platform capabilities, helping you quickly find what you need:</p>\n<ul>\n<li>Authentication: Easily understand <a href=\"https://www.loginradius.com/blog/identity/authentication-option-for-your-product/\">how to choose the right login method</a>, from traditional passwords and OTPs to social login, federated SSO, and passkeys with few lines of code.</li>\n<li>Security: Implement no-code security features like bot detection, IP throttling, breached password alerts, DDoS protection, and adaptive MFA to safeguard user accounts.</li>\n<li>User Experience: Leverage AI builder, hosted pages, and drag-and-drop workflows to create smooth, branded sign-up and login experiences.</li>\n<li>High Performance &#x26; Scalability: Confidently scale with sub-100ms API response times, 100% uptime, 240K+ RPS, and 28+ global data center regions.</li>\n<li>Multi-Brand Management: Efficiently manage multiple identity apps, choosing isolated or shared data stores based on your brand’s unique needs.</li>\n</ul>\n<p>This structured layout ensures you can quickly understand each capability and how it integrates into your identity ecosystem.</p>\n<h3 id=\"developer-first-navigation\" style=\"position:relative;\"><a href=\"#developer-first-navigation\" aria-label=\"developer first navigation permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Developer-First Navigation</h3>\n<p><img src=\"/a8c155c2b6faf3d5f4b4de4e2b14d763/developers-menu.webp\" alt=\"This image shows the LoginRadius menu bar, highlighting the developer dropdown.\">   </p>\n<p>We’ve been analyzing developer workflows to identify how you access key resources. That’s why we redesigned our navigation with one goal in mind: to reduce clicks and make essential resources readily available.</p>\n<p>The new LoginRadius structure puts APIs, SDKs, and integration guides right at the menu bar under the Developers dropdown so you can get started faster. Our Products, Solutions, and Customer Services are also clearly categorized, helping development teams quickly find the right tools and make informed decisions.</p>\n<h3 id=\"quick-understanding-of-integration-benefits\" style=\"position:relative;\"><a href=\"#quick-understanding-of-integration-benefits\" aria-label=\"quick understanding of integration benefits permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Quick Understanding of Integration Benefits</h3>\n<p><img src=\"/b2f9a964a2da0ea83e2f8596b833bba7/we-support-your-tech-stack.webp\" alt=\"This image shows a list of popular programming languages and frameworks offered by LoginRadius.\"></p>\n<p>Developers now have a clear view of the tech stack available with LoginRadius, designed to support diverse business needs.</p>\n<p>Our platform offers pre-built SDKs for Node.js, Python, Java, and more, making CIAM integration seamless across popular programming languages and frameworks.</p>\n<h2 id=\"over-to-you-now\" style=\"position:relative;\"><a href=\"#over-to-you-now\" aria-label=\"over to you now permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Over to You Now!</h2>\n<p>Check out our <a href=\"https://www.loginradius.com/\">revamped LoginRadius website</a> and see how the improved experience makes it easier to build, scale, and secure your applications.</p>\n<p>Do not forget to explore the improved navigation and API documentation, and get started with our free trial today. We’re excited to see what you’ll build with LoginRadius!</p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"February 21, 2025","updated_date":null,"description":"LoginRadius’ vision is to give developers a product that simplifies identity management so they can focus on building, deploying, and scaling their applications. To enhance this experience, we’ve redesigned our website interface, making navigation more intuitive and reassuring that essential resources are easily accessible.","title":"Revamped & Ready: Introducing the New Developer-First LoginRadius Website","tags":["Developer tools","API","Identity Management","User Authentication"],"pinned":true,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.7857142857142858,"src":"/static/80b4e4fbe176a10a327d273504607f32/58556/hero-section.webp","srcSet":"/static/80b4e4fbe176a10a327d273504607f32/61e93/hero-section.webp 200w,\n/static/80b4e4fbe176a10a327d273504607f32/1f5c5/hero-section.webp 400w,\n/static/80b4e4fbe176a10a327d273504607f32/58556/hero-section.webp 800w,\n/static/80b4e4fbe176a10a327d273504607f32/99238/hero-section.webp 1200w,\n/static/80b4e4fbe176a10a327d273504607f32/7c22d/hero-section.webp 1600w,\n/static/80b4e4fbe176a10a327d273504607f32/1258b/hero-section.webp 2732w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},"pageContext":{"limit":6,"skip":822,"currentPage":138,"type":"///","numPages":161,"pinned":"ee8a4479-3471-53b1-bf62-d0d8dc3faaeb"}},"staticQueryHashes":["1171199041","1384082988","2100481360","23180105","528864852"]}