{"componentChunkName":"component---src-templates-blog-list-template-js","path":"/52","result":{"data":{"allMarkdownRemark":{"edges":[{"node":{"excerpt":"In a modern digital world where every business wishes to jump on the technology bandwagon to begin its digital transformation journey, the…","fields":{"slug":"/identity/loginradius-streamlines-user-onboarding-harry-rosen/"},"html":"<p>In a modern digital world where every business wishes to jump on the technology bandwagon to begin its digital transformation journey, the role of identity management can’t be underestimated. </p>\n<p>Whether an organization seeks substantial business growth by delivering personalized consumer experiences or needs compliances to build trust, identity and access management is their one-stop solution. </p>\n<p>Our client, Harry Rosen Inc., is Canada's premier retailer with an extensive collection of men’s fashion wear from the world’s finest labels, the latest must-have designers, and its very own signature brand.</p>\n<p>The company sought a reliable onboarding solution provider that secures authentication through compliance-ready solutions. </p>\n<h2 id=\"the-situation\" style=\"position:relative;\"><a href=\"#the-situation\" aria-label=\"the situation permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>The Situation</h2>\n<p>The volatile cyberthreat landscape presented new challenges for the highly recognized retailer. Harry Rosen decided to embrace the opportunity and modernize its infrastructure to create a secure consumer experience. </p>\n<p>The company wanted a solution that could <a href=\"https://www.loginradius.com/customer-security/\">secure their consumers’ identity</a> and enhance their experience right from the moment they interact with their brand. </p>\n<h2 id=\"the-challenges\" style=\"position:relative;\"><a href=\"#the-challenges\" aria-label=\"the challenges permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>The Challenges</h2>\n<p>Harry Rosen was conscious of keeping up with the shifting regulatory demands and wanted to give its consumers more control and awareness over their data by self-management of their privacy choices. </p>\n<p>The company has been experiencing the following list of challenges. Therefore, they wanted a secure, stable, reliable solution that made onboarding seamless for their consumers:</p>\n<ul>\n<li>A connected digital experience</li>\n<li>Security coupled with governance</li>\n<li>Unifying consumer journey</li>\n</ul>\n<p>Hence, Harry Rosen decided to hand over the deployment of a solution that enhances <a href=\"https://www.loginradius.com/authentication/\">authentication</a> experience and eventually meets the requirements of Canadian data privacy laws. </p>\n<h2 id=\"how-loginradius-paved-the-path-for-a-seamless-onboarding-and-secure-experience\" style=\"position:relative;\"><a href=\"#how-loginradius-paved-the-path-for-a-seamless-onboarding-and-secure-experience\" aria-label=\"how loginradius paved the path for a seamless onboarding and secure experience permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How LoginRadius Paved the Path for a Seamless Onboarding and Secure Experience</h2>\n<h3 id=\"implementing-single-sign-on\" style=\"position:relative;\"><a href=\"#implementing-single-sign-on\" aria-label=\"implementing single sign on permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Implementing Single Sign-On</h3>\n<p>Since consumers find it exhausting to use multiple credentials to log into multiple interconnected accounts, LoginRadius implemented Single Sign-On (SSO) into their systems. </p>\n<p>This included integration with a headless e-commerce platform that allowed them to create a single account for the entire Harry Rosen digital platform.</p>\n<p>With LoginRadius’ SSO solution, the consumers can seamlessly authenticate once and stay signed in across multiple interconnected accounts. </p>\n<h3 id=\"deploying-passwordless-login\" style=\"position:relative;\"><a href=\"#deploying-passwordless-login\" aria-label=\"deploying passwordless login permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Deploying Passwordless Login</h3>\n<p>Since the clients required an identity solution that empowers high-quality registration and login experience, going passwordless was the ultimate solution. </p>\n<p>Hence, we deployed <a href=\"https://www.loginradius.com/passwordless-login/\">our passwordless solution</a> that removes the extra step of creating or remembering new passwords.</p>\n<p>Harry Rosen leveraged LoginRadius’ Passwordless Login feature that allowed consumers to quickly sign-up without the need for a password. </p>\n<p>Now, consumers receive an email with a login link, through which they are instantly authenticated.</p>\n<h3 id=\"password-migration\" style=\"position:relative;\"><a href=\"#password-migration\" aria-label=\"password migration permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Password Migration</h3>\n<p>The client wanted their current registered consumers to use their existing passwords to access the new web application.</p>\n<p>However, password migration is usually a resource-intensive and critical task for any new platform or digital project. </p>\n<p>LoginRadius not only ensured that all hashed passwords were migrated seamlessly, but it also upgraded any password with older hashing algorithms to industry standard requirements.</p>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p><a href=\"https://www.loginradius.com/\">LoginRadius</a> understands the ever-changing requirements of modern businesses on a digital transformation journey. </p>\n<p>With our cutting-edge consumer identity and access management (CIAM) solution, our client, Harry Rosen, has now streamlined access for its consumers with a single identity, and they can log in from anywhere they want on the Harry Rosen platform.</p>\n<p>Using the LoginRadius platform, the client is now poised to expand its capabilities with features such as Social Login, Phone Login, and MFA.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"Book a free demo request 1024x310\"\n        title=\"Book a free demo request 1024x310\"\n        src=\"/static/779ad148d33fb1ecfd80cc41f1a94ef3/e5715/Book-a-free-demo-request-1024x310.png\"\n        srcset=\"/static/779ad148d33fb1ecfd80cc41f1a94ef3/a6d36/Book-a-free-demo-request-1024x310.png 650w,\n/static/779ad148d33fb1ecfd80cc41f1a94ef3/e5715/Book-a-free-demo-request-1024x310.png 768w,\n/static/779ad148d33fb1ecfd80cc41f1a94ef3/2bef9/Book-a-free-demo-request-1024x310.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"January 21, 2022","updated_date":null,"description":"Read our client's success story, Harry Rosen Inc., an e-commerce retailer in Canada. Learn how LoginRadius helped them enhance the onboarding experience with robust security.","title":"Harry Rosen, a LoginRadius Customer Success Story","tags":["retail"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.7857142857142858,"src":"/static/e9f7d2ebb8a208d3866793739797c200/33aa5/harry-rosen.jpg","srcSet":"/static/e9f7d2ebb8a208d3866793739797c200/f836f/harry-rosen.jpg 200w,\n/static/e9f7d2ebb8a208d3866793739797c200/2244e/harry-rosen.jpg 400w,\n/static/e9f7d2ebb8a208d3866793739797c200/33aa5/harry-rosen.jpg 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"Yash Rathi","github":"yashrathi29","avatar":null}}}},{"node":{"excerpt":"Introduction We all live in a digital realm where massive amounts of data is transmitted from one computer to another. This data is useful…","fields":{"slug":"/growth/balance-between-personalization-data-privacy/"},"html":"<h2 id=\"introduction\" style=\"position:relative;\"><a href=\"#introduction\" aria-label=\"introduction permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Introduction</h2>\n<p>We all live in a digital realm where massive amounts of data is transmitted from one computer to another. This data is useful to organizations as it helps them to not only scale their business but at the same time also prioritize data personalization and privacy. </p>\n<p>Corporations worried about data privacy are developing shields and <a href=\"https://www.loginradius.com/blog/identity/consumer-data-privacy-security/\">safeguards to secure their corporate and customer digital possessions</a>.</p>\n<p>Everywhere, <a href=\"https://www.loginradius.com/security/\">data security</a> is a top priority. This has been recognised by not just businesses with important data to guard but also individuals. However, people continue to make the same blunders when requested to disclose their email addresses to receive a ‘discount’ on a particular product. They frequently do so without reading the privacy statements first. Many businesses acquire such email addresses and utilize them unethically.</p>\n<p>It's a privacy dichotomy. On one hand the companies talk about data privacy and at the same time they exploit consumer data for their benefit. The unlawful use of private details of a customer for any purpose without their awareness is a growing concern. </p>\n<h2 id=\"how-to-make-a-balance-between-data-privacy-and-personalization\" style=\"position:relative;\"><a href=\"#how-to-make-a-balance-between-data-privacy-and-personalization\" aria-label=\"how to make a balance between data privacy and personalization permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How to Make a Balance between Data Privacy and Personalization?</h2>\n<p>Striking a balance between the need for data and customers’ privacy is critical to the success of any business. In order to ensure that they are in compliance with the law, companies should inform their consumers of how they intend to use the information they provide. Doing so will result in a mutually beneficial relationship whereby businesses generate more revenue, reach a greater number of potential customers, and enhance their brands by promoting greater transparency.</p>\n<p>Here are some tried-and-tested methods for balancing data personalization and privacy. Let's take a closer look at them:</p>\n<h3 id=\"1-gather-data-only-thats-required-for-your-business\" style=\"position:relative;\"><a href=\"#1-gather-data-only-thats-required-for-your-business\" aria-label=\"1 gather data only thats required for your business permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. Gather data only that’s required for your business.</h3>\n<p>When dealing with your customers, you should ask for only the information you need to serve them. Do not obtain data from them that is not validated, and if you obtain sensitive information about a customer, ask permission before using it. If a customer refuses to agree to your request, do not use the information.</p>\n<h3 id=\"2-inform-your-customers-about-how-you-plan-to-use-the-information\" style=\"position:relative;\"><a href=\"#2-inform-your-customers-about-how-you-plan-to-use-the-information\" aria-label=\"2 inform your customers about how you plan to use the information permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. Inform your customers about how you plan to use the information.</h3>\n<p>It’s acceptable to ask for customers' contact info in order to send them coupons and discounts. However, keep in mind that using personal data without your <a href=\"https://www.loginradius.com/consent-management/\">customers' consent</a> can have severe implications. As a business owner, you need to communicate with your customers on how you intend to use their information.  </p>\n<h3 id=\"3-data-analysis-can-go-a-long-way\" style=\"position:relative;\"><a href=\"#3-data-analysis-can-go-a-long-way\" aria-label=\"3 data analysis can go a long way permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3. Data analysis can go a long way.</h3>\n<p>One of the most complicated problems to solve these days is data analysis. As a company, you have to be able to understand what your customers do with the products and services they acquire from you. If you can pinpoint those that contribute more than they cost, you'll always have loyal customers and great revenue. The complexity lies in finding out which features are appealing and how frequently users visit your site, among many other factors.</p>\n<h3 id=\"4-listen-to-your-customers-understand-their-problems-and-avoid-making-false-promises\" style=\"position:relative;\"><a href=\"#4-listen-to-your-customers-understand-their-problems-and-avoid-making-false-promises\" aria-label=\"4 listen to your customers understand their problems and avoid making false promises permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>4. Listen to your customers, understand their problems, and avoid making false promises.</h3>\n<p>Don’t over promise or deliver late. This will harm your brand and sales. A great way to expand your business is through online marketing, even if you don’t consider yourself tech savvy. It’s easy to get started with digital marketing, whether you have a lot of money to spend or only a small budget. Never</p>\n<p> fake data, because this will cultivate mistrust between you and your customers. Instead, offer better products that provide more value and build lasting relationships with your customers.</p>\n<h2 id=\"summing-it-up\" style=\"position:relative;\"><a href=\"#summing-it-up\" aria-label=\"summing it up permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Summing it up</h2>\n<p>Implementing personalization in an effective manner is challenging. Hence, you need to consider every single step before executing a data protection strategy that meets your business goals without breaking the <a href=\"https://www.loginradius.com/data-governance/\">laws of the land</a>. However, if done right, it can turn out to be a significant growth driver for your business and provide better ROI on marketing spend.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-Consultation\"\n        title=\"book-a-demo-Consultation\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"January 20, 2022","updated_date":null,"description":"It is increasingly important for businesses to attract and retain customers in an era of digital transformation. In this context, businesses will have to strike a balance between personalization and data privacy.","title":"Finding The Balance Between Personalization and Data Privacy","tags":null,"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.7699115044247788,"src":"/static/53bd1f008b73b8388b9de8a6870d7e75/33aa5/personalize-cover.jpg","srcSet":"/static/53bd1f008b73b8388b9de8a6870d7e75/f836f/personalize-cover.jpg 200w,\n/static/53bd1f008b73b8388b9de8a6870d7e75/2244e/personalize-cover.jpg 400w,\n/static/53bd1f008b73b8388b9de8a6870d7e75/33aa5/personalize-cover.jpg 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"Rashmi Mathur","github":null,"avatar":null}}}},{"node":{"excerpt":"When was the last time you didn’t see data breach news in your news feed? Pretty long, isn’t it?  Admit it; we hear news regarding data…","fields":{"slug":"/identity/tips-from-loginradius-security-expert-2022/"},"html":"<p>When was the last time you didn’t see data breach news in your news feed? Pretty long, isn’t it? </p>\n<p>Admit it; we hear news regarding data breaches, and everyday businesses fall victim to a threat costing them losses worth millions of dollars. </p>\n<p>What’s more worrisome is the fact that these cyber attacks not only settle at financial distress but also eventually tarnish brand image in the global markets. </p>\n<p>But what about the security infrastructure? We know that every business in today’s modern digital world leverages the best in class security practices, and we’re not able to digest the fact that organizations still fall prey to these attacks. </p>\n<p>So, what’s the most significant loophole or flaw that compromises security? </p>\n<p>Well, the fact is that cybercriminals are continuously exploring new ways to bypass security mechanisms, and organizations with frail and outdated information security practices quickly become the victim. </p>\n<p>Hence, organizations must update their overall security infrastructure and ensure they’re well-versed with the challenges pertaining to 2022 and beyond. </p>\n<p>Here are some tips from LoginRadius’ <strong>Information Security Manager, Alok Patidar</strong> that would help you strengthen your organization’s security posture and would surely help prevent data breaches in 2023 and beyond. </p>\n<h2 id=\"why-should-businesses-worry-about-information-security-in-2023\" style=\"position:relative;\"><a href=\"#why-should-businesses-worry-about-information-security-in-2023\" aria-label=\"why should businesses worry about information security in 2023 permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Why Should Businesses Worry about Information Security in 2023?</h2>\n<p>Amid the global pandemic, when everyone was locked inside their homes, and remote working became the new normal, the number of data breaches across the globe soared exponentially. </p>\n<p>As per <a href=\"https://www.ibm.com/security/data-breach\">IBM’s latest report</a>, the average total cost of a data breach increased by nearly 10% year over year, the enormous single-year cost surge in the last seven years. </p>\n<p>Apart from this, information security experts across the globe have already <a href=\"https://www.securitymagazine.com/articles/96781-top-15-cybersecurity-predictions-for-2022\">predicted</a> that the number of cyberattacks, including ransomware and nation-state attacks, would continue to rise. </p>\n<p>Hence, the key to overturning the data breach trend is to avoid the smallest events that could potentially develop into huge data breaches. Every loophole and data leak needs to be identified and remediated before attackers discover them. </p>\n<p>Since now, we have adequate information regarding the importance of strengthening the security mechanism. Let’s look at some crucial tips that would help reinforce overall security. </p>\n<h3 id=\"1-evaluate-third-party-risks\" style=\"position:relative;\"><a href=\"#1-evaluate-third-party-risks\" aria-label=\"1 evaluate third party risks permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>#1. Evaluate third-party risks</h3>\n<p>The worst thing that can happen for an organization from an information security perspective is to leave a loophole at the vendor's end. </p>\n<p>Yes, your vendors may not take cybersecurity as seriously as your organization does. This could lead to severe consequences that hamper brand image in the global marketplace. </p>\n<p>It’s essential to evaluate the overall security posture of all of your third-party vendors to ensure they don’t pose a threat to your organization and your clients. </p>\n<p>Moreover, a vendor risk assessment should also ensure that the vendors strictly adhere to the <a href=\"https://www.loginradius.com/blog/identity/consumer-data-privacy-security/\">global data privacy and security</a> compliance standards, including GDPR, CCPA, and HIPAA. </p>\n<h3 id=\"2-strengthening-endpoint-security\" style=\"position:relative;\"><a href=\"#2-strengthening-endpoint-security\" aria-label=\"2 strengthening endpoint security permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>#2. Strengthening endpoint security</h3>\n<p>Endpoint security is often ignored when it comes to implementing robust security practices across an organization. </p>\n<p>An endpoint can be defined as the remote access point communicating with an organization’s network through end-users or smart devices. </p>\n<p>Since businesses have adopted the paradigm shift in remote working models, endpoint security is often neglected. Also, various interconnected devices in the IoT landscape have increased the risk as endpoint security breaches become more common. </p>\n<p>Besides incorporating firewalls and VPNs, organizations must train their staff members to quickly recognize any phishing email or social engineering attack for maximum safety. </p>\n<h3 id=\"3-use-tougher-security-questions\" style=\"position:relative;\"><a href=\"#3-use-tougher-security-questions\" aria-label=\"3 use tougher security questions permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>#3. Use tougher security questions</h3>\n<p>Security questions prevent imposters from infiltrating the verification process. So what does <a href=\"https://www.loginradius.com/blog/identity/2019/01/best-practices-choosing-good-security-questions/\">a good security question</a> look like?</p>\n<p>The best ones will make it easy for legitimate users to authenticate themselves. They should be:</p>\n<ul>\n<li>Safe: Hackers shouldn’t be able to guess or research it.</li>\n<li>Stable: The answer shouldn’t change over time.</li>\n<li>Memorable: The user should be able to remember it.</li>\n<li>Simple: The password should be precise, easy, and consistent.</li>\n<li>Many: The password should have many possible answers.</li>\n</ul>\n<h3 id=\"4-move-beyond-multi-factor-authentication-mfa---incorporate-risk-based-authentication-rba\" style=\"position:relative;\"><a href=\"#4-move-beyond-multi-factor-authentication-mfa---incorporate-risk-based-authentication-rba\" aria-label=\"4 move beyond multi factor authentication mfa   incorporate risk based authentication rba permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>#4. Move beyond multi-factor authentication (MFA) - Incorporate risk-based authentication (RBA)</h3>\n<p><a href=\"https://www.loginradius.com/multi-factor-authentication/\">Multi-Factor authentication</a> creates a longer authentication process for the consumers, which causes lower consumer conversation at your application. </p>\n<p>Risk-based authentication only triggers an elevated-risk situation while keeping the frictionless authentication process in place for everyday conditions.</p>\n<p>You can configure actions based on the severity of the risk factors like if the consumer logs normally into your system from Vancouver and makes an authentication request to access the application from Cancun, this is an elevated-risk situation, and you might want to block the account instead of sending the notification to the consumer.</p>\n<p><a href=\"https://www.loginradius.com/resource/an-enterprises-guide-to-risk-based-authentication/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"GD-to-RBA\"\n        title=\"GD-to-RBA\"\n        src=\"/static/d57f9c65049003fa8427fb6d0893f180/e5715/GD-to-RBA.png\"\n        srcset=\"/static/d57f9c65049003fa8427fb6d0893f180/a6d36/GD-to-RBA.png 650w,\n/static/d57f9c65049003fa8427fb6d0893f180/e5715/GD-to-RBA.png 768w,\n/static/d57f9c65049003fa8427fb6d0893f180/81501/GD-to-RBA.png 2886w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<h3 id=\"5-create-data-backups\" style=\"position:relative;\"><a href=\"#5-create-data-backups\" aria-label=\"5 create data backups permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>#5. Create data backups</h3>\n<p>A data backup solution is one of the best measures to keep personal and business data secure from a ransomware attack. </p>\n<p>Ransomware is malicious software that an employee accidentally deploys by clicking on a malicious link. And when deployed, all data on the site/system is taken hostage.</p>\n<p>You can ensure the protection of your data by implementing continuous backups. In case your system is hacked, you can restore your data. You can use the cloud to create a copy of your data on a server and host it in a remote location.</p>\n<h3 id=\"6-identify-sensitive-data-classify-it-and-incorporate-data-usage-policy\" style=\"position:relative;\"><a href=\"#6-identify-sensitive-data-classify-it-and-incorporate-data-usage-policy\" aria-label=\"6 identify sensitive data classify it and incorporate data usage policy permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>#6. Identify sensitive data, classify it, and incorporate data usage policy</h3>\n<p>You need to know what types of data you have to protect them effectively. For starters, let your security team scan your data repositories and prepare reports on the findings. Later, they can organize the data into categories based on their value to your organization.</p>\n<p>The classification can be updated as data is created, changed, processed, or transmitted. It would help if you also came up with policies to prevent users from falsifying the degree of classification. </p>\n<p>Only privileged users should, for instance, be allowed to upgrade or downgrade the data classification.</p>\n<p>Of course, data classification on its own is not adequate; you need to develop a policy that defines the types of access, the classification-based criteria for data access, who has access to data, what constitutes proper data use, and so on. </p>\n<p>Restrict user access to certain areas and deactivate when they finish the job.</p>\n<h3 id=\"7-offer-anti-phishing-training\" style=\"position:relative;\"><a href=\"#7-offer-anti-phishing-training\" aria-label=\"7 offer anti phishing training permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>#7. Offer anti-phishing training</h3>\n<p>A recent report from <a href=\"https://www.statista.com/statistics/266161/websites-most-affected-by-phishing/\">Statista</a> revealed that during the first quarter of 2021, 24.9% of phishing attacks worldwide were directed towards financial institutions, followed by social media. </p>\n<p>Hackers can gain access to securing information by stealing the employee's login credentials or by using social engineering techniques like fake websites, <a href=\"https://www.loginradius.com/blog/identity/phishing-for-identity/\">phishing</a>, and duplicate social media </p>\n<p>accounts.</p>\n<p>Offering anti-phishing training can prevent employees from falling victim to these scams without compromising your company's sensitive data.</p>\n<h2 id=\"final-thoughts\" style=\"position:relative;\"><a href=\"#final-thoughts\" aria-label=\"final thoughts permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Final Thoughts</h2>\n<p>Organizations embarking on a digital transformation journey and offering remote access to their employees shouldn’t compromise their security as it may lead to financial losses and even stain their brand image. </p>\n<p>Every business needs to think more carefully regarding the overall security mechanism to ensure total security even in challenging and risky situations. </p>\n<p>Using the best industry practices and strictly following the tips mentioned earlier will help <a href=\"https://www.loginradius.com/blog/identity/risk-management-essentials-enterprise/\">enterprises secure their operations</a>, protecting sensitive data.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-loginradius\"\n        title=\"book-a-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"January 20, 2022","updated_date":null,"description":"Alok Patidar, Information Security Manager at LoginRadius, shares his valuable insights for businesses to secure their sensitive information in 2023 and beyond. Read on to ensure the highest level of security across your organization.","title":"Top 7 Security Tips from LoginRadius’ Cybersecurity Expert to Follow in 2023","tags":["cybersecurity","security tips","information security"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.7543859649122806,"src":"/static/5fe2328e25d364e998bad63d0e701c4f/33aa5/security-exp.jpg","srcSet":"/static/5fe2328e25d364e998bad63d0e701c4f/f836f/security-exp.jpg 200w,\n/static/5fe2328e25d364e998bad63d0e701c4f/2244e/security-exp.jpg 400w,\n/static/5fe2328e25d364e998bad63d0e701c4f/33aa5/security-exp.jpg 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"Alok Patidar","github":null,"avatar":null}}}},{"node":{"excerpt":"When was the last time you didn’t see data breach news in your news feed? Pretty long, isn’t it?  Admit it; we hear news regarding data…","fields":{"slug":"/identity/tips-from-loginradius-security-expert-2023/"},"html":"<p>When was the last time you didn’t see data breach news in your news feed? Pretty long, isn’t it? </p>\n<p>Admit it; we hear news regarding data breaches, and everyday businesses fall victim to a threat costing them losses worth millions of dollars. </p>\n<p>What’s more worrisome is the fact that these cyber attacks not only settle at financial distress but also eventually tarnish brand image in the global markets. </p>\n<p>But what about the security infrastructure? We know that every business in today’s modern digital world leverages the best in class security practices, and we’re not able to digest the fact that organizations still fall prey to these attacks. </p>\n<p>So, what’s the most significant loophole or flaw that compromises security? </p>\n<p>Well, the fact is that cybercriminals are continuously exploring new ways to bypass security mechanisms, and organizations with frail and outdated information security practices quickly become the victim. </p>\n<p>Hence, organizations must update their overall security infrastructure and ensure they’re well-versed with the challenges pertaining to 2022 and beyond. </p>\n<p>Here are some tips from LoginRadius’ <strong>Information Security Manager, Alok Patidar</strong> that would help you strengthen your organization’s security posture and would surely help prevent data breaches in 2023 and beyond. </p>\n<h2 id=\"why-should-businesses-worry-about-information-security-in-2023\" style=\"position:relative;\"><a href=\"#why-should-businesses-worry-about-information-security-in-2023\" aria-label=\"why should businesses worry about information security in 2023 permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Why Should Businesses Worry about Information Security in 2023?</h2>\n<p>Amid the global pandemic, when everyone was locked inside their homes, and remote working became the new normal, the number of data breaches across the globe soared exponentially. </p>\n<p>As per <a href=\"https://www.ibm.com/security/data-breach\">IBM’s latest report</a>, the average total cost of a data breach increased by nearly 10% year over year, the enormous single-year cost surge in the last seven years. </p>\n<p>Apart from this, information security experts across the globe have already <a href=\"https://www.securitymagazine.com/articles/96781-top-15-cybersecurity-predictions-for-2022\">predicted</a> that the number of cyberattacks, including ransomware and nation-state attacks, would continue to rise. </p>\n<p>Hence, the key to overturning the data breach trend is to avoid the smallest events that could potentially develop into huge data breaches. Every loophole and data leak needs to be identified and remediated before attackers discover them. </p>\n<p>Since now, we have adequate information regarding the importance of strengthening the security mechanism. Let’s look at some crucial tips that would help reinforce overall security. </p>\n<h3 id=\"1-evaluate-third-party-risks\" style=\"position:relative;\"><a href=\"#1-evaluate-third-party-risks\" aria-label=\"1 evaluate third party risks permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>#1. Evaluate third-party risks</h3>\n<p>The worst thing that can happen for an organization from an information security perspective is to leave a loophole at the vendor's end. </p>\n<p>Yes, your vendors may not take cybersecurity as seriously as your organization does. This could lead to severe consequences that hamper brand image in the global marketplace. </p>\n<p>It’s essential to evaluate the overall security posture of all of your third-party vendors to ensure they don’t pose a threat to your organization and your clients. </p>\n<p>Moreover, a vendor risk assessment should also ensure that the vendors strictly adhere to the <a href=\"https://www.loginradius.com/blog/identity/consumer-data-privacy-security/\">global data privacy and security</a> compliance standards, including GDPR, CCPA, and HIPAA. </p>\n<h3 id=\"2-strengthening-endpoint-security\" style=\"position:relative;\"><a href=\"#2-strengthening-endpoint-security\" aria-label=\"2 strengthening endpoint security permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>#2. Strengthening endpoint security</h3>\n<p>Endpoint security is often ignored when it comes to implementing robust security practices across an organization. </p>\n<p>An endpoint can be defined as the remote access point communicating with an organization’s network through end-users or smart devices. </p>\n<p>Since businesses have adopted the paradigm shift in remote working models, endpoint security is often neglected. Also, various interconnected devices in the IoT landscape have increased the risk as endpoint security breaches become more common. </p>\n<p>Besides incorporating firewalls and VPNs, organizations must train their staff members to quickly recognize any phishing email or social engineering attack for maximum safety. </p>\n<h3 id=\"3-use-tougher-security-questions\" style=\"position:relative;\"><a href=\"#3-use-tougher-security-questions\" aria-label=\"3 use tougher security questions permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>#3. Use tougher security questions</h3>\n<p>Security questions prevent imposters from infiltrating the verification process. So what does <a href=\"https://www.loginradius.com/blog/identity/2019/01/best-practices-choosing-good-security-questions/\">a good security question</a> look like?</p>\n<p>The best ones will make it easy for legitimate users to authenticate themselves. They should be:</p>\n<ul>\n<li>Safe: Hackers shouldn’t be able to guess or research it.</li>\n<li>Stable: The answer shouldn’t change over time.</li>\n<li>Memorable: The user should be able to remember it.</li>\n<li>Simple: The password should be precise, easy, and consistent.</li>\n<li>Many: The password should have many possible answers.</li>\n</ul>\n<h3 id=\"4-move-beyond-multi-factor-authentication-mfa---incorporate-risk-based-authentication-rba\" style=\"position:relative;\"><a href=\"#4-move-beyond-multi-factor-authentication-mfa---incorporate-risk-based-authentication-rba\" aria-label=\"4 move beyond multi factor authentication mfa   incorporate risk based authentication rba permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>#4. Move beyond multi-factor authentication (MFA) - Incorporate risk-based authentication (RBA)</h3>\n<p><a href=\"https://www.loginradius.com/multi-factor-authentication/\">Multi-Factor authentication</a> creates a longer authentication process for the consumers, which causes lower consumer conversation at your application. </p>\n<p>Risk-based authentication only triggers an elevated-risk situation while keeping the frictionless authentication process in place for everyday conditions.</p>\n<p>You can configure actions based on the severity of the risk factors like if the consumer logs normally into your system from Vancouver and makes an authentication request to access the application from Cancun, this is an elevated-risk situation, and you might want to block the account instead of sending the notification to the consumer.</p>\n<p><a href=\"https://www.loginradius.com/resource/an-enterprises-guide-to-risk-based-authentication/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"GD-to-RBA\"\n        title=\"GD-to-RBA\"\n        src=\"/static/d57f9c65049003fa8427fb6d0893f180/e5715/GD-to-RBA.png\"\n        srcset=\"/static/d57f9c65049003fa8427fb6d0893f180/a6d36/GD-to-RBA.png 650w,\n/static/d57f9c65049003fa8427fb6d0893f180/e5715/GD-to-RBA.png 768w,\n/static/d57f9c65049003fa8427fb6d0893f180/81501/GD-to-RBA.png 2886w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<h3 id=\"5-create-data-backups\" style=\"position:relative;\"><a href=\"#5-create-data-backups\" aria-label=\"5 create data backups permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>#5. Create data backups</h3>\n<p>A data backup solution is one of the best measures to keep personal and business data secure from a ransomware attack. </p>\n<p>Ransomware is malicious software that an employee accidentally deploys by clicking on a malicious link. And when deployed, all data on the site/system is taken hostage.</p>\n<p>You can ensure the protection of your data by implementing continuous backups. In case your system is hacked, you can restore your data. You can use the cloud to create a copy of your data on a server and host it in a remote location.</p>\n<h3 id=\"6-identify-sensitive-data-classify-it-and-incorporate-data-usage-policy\" style=\"position:relative;\"><a href=\"#6-identify-sensitive-data-classify-it-and-incorporate-data-usage-policy\" aria-label=\"6 identify sensitive data classify it and incorporate data usage policy permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>#6. Identify sensitive data, classify it, and incorporate data usage policy</h3>\n<p>You need to know what types of data you have to protect them effectively. For starters, let your security team scan your data repositories and prepare reports on the findings. Later, they can organize the data into categories based on their value to your organization.</p>\n<p>The classification can be updated as data is created, changed, processed, or transmitted. It would help if you also came up with policies to prevent users from falsifying the degree of classification. </p>\n<p>Only privileged users should, for instance, be allowed to upgrade or downgrade the data classification.</p>\n<p>Of course, data classification on its own is not adequate; you need to develop a policy that defines the types of access, the classification-based criteria for data access, who has access to data, what constitutes proper data use, and so on. </p>\n<p>Restrict user access to certain areas and deactivate when they finish the job.</p>\n<h3 id=\"7-offer-anti-phishing-training\" style=\"position:relative;\"><a href=\"#7-offer-anti-phishing-training\" aria-label=\"7 offer anti phishing training permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>#7. Offer anti-phishing training</h3>\n<p>A recent report from <a href=\"https://www.statista.com/statistics/266161/websites-most-affected-by-phishing/\">Statista</a> revealed that during the first quarter of 2021, 24.9% of phishing attacks worldwide were directed towards financial institutions, followed by social media. </p>\n<p>Hackers can gain access to securing information by stealing the employee's login credentials or by using social engineering techniques like fake websites, <a href=\"https://www.loginradius.com/blog/identity/phishing-for-identity/\">phishing</a>, and duplicate social media </p>\n<p>accounts.</p>\n<p>Offering anti-phishing training can prevent employees from falling victim to these scams without compromising your company's sensitive data.</p>\n<h2 id=\"final-thoughts\" style=\"position:relative;\"><a href=\"#final-thoughts\" aria-label=\"final thoughts permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Final Thoughts</h2>\n<p>Organizations embarking on a digital transformation journey and offering remote access to their employees shouldn’t compromise their security as it may lead to financial losses and even stain their brand image. </p>\n<p>Every business needs to think more carefully regarding the overall security mechanism to ensure total security even in challenging and risky situations. </p>\n<p>Using the best industry practices and strictly following the tips mentioned earlier will help <a href=\"https://www.loginradius.com/blog/identity/risk-management-essentials-enterprise/\">enterprises secure their operations</a>, protecting sensitive data.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-loginradius\"\n        title=\"book-a-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"January 20, 2022","updated_date":null,"description":"Alok Patidar, Information Security Manager at LoginRadius, shares his valuable insights for businesses to secure their sensitive information in 2023 and beyond. Read on to ensure the highest level of security across your organization.","title":"Top 7 Security Tips from LoginRadius’ Cybersecurity Expert to Follow in 2023","tags":["cybersecurity tips","data privacy","digital transformation"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.7543859649122806,"src":"/static/5fe2328e25d364e998bad63d0e701c4f/33aa5/security-expert.jpg","srcSet":"/static/5fe2328e25d364e998bad63d0e701c4f/f836f/security-expert.jpg 200w,\n/static/5fe2328e25d364e998bad63d0e701c4f/2244e/security-expert.jpg 400w,\n/static/5fe2328e25d364e998bad63d0e701c4f/33aa5/security-expert.jpg 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"Alok Patidar","github":null,"avatar":null}}}},{"node":{"excerpt":"Introduction In the modern digital era of banking and e-commerce, the collection of customer data has become a strategic necessity…","fields":{"slug":"/growth/change-management-consumer-security-tool/"},"html":"<h2 id=\"introduction\" style=\"position:relative;\"><a href=\"#introduction\" aria-label=\"introduction permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Introduction</h2>\n<p>In the modern digital era of banking and e-commerce, the collection of customer data has become a strategic necessity. Companies must make sure their data is secure so they can retain their customers and increase revenue.</p>\n<p><a href=\"https://www.loginradius.com/blog/identity/customer-identity-and-access-management/\">Customer Identity and Access Management</a> (CIAM) systems offer a new way of looking at customer data, streamlining user interfaces, and enabling businesses to take their customer's data security to the next level.  CIAM also offers a host of other features, including: </p>\n<ul>\n<li>Customer sign-in and registration</li>\n<li>Multi-factor sign-in authentication </li>\n<li>Passwordless authentication</li>\n<li>User management</li>\n<li>Consent permissions</li>\n<li>Account settings and preference management</li>\n<li>Directory services</li>\n</ul>\n<p>Essentially, the goal of effective Customer Identity and Access Management solutions is to provide a secure and seamless interface for the user on any channel that they may use (mobile, web, etc.) to engage with a brand.</p>\n<p>Brands can achieve the goals of Customer Identity and Access management by using Change Management strategies. But before that, we must understand what change management is and what it can mean in the domain of digital security. </p>\n<h2 id=\"what-is-change-management\" style=\"position:relative;\"><a href=\"#what-is-change-management\" aria-label=\"what is change management permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is Change Management?</h2>\n<p>Change management is a systematic process that effectively transforms an organization's services, technology, or goals. The objective of change management is to analyze the situation and then accordingly implement strategies for undertaking change. </p>\n<p>The following are the common strategies implemented under change management:</p>\n<ul>\n<li>Planning and testing the visualized change.</li>\n<li>Creating a process for communication of change.</li>\n<li>Creating a system to schedule and implement change over some time.</li>\n<li>Setting up a documentation system for recording change.</li>\n<li>Establishing thresholds and standards to evaluate change.</li>\n<li>Ensuring <a href=\"https://www.loginradius.com/compliances/\">compliance with regulatory requirements</a>.</li>\n</ul>\n<h2 id=\"implementing-change-management-in-your-business-in-3-steps\" style=\"position:relative;\"><a href=\"#implementing-change-management-in-your-business-in-3-steps\" aria-label=\"implementing change management in your business in 3 steps permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Implementing Change Management in Your Business in 3 Steps</h2>\n<p>Change management is an often-challenging endeavor that includes several steps, the first of which is securing customer identity. This is accomplished by carefully analyzing and investigating a customer’s behavior, as well as the details of their past interactions with the company.</p>\n<p>The other steps include:</p>\n<h3 id=\"1-enabling-a-holistic-approach-to-change-management\" style=\"position:relative;\"><a href=\"#1-enabling-a-holistic-approach-to-change-management\" aria-label=\"1 enabling a holistic approach to change management permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. Enabling a holistic approach to change management.</h3>\n<p>Apart from the technology required in customer security, this strategy also focuses on the people implementing the technology. It does so by focusing on communication with the developers. A popular model for choosing the right developers is the skills, vision, incentives, and resources model. </p>\n<p>This essentially means choosing developers who either have these attributes, or creating a plan to instill these attributes into the developer. Here, the focus is on the skills and mindset of the developer. Along with this, incentives and appropriate resources are used to motivate the developer. </p>\n<h3 id=\"2-devising-a-concrete-change-management-plan-before-implementation\" style=\"position:relative;\"><a href=\"#2-devising-a-concrete-change-management-plan-before-implementation\" aria-label=\"2 devising a concrete change management plan before implementation permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. Devising a concrete change management plan before implementation.</h3>\n<p>This strategy may seem obvious, but it is extremely necessary while undertaking change management in the IT sector. After steering up the goal of the change management process, it is necessary to devise a concrete management plan. </p>\n<p>This plan should take into consideration every possible requirement, outcome, and issue at every stage and accordingly create a structured resolution mechanism. This is essential because the implementation concerns <a href=\"https://www.loginradius.com/customer-security/\">customer security</a> and their data. If due to poor planning, a data breach occurs while undertaking change, it can affect the brand image, customer loyalty, and customer privacy. Thus, a well-constructed change management plan is key. </p>\n<h3 id=\"3-choosing-the-best-leader\" style=\"position:relative;\"><a href=\"#3-choosing-the-best-leader\" aria-label=\"3 choosing the best leader permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3. Choosing the best leader.</h3>\n<p>Make a great plan, then manage it effectively. Choose the best leader to manage your plan, someone who can oversee the plan effectively. Effective oversight means following the change management procedure, from ensuring quality at each step to adequately resolving issues that arise.</p>\n<p><a href=\"https://www.loginradius.com/resource/digital-identity-management-cio-ciso-cmo-whitepaper\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"WP-dig-id-mngmnt\"\n        title=\"WP-dig-id-mngmnt\"\n        src=\"/static/3e97ee1c9451ccdaccde8540dd3a31e8/e5715/WP-dig-id-mngmnt.png\"\n        srcset=\"/static/3e97ee1c9451ccdaccde8540dd3a31e8/a6d36/WP-dig-id-mngmnt.png 650w,\n/static/3e97ee1c9451ccdaccde8540dd3a31e8/e5715/WP-dig-id-mngmnt.png 768w,\n/static/3e97ee1c9451ccdaccde8540dd3a31e8/81501/WP-dig-id-mngmnt.png 2886w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<p>Someone who understands the day-to-day operations of customer identity and access management is essential to a firm's customer security efforts. This person should also be able to visualize the impact of security on the brand, so that they can effectively implement necessary change management strategies.</p>\n<h2 id=\"benefits-of-implementing-change-management-in-customer-security\" style=\"position:relative;\"><a href=\"#benefits-of-implementing-change-management-in-customer-security\" aria-label=\"benefits of implementing change management in customer security permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Benefits of Implementing Change Management in Customer Security</h2>\n<p>Here are some of the tangible benefits of implementing change management strategies in customer security:</p>\n<ul>\n<li>Compliance with regulatory protocols.</li>\n<li>Safety from data breaches that could otherwise lead to distrust in the brand.</li>\n<li>Prevention of loss of reputation due to poor security measures.</li>\n<li>Enterprises can establish emergency protocols in case of data theft.</li>\n<li>Reliable customer security can lead to trust in the enterprise, which can increase overall revenue.</li>\n<li>Lead to digital transformation for business growth.</li>\n</ul>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>Change management is the need of the hour in this internet driver business market. Enterprises can benefit a lot from focusing on customer identity and access management. A key part of this is ensuring customer security. The implementation of such change management strategies can also be outsourced to firms that specialize in <a href=\"https://www.loginradius.com/\">CIAM solutions</a>, like LoginRadius. </p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-loginradius\"\n        title=\"book-a-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"January 19, 2022","updated_date":null,"description":"If you are one of the many businesses that have not yet developed an effective change management strategy, this article is for you. With new data privacy regulations coming into effect, organizations face complex compliance issues. Ignoring these rules can turn out to be expensive.","title":"Unlock the Business Benefits of Change Management in Securing Consumer Identity","tags":["ciam solution","digital identity management","cx"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.8691588785046729,"src":"/static/b978141076a3890f6466f8d40adef2ef/33aa5/change-managmt.jpg","srcSet":"/static/b978141076a3890f6466f8d40adef2ef/f836f/change-managmt.jpg 200w,\n/static/b978141076a3890f6466f8d40adef2ef/2244e/change-managmt.jpg 400w,\n/static/b978141076a3890f6466f8d40adef2ef/33aa5/change-managmt.jpg 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},{"node":{"excerpt":"Introduction Have you ever wondered how email scammers get your private email address? Scammers are always looking for ways to collect data…","fields":{"slug":"/identity/stop-scammers-getting-email-address/"},"html":"<h2 id=\"introduction\" style=\"position:relative;\"><a href=\"#introduction\" aria-label=\"introduction permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Introduction</h2>\n<p>Have you ever wondered how email scammers get your private email address? Scammers are always looking for ways to collect data—from phishing emails to fake login pages. We want you to be on your guard and learn what they’ll do to try and get your personal information.</p>\n<p>For example, you know the kind of scam messages that try to trick you into clicking on a link to see photos of cute kittens? Scammers use your social media accounts to learn your name and other identifying information, which they use to send emails that look like they’re from a friend.</p>\n<p>In this article, we’ll tell you exactly how they do it and what you can do to stop them.</p>\n<h2 id=\"what-are-phishing-email-scams\" style=\"position:relative;\"><a href=\"#what-are-phishing-email-scams\" aria-label=\"what are phishing email scams permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What Are Phishing Email Scams</h2>\n<p><a href=\"https://www.loginradius.com/blog/identity/phishing-for-identity/\">Phishing emails</a> are not just innocent spam. They are criminal attempts to fraudulently acquire private information from unsuspecting users. Some people, however, allow their greed to get the best of them and fall for these scams. Even though some of these emails are quite easy to see through, millions of people every year still fall prey to phishing scams.</p>\n<p>It's no secret that cybercriminals attack their targets by sending out sophisticated phishing email scams. These scams resemble emails from legitimate banks, government agencies, credit card companies, social networking sites, online payment websites, or multiple online stores. These usually begin with an approach where the sender asks recipients to click on a link that redirects them to an ad page where they need to specify and confirm personal data, account information, etc.</p>\n<p>These phishing email spams usually include:</p>\n<ul>\n<li>Advertisement spams such as online shopping, pharmacy purchases, gambling</li>\n<li>Work-from-home job offers and schemes</li>\n<li>Hoax charity appeals and virus threats</li>\n</ul>\n<p>Once hackers have obtained the necessary information, they create new user credentials or install malware into your system to steal sensitive information.</p>\n<h2 id=\"how-do-spammers-obtain-your-email-address\" style=\"position:relative;\"><a href=\"#how-do-spammers-obtain-your-email-address\" aria-label=\"how do spammers obtain your email address permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How Do Spammers Obtain Your Email Address</h2>\n<p>Spammers—people who send spam e-mail messages—use many different methods to collect e-mail addresses. We have list below some of the most common ones: </p>\n<h3 id=\"1-by-using-harvesting-programs\" style=\"position:relative;\"><a href=\"#1-by-using-harvesting-programs\" aria-label=\"1 by using harvesting programs permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. By using harvesting programs</h3>\n<p>Spammers and cybercriminals engage in phishing email scams by using harvesting software to steal and gather email addresses from the internet. Professional spammers <a href=\"https://www.loginradius.com/blog/identity/bot-attacks/\">rely on bots</a> that crawl millions of websites and scrape addresses from pages. Other spammers get email addresses by approaching sellers on underground cybercrime forums, or in open-air markets where addresses are found in mailing lists, websites, chat rooms, and domain contact points.</p>\n<h3 id=\"2-by-using-random-alphanumeric-combinations\" style=\"position:relative;\"><a href=\"#2-by-using-random-alphanumeric-combinations\" aria-label=\"2 by using random alphanumeric combinations permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. By using random alphanumeric combinations</h3>\n<p>Scammers use <a href=\"https://www.loginradius.com/blog/identity/brute-force-lockout/\">brute force attacks</a> to generate various alphanumeric combinations of email addresses in a sequential manner by automatically entering random letters, numbers, and symbols until they get any one of those right. </p>\n<h3 id=\"3-by-using-cc-email\" style=\"position:relative;\"><a href=\"#3-by-using-cc-email\" aria-label=\"3 by using cc email permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3. By using CC email</h3>\n<p>Phishing email scams can often result when anyone uses carbon copy (CC) while addressing an email to a group of people. This results in forwarding the same email repetitively, thereby exposing the email addresses of all the people concerned.</p>\n<p><a href=\"https://www.loginradius.com/resource/how-loginradius-prevents-bot-attacks/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"WP-bot-attacks\"\n        title=\"WP-bot-attacks\"\n        src=\"/static/e82463b026512b2e08bf580210e91ac1/e5715/WP-bot-attacks.png\"\n        srcset=\"/static/e82463b026512b2e08bf580210e91ac1/a6d36/WP-bot-attacks.png 650w,\n/static/e82463b026512b2e08bf580210e91ac1/e5715/WP-bot-attacks.png 768w,\n/static/e82463b026512b2e08bf580210e91ac1/81501/WP-bot-attacks.png 2886w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<h2 id=\"how-to-prevent-phishing-email-scams\" style=\"position:relative;\"><a href=\"#how-to-prevent-phishing-email-scams\" aria-label=\"how to prevent phishing email scams permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How to Prevent Phishing Email Scams</h2>\n<p>With scammers attempting to get you to give out personal information to an untrustworthy source, here's how to fight back.</p>\n<h3 id=\"1-avoid-public-posts\" style=\"position:relative;\"><a href=\"#1-avoid-public-posts\" aria-label=\"1 avoid public posts permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. Avoid public posts</h3>\n<p>Everyone has easy access to the internet via mobile phones, laptops, and computers. This puts your public posts at constant risk of being hacked by professional spammers and cybercriminals. To prevent spammers from knowing your personal and financial information, you should avoid posting your email addresses and other sensitive content in public.</p>\n<h3 id=\"2-learn-to-spot-the-spams\" style=\"position:relative;\"><a href=\"#2-learn-to-spot-the-spams\" aria-label=\"2 learn to spot the spams permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. Learn to spot the spams</h3>\n<p>Even if your email has fallen into the wrong hands, you can still prevent your personal content and financial information from getting leaked by identifying spam and not responding to them.</p>\n<p>Some warnings or indications are:</p>\n<ul>\n<li>The email received lacks legitimate content.</li>\n<li>The sender is unknown or anonymous.</li>\n<li>The received email may contain misspelled words and sentences purposely designed to fool spam filters such as IndiAgo for Indigo, Adidos for Adidas, etc.</li>\n<li>The received email may contain offers that seem too good to be true.</li>\n<li>The received email may contain urgent end dates like offering discounts for shopping within the due schedule.</li>\n<li>The received email may contain requests such as to forward certain messages to a large number of people in the name of offering money for doing so.</li>\n<li>The received email may contain links that redirect you to other ad pages containing malware.</li>\n</ul>\n<h3 id=\"3-use-two-factor-authentication-2fa\" style=\"position:relative;\"><a href=\"#3-use-two-factor-authentication-2fa\" aria-label=\"3 use two factor authentication 2fa permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3. Use two-factor authentication (2FA)</h3>\n<p><a href=\"https://www.loginradius.com/developers/\">Two-factor authentication (2FA)</a> is an extra layer of security on top of your password login. It's commonly used in online applications, especially to protect accounts that can be accessed from anywhere and have high-value personal data. </p>\n<h3 id=\"4-integrate-graphics-to-your-emails\" style=\"position:relative;\"><a href=\"#4-integrate-graphics-to-your-emails\" aria-label=\"4 integrate graphics to your emails permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>4. Integrate graphics to your emails</h3>\n<p>Email addresses can be implemented as graphic features, making it complicated to harvest programs and dictionary features to recognize them. This can ensure security and privacy as such texts cannot be copied or linked with malware. </p>\n<h3 id=\"5-obfuscate\" style=\"position:relative;\"><a href=\"#5-obfuscate\" aria-label=\"5 obfuscate permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>5. Obfuscate</h3>\n<p>You can obfuscate, or scramble, your email address by using HTML and JavaScript in emails. Obfuscation also makes it harder for hackers to see the real email address you are using.</p>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>As email addresses have become ubiquitous and the messaging process more interactive, scammers have evolved to follow suit. The best way to protect yourself is to be mindful of how you use your address and how you share it with others. </p>\n<p>By taking simple precautions, including checking the source of the message and even flagging suspicious emails as spam, you can keep the scammers away, and remain in control of your inbox.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"LoginRadius Book a Demo\"\n        title=\"LoginRadius Book a Demo\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"January 19, 2022","updated_date":null,"description":"When you type your email address into a website, be careful. You might have just given your email address to a scammer. Sadly, this happens all too often and is one of the main ways scammers harvest email addresses. This blog offers solutions on how to stop it from happening.","title":"This Is How Scammers Get Your Email Address & How to Stop Them","tags":["data security","2fa","mfa","cx"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":2.0833333333333335,"src":"/static/06fc09a56bb42f0e0b7256a205534ea3/33aa5/scammers.jpg","srcSet":"/static/06fc09a56bb42f0e0b7256a205534ea3/f836f/scammers.jpg 200w,\n/static/06fc09a56bb42f0e0b7256a205534ea3/2244e/scammers.jpg 400w,\n/static/06fc09a56bb42f0e0b7256a205534ea3/33aa5/scammers.jpg 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"Navanita Devi","github":null,"avatar":null}}}}]},"markdownRemark":{"excerpt":"Identity is evolving, and developers are at the forefront of this transformation. Every day brings a new learning—adapting to new standards…","fields":{"slug":"/identity/developer-first-identity-provider-loginradius/"},"html":"<p>Identity is evolving, and developers are at the forefront of this transformation. Every day brings a new learning—adapting to new standards and refining approaches to building secure, seamless experiences.</p>\n<p>We’re here to support developers on that journey. We know how important simplicity, efficiency, and well-structured documentation are when working with identity and access management solutions. That’s why we’ve redesigned the <a href=\"https://www.loginradius.com/\">LoginRadius website</a>—to be faster, more intuitive, and developer-first in every way.</p>\n<p>The goal? Having them spend less time searching and more time building.</p>\n<h2 id=\"whats-new-and-improved-on-the-loginradius-website\" style=\"position:relative;\"><a href=\"#whats-new-and-improved-on-the-loginradius-website\" aria-label=\"whats new and improved on the loginradius website permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What’s New and Improved on the LoginRadius Website?</h2>\n<p>LoginRadius’ vision is to give developers a product that simplifies identity management so they can focus on building, deploying, and scaling their applications. To enhance this experience, we’ve spent the last few months redesigning our interface— making navigation more intuitive and reassuring that essential resources are easily accessible.</p>\n<p>Here’s a closer look at what’s new and why it’s important:</p>\n<h3 id=\"a-developer-friendly-dark-theme\" style=\"position:relative;\"><a href=\"#a-developer-friendly-dark-theme\" aria-label=\"a developer friendly dark theme permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>A Developer-Friendly Dark Theme</h3>\n<p><img src=\"/f46881583c7518a93bb24e94c32320de/a-developer-friendly-dark-theme.webp\" alt=\"This image shows how LoginRadius offers several authentication methods like traditional login, social login, passwordless login, passkeys and more in a dark mode.\">    </p>\n<p>Developers spend long hours working in dark-themed IDEs and terminals, so we’ve designed the LoginRadius experience to be developer-friendly and align with that preference.</p>\n<p>The new dark mode reduces eye strain, enhances readability, and provides a seamless transition between a coding environment and our platform. Our new design features a clean, modern aesthetic with a consistent color scheme and Barlow typography, ensuring better readability. High-quality graphics and icons are thoughtfully placed to enhance the content without adding visual clutter.</p>\n<p>So, whether you’re navigating our API docs or configuring authentication into your system, our improved interface will make those extended development hours more comfortable and efficient.</p>\n<h3 id=\"clear-categorization-for-loginradius-capabilities\" style=\"position:relative;\"><a href=\"#clear-categorization-for-loginradius-capabilities\" aria-label=\"clear categorization for loginradius capabilities permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Clear Categorization for LoginRadius Capabilities</h3>\n<p><img src=\"/e5358b82be414940f3fb146013845933/capabilities.webp\" alt=\"This image shows a breakdown of all the LoginRadius CIAM capabilities, including authentication, security, UX, scalability and multi-brand management.\"></p>\n<p>We’ve restructured our website to provide a straightforward breakdown of our customer identity and access management platform capabilities, helping you quickly find what you need:</p>\n<ul>\n<li>Authentication: Easily understand <a href=\"https://www.loginradius.com/blog/identity/authentication-option-for-your-product/\">how to choose the right login method</a>, from traditional passwords and OTPs to social login, federated SSO, and passkeys with few lines of code.</li>\n<li>Security: Implement no-code security features like bot detection, IP throttling, breached password alerts, DDoS protection, and adaptive MFA to safeguard user accounts.</li>\n<li>User Experience: Leverage AI builder, hosted pages, and drag-and-drop workflows to create smooth, branded sign-up and login experiences.</li>\n<li>High Performance &#x26; Scalability: Confidently scale with sub-100ms API response times, 100% uptime, 240K+ RPS, and 28+ global data center regions.</li>\n<li>Multi-Brand Management: Efficiently manage multiple identity apps, choosing isolated or shared data stores based on your brand’s unique needs.</li>\n</ul>\n<p>This structured layout ensures you can quickly understand each capability and how it integrates into your identity ecosystem.</p>\n<h3 id=\"developer-first-navigation\" style=\"position:relative;\"><a href=\"#developer-first-navigation\" aria-label=\"developer first navigation permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Developer-First Navigation</h3>\n<p><img src=\"/a8c155c2b6faf3d5f4b4de4e2b14d763/developers-menu.webp\" alt=\"This image shows the LoginRadius menu bar, highlighting the developer dropdown.\">   </p>\n<p>We’ve been analyzing developer workflows to identify how you access key resources. That’s why we redesigned our navigation with one goal in mind: to reduce clicks and make essential resources readily available.</p>\n<p>The new LoginRadius structure puts APIs, SDKs, and integration guides right at the menu bar under the Developers dropdown so you can get started faster. Our Products, Solutions, and Customer Services are also clearly categorized, helping development teams quickly find the right tools and make informed decisions.</p>\n<h3 id=\"quick-understanding-of-integration-benefits\" style=\"position:relative;\"><a href=\"#quick-understanding-of-integration-benefits\" aria-label=\"quick understanding of integration benefits permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Quick Understanding of Integration Benefits</h3>\n<p><img src=\"/b2f9a964a2da0ea83e2f8596b833bba7/we-support-your-tech-stack.webp\" alt=\"This image shows a list of popular programming languages and frameworks offered by LoginRadius.\"></p>\n<p>Developers now have a clear view of the tech stack available with LoginRadius, designed to support diverse business needs.</p>\n<p>Our platform offers pre-built SDKs for Node.js, Python, Java, and more, making CIAM integration seamless across popular programming languages and frameworks.</p>\n<h2 id=\"over-to-you-now\" style=\"position:relative;\"><a href=\"#over-to-you-now\" aria-label=\"over to you now permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Over to You Now!</h2>\n<p>Check out our <a href=\"https://www.loginradius.com/\">revamped LoginRadius website</a> and see how the improved experience makes it easier to build, scale, and secure your applications.</p>\n<p>Do not forget to explore the improved navigation and API documentation, and get started with our free trial today. We’re excited to see what you’ll build with LoginRadius!</p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"February 21, 2025","updated_date":null,"description":"LoginRadius’ vision is to give developers a product that simplifies identity management so they can focus on building, deploying, and scaling their applications. To enhance this experience, we’ve redesigned our website interface, making navigation more intuitive and reassuring that essential resources are easily accessible.","title":"Revamped & Ready: Introducing the New Developer-First LoginRadius Website","tags":["Developer tools","API","Identity Management","User Authentication"],"pinned":true,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.7857142857142858,"src":"/static/80b4e4fbe176a10a327d273504607f32/58556/hero-section.webp","srcSet":"/static/80b4e4fbe176a10a327d273504607f32/61e93/hero-section.webp 200w,\n/static/80b4e4fbe176a10a327d273504607f32/1f5c5/hero-section.webp 400w,\n/static/80b4e4fbe176a10a327d273504607f32/58556/hero-section.webp 800w,\n/static/80b4e4fbe176a10a327d273504607f32/99238/hero-section.webp 1200w,\n/static/80b4e4fbe176a10a327d273504607f32/7c22d/hero-section.webp 1600w,\n/static/80b4e4fbe176a10a327d273504607f32/1258b/hero-section.webp 2732w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},"pageContext":{"limit":6,"skip":306,"currentPage":52,"type":"///","numPages":161,"pinned":"ee8a4479-3471-53b1-bf62-d0d8dc3faaeb"}},"staticQueryHashes":["1171199041","1384082988","2100481360","23180105","528864852"]}