{"componentChunkName":"component---src-templates-blog-list-template-js","path":"/72","result":{"data":{"allMarkdownRemark":{"edges":[{"node":{"excerpt":"Adding stringent layers of security becomes a tough nut to crack in a digital world where consumers are always on a hunt for a personalized…","fields":{"slug":"/identity/balancing-security-cx/"},"html":"<p>Adding stringent layers of security becomes a tough nut to crack in a digital world where consumers are always on a hunt for a personalized and flawless user experience.</p>\n<p>But that doesn’t mean that security can be compromised to deliver a rich user experience on a web application or a website.</p>\n<p>As per stats,<a href=\"https://www.statista.com/statistics/1172265/biggest-cloud-security-concerns-in-2020/\"> 69% of internet users</a> are concerned about data loss/leakage and 66% are worried about their data privacy and confidentiality.</p>\n<p>On the other hand,<a href=\"https://www.huffpost.com/entry/50-important-customer-exp_b_8295772?ec_carp=6823990201176436044\"> 67% of consumers mentioned bad experiences</a> as a big reason for churn, but only a few of them complain. Many people think that adding a robust layer of security would certainly hamper consumer experience and negatively impact the overall consumer onboarding journey.</p>\n<p>So, what’s the trick that helps market leaders stay ahead of the curve? How do they secure consumer data without affecting the consumer experience?</p>\n<p>Well, the key lies in creating a perfect harmony of security and user experience through a <a href=\"https://www.loginradius.com/blog/identity/customer-identity-and-access-management/\">CIAM (Consumer Identity and Access Management)</a> solution that helps scaling business growth.</p>\n<p>Let’s dig deeper into this and understand why a CIAM solution is becoming the need of the hour in the ever-expanding competitive digital world.</p>\n<h2 id=\"why-consumer-experience-matter-now-more-than-ever-before\" style=\"position:relative;\"><a href=\"#why-consumer-experience-matter-now-more-than-ever-before\" aria-label=\"why consumer experience matter now more than ever before permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Why Consumer Experience Matter Now More than Ever Before</h2>\n<p>Since the internet is becoming the second home for every individual globally, especially amid the global pandemic, creating and maintaining a great user experience is crucial.</p>\n<p>We’ve already seen the paradigm shift from traditional shopping to online purchases, cinemas being replaced by OTT platforms, and almost everything is being made available with just a few clicks.</p>\n<p>This means the ones that weren’t leveraging the true potential of online services are now geared up and offering online services as a part of their digital transformation.</p>\n<p>Moreover, this trend indicates that enterprises that haven’t yet focused on user experience would surely end up compromising their potential clients to their competitors.</p>\n<p>Undoubtedly, keeping pace with the growing competition demands that enterprises should focus more on delivering personalized experiences right from the beginning to enhance conversions and increase signups.</p>\n<p>However, leaders are also well aware that even a minor sneak into their network that affects consumer data could be fatal for their brand image.</p>\n<p>Let’s understand why security shouldn’t be ignored when focusing on user experience.</p>\n<p><strong>Also Read</strong>: <a href=\"https://www.loginradius.com/resource/customer-identity-the-core-of-digital-transformation/\">Customer Identity – The Core of Digital Transformation</a></p>\n<h2 id=\"why-security-matters-for-your-enterprise-and-consumers\" style=\"position:relative;\"><a href=\"#why-security-matters-for-your-enterprise-and-consumers\" aria-label=\"why security matters for your enterprise and consumers permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Why Security Matters for Your Enterprise and Consumers</h2>\n<p>In the past couple of years, consumers have gotten a big wake-up call about the value of their personal data and the risks they run if it’s leaked, stolen, or misused.</p>\n<p>Moreover, several high-profile hacks and breaches have generated widespread awareness of just how negligent enterprises can be. And consumers are much more careful about which brands they do business with.</p>\n<p>On the other hand, stringent consumer privacy legislation such as the General Data Protection Regulation (GDPR) is spreading to new jurisdictions. Even the most prominent companies aren’t exempt from significant fines.</p>\n<p>If consumers don’t trust your business to protect their data and accounts, they’ll find another one. The digital world makes it easy for them to switch providers within a few clicks.</p>\n<h2 id=\"user-experience-reinforced-with-security--the-key-to-success-in-2021-and-beyond\" style=\"position:relative;\"><a href=\"#user-experience-reinforced-with-security--the-key-to-success-in-2021-and-beyond\" aria-label=\"user experience reinforced with security  the key to success in 2021 and beyond permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>User Experience Reinforced with Security- The Key to Success in 2021 and Beyond</h2>\n<p>To keep pace with the ever-growing digital world, enterprises need to create a perfect harmony of a great user experience and robust security.</p>\n<p>This can be achieved by leveraging a consumer identity and access management (CIAM) solution like LoginRadius.</p>\n<p>The cutting-edge technology coupled with great user experience right from the beginning when your consumers first interact with your brand helps build consumer trust that guarantees conversion.</p>\n<p>Moreover, the best-in-class security that comes with the <a href=\"https://www.loginradius.com/\">LoginRadius Identity Platform</a> lets you assure your consumers of how vigilant you are about data privacy and security.</p>\n<h2 id=\"with-loginradius-every-consumer-interaction-is-delightful-and-secure\" style=\"position:relative;\"><a href=\"#with-loginradius-every-consumer-interaction-is-delightful-and-secure\" aria-label=\"with loginradius every consumer interaction is delightful and secure permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>With LoginRadius, Every Consumer Interaction is Delightful and Secure</h2>\n<p>LoginRadius CIAM paves the path for delivering a rich experience to your consumers both in terms of security and personalization. Let’s learn how:</p>\n<ul>\n<li><strong>Design the Ideal Consumer Journey</strong></li>\n</ul>\n<p>From the first step of onboarding to the thousandth login, create a welcoming and intelligent process to foster great consumer relationships.</p>\n<ul>\n<li><strong>Localization. Agnostic of Everything</strong></li>\n</ul>\n<p>LoginRadius supports every human language, so all of your forms, email messages, and texts can be customized for your worldwide market.</p>\n<ul>\n<li><strong>Deliver a High-Performance Experience</strong></li>\n</ul>\n<p>Never turn a consumer away because your login service is down. LoginRadius has unmatched uptime, and we can handle 150K logins per second—that’s 20x more than our competitors.</p>\n<ul>\n<li><strong>Unify the Login Process with Single Sign-On</strong></li>\n</ul>\n<p>Easily connect your websites, mobile apps, and third-party services so that consumers can interact with you everywhere using a single identity.</p>\n<ul>\n<li><strong>Protect Consumer Accounts</strong></li>\n</ul>\n<p>Make passwords harder to crack with rigorous password policies and LoginRadius Multi-Factor Authentication. Use hashing and encryption to protect account credentials and data in transit and at rest.</p>\n<ul>\n<li><strong>Safeguard Sensitive Data</strong></li>\n</ul>\n<p>Our modern cloud infrastructure is protected to the highest industry standards. LoginRadius maintains all <a href=\"https://www.loginradius.com/compliances-list/\">major security compliances</a> for our application and data storage. </p>\n<p><a href=\"https://www.loginradius.com/resource/loginradius-and-gdpr-compliance/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"EB-GDPR-comp\"\n        title=\"EB-GDPR-comp\"\n        src=\"/static/5df60302e56cb72de5f45d0f28605611/e5715/EB-GDPR-comp.png\"\n        srcset=\"/static/5df60302e56cb72de5f45d0f28605611/a6d36/EB-GDPR-comp.png 650w,\n/static/5df60302e56cb72de5f45d0f28605611/e5715/EB-GDPR-comp.png 768w,\n/static/5df60302e56cb72de5f45d0f28605611/81501/EB-GDPR-comp.png 2886w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<ul>\n<li><strong>Maintain Data Privacy</strong></li>\n</ul>\n<p>Thanks to unified consumer profiles and centralized management, you can follow privacy regulations that protect a consumer’s right to control, export, and delete their data.</p>\n<ul>\n<li><strong>Manage Consumer Consent</strong></li>\n</ul>\n<p>Stay current on regulations for acquiring consumer consent, data collection and use, age verification, and site access. Give consumers transparency into the consent process to demonstrate good faith.</p>\n<h2 id=\"final-thoughts\" style=\"position:relative;\"><a href=\"#final-thoughts\" aria-label=\"final thoughts permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Final Thoughts</h2>\n<p>When it comes to digital transformation by creating a perfect harmony of a great user experience and security, consumer trust is only part of the equation.</p>\n<p>You need a delightful yet secure<a href=\"https://www.loginradius.com/customer-experience-solutions\"> consumer experience</a>, which can help your business grow even in the most uncertain situations. Learn more about the LoginRadius Identity Platform, starting with a <a href=\"https://www.loginradius.com/contact-sales/\">Quick Personalized Call</a> with our sales team.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAGCAYAAADDl76dAAAACXBIWXMAAAsSAAALEgHS3X78AAABdElEQVQY002RO0/CUBzFG6PtbZWHCAmRmBB5P8vDII9SSC0omog4oAEGjZMO6OKEuLjoJ2Fx0cSBwUQnXZxcHPwux38LJA7nNvfec8+5v1tOCCiwpbbhye2BxbYgBMtgIRVioDRRsARGXxZUzLlEHmehBaesQ4rrEMPViYf2DR9nDGKkChbVICVqsMt1WJI1sHCFwhUsUIFohJH49TxECvRUjhDW2mAbB5iP6hB8hUkhiRPN5KIZYJdrsEYrcCSpmQqMm6/m9ylUhSulY7N5ivROB3L9GOlGF3Ktbc4zuz341UPw/uIk0ESbBjoSGlYIx8BfzjSwVmyCEYEUUmCPa3Bnd+hwC75yC95S05SxbolU/iEbOCFCpDexEfIioTNCNd6Tp6IlMnNuGeeDe3z//OLx5RWj5zFGT2O8fXxh/P4Ja6w6vSEFCnTIlW2YiDzhzX7ATFKojDlvjpBPcDF4QPdyiG5/iE7/BmfXd+hd3VKpCoG8fzxWw2+c+yTpAAAAAElFTkSuQmCC'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-loginradius\"\n        title=\"book-a-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"July 22, 2021","updated_date":null,"description":"Delivering a perfect harmony of a great user experience along with the highest level of security is crucial today. Let’s learn why a great user experience shouldn’t be compromised for security and how LoginRadius helps enterprises create great personalized user experiences reinforced by strict security.","title":"How to Strike the Right Balance Between Security and Consumer Experience","tags":["data security","compliance","identity management","cx"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5748031496062993,"src":"/static/067338bee4a16ea936bff5e7564b4eb6/14b42/balancing-security-cx-cover.jpg","srcSet":"/static/067338bee4a16ea936bff5e7564b4eb6/f836f/balancing-security-cx-cover.jpg 200w,\n/static/067338bee4a16ea936bff5e7564b4eb6/2244e/balancing-security-cx-cover.jpg 400w,\n/static/067338bee4a16ea936bff5e7564b4eb6/14b42/balancing-security-cx-cover.jpg 800w,\n/static/067338bee4a16ea936bff5e7564b4eb6/16310/balancing-security-cx-cover.jpg 1024w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Navanita Devi","github":null,"avatar":null}}}},{"node":{"excerpt":"We’re living in an era where almost everything is just a few clicks away, and the internet is becoming the second home for all of us…","fields":{"slug":"/identity/nist-password-guidelines-2021/"},"html":"<p>We’re living in an era where almost everything is just a few clicks away, and the internet is becoming the second home for all of us.</p>\n<p>Whether it’s entertainment or essential purchasing, we’re catered to everything online in the digital world.</p>\n<p>But with the increase in the use of the internet, the risk of security breach and identity thefts have augmented substantially.</p>\n<p>Businesses are compromising sensitive user data and consumer identities that not only cause losses worth millions but eventually tarnish brand repute.  </p>\n<p>To cope with the increasing number of cyber frauds and data thefts, the National Institute of Standards and Technology (NIST) has issued certain requirements along with controls for digital user identities.</p>\n<p>The NIST has dispensed several guidelines that not only ensure security to the user but eventually help enterprises secure their crucial business information.</p>\n<p>These guidelines offer recommendations for users for <a href=\"https://www.loginradius.com/blog/identity/loginradius-password-policy-business-consumer/\">creating strong passwords</a> along with recommendations for vendors/verifiers that are handling passwords.</p>\n<p>Let’s have a quick look at some of the most important NIST guidelines and the cybersecurity best practices to follow in 2021.</p>\n<h2 id=\"nist-overview\" style=\"position:relative;\"><a href=\"#nist-overview\" aria-label=\"nist overview permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>NIST Overview</h2>\n<p>Recognizing the national and economic security of the United States depends on the reliable functioning of critical infrastructure. The NIST Cybersecurity Framework is a thorough collaboration between industry and government, and consists of standards, guidelines, and practices to promote the protection of critical infrastructure.</p>\n<p>The prioritized, flexible, repeatable, and cost-effective approach of the Framework helps owners and operators of critical infrastructure to manage cybersecurity-related risk.</p>\n<p>The NIST Cybersecurity Framework consists of several guiding standards:</p>\n<ul>\n<li>NIST SP 800-53 (Revision 4)</li>\n<li>NIST SP 800-171</li>\n<li>The OMB Trusted Internet Connection (TIC) Initiative—FedRAMP Overlay (pilot) </li>\n<li>The DoD Cloud Computing Security Requirements Guide (SRG)</li>\n</ul>\n<p>Now, let’s have a quick look at some of the password guidelines issued by NIST.</p>\n<h3 id=\"processing-and-password-length\" style=\"position:relative;\"><a href=\"#processing-and-password-length\" aria-label=\"processing and password length permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Processing and Password Length</h3>\n<p>As per the NIST latest guidelines, the length of a password is a crucial security aspect, and all user-created passwords must be at least 8 characters in length.</p>\n<p>Moreover, the passwords generated by machines must be a minimum of 6 characters in length. Apart from this, the maximum character length must be 64 characters.</p>\n<p>Now, the essential aspect for enterprises is that during the verification process, the verifiers shouldn’t truncate passwords while processing. Instead, the passwords should be adequately hashed and must be salted.</p>\n<p>This reinforces the security of credentials. Also, the user should be allowed a minimum of 10 attempts to enter their password before locking their profile.</p>\n<p><strong>Also Read</strong>: <a href=\"https://www.loginradius.com/blog/identity/cybersecurity-best-practices-for-enterprises/\">Cybersecurity Best Practices for Businesses in 2021</a> </p>\n<h3 id=\"no-more-hints\" style=\"position:relative;\"><a href=\"#no-more-hints\" aria-label=\"no more hints permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>No More Hints</h3>\n<p>NIST has advised the vendors and verifiers to dismiss the use of password hints that were earlier offered to users for creating more complex passwords.</p>\n<p>Since these hints can allow attackers to guess the passwords, these hints shouldn’t be used in any form to ensure the highest level of security for users and service providers.</p>\n<p>Moreover, KBA (Knowledge-based Authentication), which was earlier a part of the authentication process that includes questions like- “Where you were born?” were asked to prove identity.</p>\n<h3 id=\"two-factor-authentication-and-password-managers\" style=\"position:relative;\"><a href=\"#two-factor-authentication-and-password-managers\" aria-label=\"two factor authentication and password managers permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Two-Factor Authentication and Password Managers</h3>\n<p>The users must be provided with the ability to paste passwords into password fields as users incline towards the use of password managers for a seamless authentication experience.</p>\n<p>Earlier, the verifiers didn’t allow the users to paste a password just because of security concerns. But now, service providers need to revoke the same for enhanced user experience.</p>\n<p>Apart from this, the use of <a href=\"https://www.loginradius.com/blog/identity/how-secure-2fa/\">two-factor authentication</a> must be emphasized as SMS isn’t considered a secure option.</p>\n<p>The verifiers need to rely on strong multi-factor authentication methods that provide authentication using secure one-time links or must use Google Authenticator.</p>\n<h3 id=\"hashing\" style=\"position:relative;\"><a href=\"#hashing\" aria-label=\"hashing permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Hashing</h3>\n<p>Password hashing is crucial in today’s era as it’s no longer safe to store passwords in plain text formats, which can be easily exploited.</p>\n<p>Password hashing is defined as the method to one-way transform a password that turns the password into another string called hashed password. This means that the password can’t be reversed to its original form once hashed.</p>\n<p>NIST recommends the use of password hashing algorithms while storing and retrieving passwords. The identity providers must rely on a secure password management mechanism that ensures hashing of passwords of the users within a network for enhanced security.</p>\n<h2 id=\"loginradius--the-ultimate-solution-covering-a-larger-footprint-of-the-overall-nist-cybersecurity-framework\" style=\"position:relative;\"><a href=\"#loginradius--the-ultimate-solution-covering-a-larger-footprint-of-the-overall-nist-cybersecurity-framework\" aria-label=\"loginradius  the ultimate solution covering a larger footprint of the overall nist cybersecurity framework permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>LoginRadius <strong>—</strong> The Ultimate Solution Covering a Larger Footprint of the Overall NIST Cybersecurity Framework</h2>\n<p>The NIST Cybersecurity Framework is worth adopting solely for its stated goal of improving risk-based security. But it also delivers ancillary benefits that include effective collaboration and communication of security posture with executives and industry organizations, as well as potential future improvements in legal exposure and even assistance with regulatory compliance.</p>\n<p>The NIST Cybersecurity Framework is NOT just for “government applications.” It represents a state-of-the-art approach to security and compliance.</p>\n<p><a href=\"https://www.loginradius.com/resource/loginradius-ciam-passwordless-login/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"DS-passwordless-login\"\n        title=\"DS-passwordless-login\"\n        src=\"/static/f4798092ec43235616eb2638cc648d3f/e5715/DS-passwordless-login.png\"\n        srcset=\"/static/f4798092ec43235616eb2638cc648d3f/a6d36/DS-passwordless-login.png 650w,\n/static/f4798092ec43235616eb2638cc648d3f/e5715/DS-passwordless-login.png 768w,\n/static/f4798092ec43235616eb2638cc648d3f/63ff0/DS-passwordless-login.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<p>Here’s what enterprises get with the LoginRadius consumer identity and access management (CIAM) solution:</p>\n<ul>\n<li><strong>Compliance:</strong> LoginRadius is NIST CSF audited and certified and offers CCPA and GDPR compliances.</li>\n<li><strong>Multi-Factor Authentication:</strong> LoginRadius offers stringent authentication backed by multi-factor authentication (MFA).</li>\n<li><strong>Risk-based Authentication:</strong> LoginRadius CIAM provides adaptive MFA, i.e., risk-based authentication, which adds another stringent layer of authentication whenever something suspicious is detected during a login attempt.</li>\n<li><strong>Quick Insights:</strong> Get valuable insights regarding user behavior to create the best marketing strategy and to provide different offers to users.</li>\n<li><strong>Single Sign-On (SSO):</strong> Enhance user experience with LoginRadius Single Sign-On that helps users to stay authenticated while switching applications or programs.</li>\n<li><strong>Passwordless Login:</strong> <a href=\"https://www.loginradius.com/passwordless-login/\">LoginRadius’ Passwordless Login</a> helps enterprises build the next level of user authentication experience that improves engagement and enhances conversions.</li>\n<li><strong>Social Login:</strong> LoginRadius CIAM helps your users to leverage their social media to quickly authenticate within a couple of seconds for a seamless login experience. </li>\n</ul>\n<h2 id=\"final-thoughts\" style=\"position:relative;\"><a href=\"#final-thoughts\" aria-label=\"final thoughts permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Final Thoughts</h2>\n<p>Enterprises embarking on a journey to enhance business growth while matching the pace with the best cybersecurity hygiene should consider NIST password guidelines while making password policies for users.</p>\n<p>When it comes to creating a flawless login experience backed by security, LoginRadius leaves no stone unturned in delivering the finest experience.</p>\n<p>LoginRadius is self-attested to the NIST Cybersecurity Framework as part of its internal infosec program and aligns with the NIST SP 800-53 component, leveraging the CSA CCM, which covers a broader footprint of the overall NIST cybersecurity framework.</p>\n<p>Need help with NIST? <a href=\"https://www.loginradius.com/contact-sales/\">Reach us</a> for quick guidance today.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAGCAYAAADDl76dAAAACXBIWXMAAAsSAAALEgHS3X78AAABdElEQVQY002RO0/CUBzFG6PtbZWHCAmRmBB5P8vDII9SSC0omog4oAEGjZMO6OKEuLjoJ2Fx0cSBwUQnXZxcHPwux38LJA7nNvfec8+5v1tOCCiwpbbhye2BxbYgBMtgIRVioDRRsARGXxZUzLlEHmehBaesQ4rrEMPViYf2DR9nDGKkChbVICVqsMt1WJI1sHCFwhUsUIFohJH49TxECvRUjhDW2mAbB5iP6hB8hUkhiRPN5KIZYJdrsEYrcCSpmQqMm6/m9ylUhSulY7N5ivROB3L9GOlGF3Ktbc4zuz341UPw/uIk0ESbBjoSGlYIx8BfzjSwVmyCEYEUUmCPa3Bnd+hwC75yC95S05SxbolU/iEbOCFCpDexEfIioTNCNd6Tp6IlMnNuGeeDe3z//OLx5RWj5zFGT2O8fXxh/P4Ja6w6vSEFCnTIlW2YiDzhzX7ATFKojDlvjpBPcDF4QPdyiG5/iE7/BmfXd+hd3VKpCoG8fzxWw2+c+yTpAAAAAElFTkSuQmCC'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-free-demo-loginradius\"\n        title=\"book-a-free-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"July 22, 2021","updated_date":null,"description":"The National Institute of Standards and Technology (NIST) has issued certain requirements along with controls for digital user identities. Let’s have a quick look at some of the important NIST password guidelines and learn how businesses can ensure maximum security in 2021 and beyond.","title":"How NIST is Changing Password Creation in 2021","tags":["security"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5151515151515151,"src":"/static/9819d7e3c418c8014b25d32652278643/14b42/nist-password-guidelines-2021-cover.jpg","srcSet":"/static/9819d7e3c418c8014b25d32652278643/f836f/nist-password-guidelines-2021-cover.jpg 200w,\n/static/9819d7e3c418c8014b25d32652278643/2244e/nist-password-guidelines-2021-cover.jpg 400w,\n/static/9819d7e3c418c8014b25d32652278643/14b42/nist-password-guidelines-2021-cover.jpg 800w,\n/static/9819d7e3c418c8014b25d32652278643/16310/nist-password-guidelines-2021-cover.jpg 1024w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Deependra Singh","github":null,"avatar":null}}}},{"node":{"excerpt":"The world is facing an uphill battle amid the global pandemic that has forced small and medium businesses to adopt diverse digital sales…","fields":{"slug":"/identity/risk-management-essentials-enterprise/"},"html":"<p>The world is facing an uphill battle amid the global pandemic that has forced small and medium businesses to adopt diverse digital sales channels.</p>\n<p>Since these businesses collect consumer data, which is swiftly accumulating, there’s a significant concern regarding the overall security.</p>\n<p>Talking about the stats,<a href=\"https://www.who.int/news-room/detail/23-04-2020-who-reports-fivefold-increase-in-cyber-attacks-urges-vigilance\"> WHO reported 450 active official email addresses and passwords</a> were leaked online along with thousands of other credentials – all linked with people working to lessen the COVID-19 impact.</p>\n<p>The more alarming thing is the fact that cybercriminals are continuously exploiting consumer data and have accelerated outbreaks by taking advantage of the chaotic time and the weaker first line of defense as businesses move to remote working ecosystems.</p>\n<p>So does it mean that businesses collecting consumer identities are now at more significant risk, especially those who have recently stepped into the digital commerce space?</p>\n<p>Yes, undoubtedly! Enterprises that are collecting, managing, and storing consumer identities in any form need to put their best foot forward in protecting sensitive consumer information, which, if not done at the earliest, may lead to undesirable consequences.</p>\n<p>Whether it’s the media industry or the education industry,<a href=\"https://www.loginradius.com/blog/identity/cyber-threats-business-risk-covid-19/\"> every industry is at a considerable risk of a security breach.</a>  </p>\n<p>In this post, we’ve outlined the aspects that can mitigate the risk during the uncertain times of COVID-19 and can help secure your business in a post-pandemic world.</p>\n<h3 id=\"1-creating-a-strong-password-policy-to-secure-remote-operation\" style=\"position:relative;\"><a href=\"#1-creating-a-strong-password-policy-to-secure-remote-operation\" aria-label=\"1 creating a strong password policy to secure remote operation permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. Creating a Strong Password Policy to Secure Remote Operation</h3>\n<p>Since remote working accounted for<a href=\"https://resources.malwarebytes.com/files/2020/08/Malwarebytes_EnduringFromHome_Report_FINAL.pdf\"> 20% of cybersecurity incidents</a> during the pandemic, securing the newly-adopted remote working ecosystem should be the #1 priority of businesses.</p>\n<p>To protect your organization's network, enforce a firm password security policy with the following practices:</p>\n<ul>\n<li><strong>Long passwords</strong>: The minimum length should be 15 characters, more if possible.</li>\n<li><strong>Mix characters</strong>: The password should be a combination of uppercase and lowercase letters, numbers, and symbols. The more complex your password is, the harder it will be for brute-force attackers.</li>\n<li><strong>Do not allow dictionary words</strong>: Do not use everyday dictionary words or even a combination of words. For example, \"chocolate\" is a bad password, so is \"dark chocolate\". Go for a passphrase instead. They are a string of related words with no sentence structure. Here is an example: hotdog food ketchup relish mustard mayo.</li>\n<li><strong>Don’t use memorable keyboard paths</strong>: Do not use sequential keyboard paths like qwerty, a1s2d3f4, or asdfgh.</li>\n<li><strong>Change passwords regularly</strong>: Change passwords at a regular interval. It can be once every month or twice a month.</li>\n<li><strong>Use a password manager</strong>: Password managers can auto-generate and store strong passwords on your behalf. They save your passwords in an encrypted, centralized location and allow you to access them with a master password.</li>\n</ul>\n<h3 id=\"2-embrace-multi-factor-authentication-mfa-to-prevent-unauthorized-access\" style=\"position:relative;\"><a href=\"#2-embrace-multi-factor-authentication-mfa-to-prevent-unauthorized-access\" aria-label=\"2 embrace multi factor authentication mfa to prevent unauthorized access permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. Embrace Multi-Factor Authentication (MFA) to Prevent Unauthorized Access</h3>\n<p>Cybercriminals are already bypassing weak lines of defense, which means a stringent action plan must be in place to</p>\n<p>When it comes to preventing unauthorized access to resources and sensitive information within a network, MFA can be the game-changer.</p>\n<p>For the most secure user sign-ins, you should combine elements like biometrics, SMS/text messages, emails, and security questions. Use<a href=\"https://www.loginradius.com/blog/identity/what-is-multi-factor-authentication/\"> extra layers of protection</a>, like text verification, email verification, or time-based security codes.</p>\n<p>LoginRadius’ CIAM (consumer identity and access management) solution provides multiple layers of security to ensure consumer data and enterprise information remain highly secure.</p>\n<p><a href=\"https://www.loginradius.com/resource/ebook/buyers-guide-to-multi-factor-authentication/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"EB-GD-to-MFA\"\n        title=\"EB-GD-to-MFA\"\n        src=\"/static/5093fa5ddf26d3a3ec38a96c3e0387e6/e5715/EB-GD-to-MFA.png\"\n        srcset=\"/static/5093fa5ddf26d3a3ec38a96c3e0387e6/a6d36/EB-GD-to-MFA.png 650w,\n/static/5093fa5ddf26d3a3ec38a96c3e0387e6/e5715/EB-GD-to-MFA.png 768w,\n/static/5093fa5ddf26d3a3ec38a96c3e0387e6/81501/EB-GD-to-MFA.png 2886w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<h3 id=\"3-cyber-awareness-training-to-avoid-human-error\" style=\"position:relative;\"><a href=\"#3-cyber-awareness-training-to-avoid-human-error\" aria-label=\"3 cyber awareness training to avoid human error permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3. Cyber Awareness Training to Avoid Human Error</h3>\n<p>Most cyber criminals try to sneak into a network by targeting employees through several attacks, including phishing, social engineering, and malware attacks.</p>\n<p>Suppose the employees of an organization aren’t aware of the latest attacks and how they can enhance their security while working. In that case, it may lead to a security breach causing millions of dollars of losses to the organization.</p>\n<p>Businesses must minimize human error as most of the attacks are successful just because of human error.</p>\n<p>Frequent cyber awareness training sessions must be organized within the enterprise to ensure that employees are aware of phishing emails and social engineering attacks and can handle these issues at their end.</p>\n<h3 id=\"4-unleash-the-potential-of-risk-based-authentication-rba\" style=\"position:relative;\"><a href=\"#4-unleash-the-potential-of-risk-based-authentication-rba\" aria-label=\"4 unleash the potential of risk based authentication rba permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>4. Unleash the Potential of Risk-Based Authentication (RBA)</h3>\n<p>Risk-based authentication is perhaps the best weapon against unauthorized access and to enhance network security.</p>\n<p><a href=\"https://www.loginradius.com/blog/identity/risk-based-authentication/\">RBA is a mechanism</a> that automatically adds another stringent layer of authentication whenever the system detects any unusual login attempt or an attempt that seems fishy.</p>\n<p>For instance, if a user tries to log in from his/her town and in a few minutes, a similar login request is made from another country (even if the login credentials are the same), the user would need to prove identity through another authentication process. An alert regarding the same would also be sent to the admin.</p>\n<h3 id=\"5-data-encryption--the-need-of-the-hour\" style=\"position:relative;\"><a href=\"#5-data-encryption--the-need-of-the-hour\" aria-label=\"5 data encryption  the need of the hour permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>5. Data Encryption- The Need of the Hour</h3>\n<p>To ensure data security on mobile devices and build trustworthiness, encryption must be in place. In this process, data is encoded to be inaccessible to unauthorized users and helps to protect sensitive data and private information.</p>\n<p><a href=\"https://www.loginradius.com/blog/engineering/encryption-and-hashing/\">Encryption</a> can also improve the security of communication between servers and client apps.</p>\n<p>Although encryption is basic, it's an essential aspect of data security. Organizations must do all that they can to protect their customer's information online as well as their own. Hence, it's becoming more and more common for technology encryption to be activated on apps and websites.</p>\n<h2 id=\"final-words\" style=\"position:relative;\"><a href=\"#final-words\" aria-label=\"final words permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Final Words</h2>\n<p>With the rising number of identity thefts and security breaches amid the global pandemic, enterprises that haven’t yet deployed a consumer identity and access management solution should immediately put their best foot forward to reinforce their security mechanism.</p>\n<p><a href=\"https://www.loginradius.com/contact-sales/\">LoginRadius</a> can be the most acceptable alternative for both the enterprises and startups that are collecting customer data and need to ensure a secure ecosystem without hampering the overall user experience.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-loginradius\"\n        title=\"book-a-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"July 20, 2021","updated_date":null,"description":"Cybercriminals continuously exploit consumer data and have accelerated outbreaks by taking advantage of the chaotic time, and the weaker first line of defense as businesses adopt new working ecosystems. This post covers all the aspects that require immediate consideration to minimize the risk of identity theft or a security breach.","title":"COVID-19 and Beyond: 5 Risk Management Essentials for Your Enterprise","tags":["risk management","cybersecurity","ciam solution","password management"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5037593984962405,"src":"/static/aa8ae1427384c4a7385b09bb1963e44d/14b42/risk-management-essentials-enterprise-cover.jpg","srcSet":"/static/aa8ae1427384c4a7385b09bb1963e44d/f836f/risk-management-essentials-enterprise-cover.jpg 200w,\n/static/aa8ae1427384c4a7385b09bb1963e44d/2244e/risk-management-essentials-enterprise-cover.jpg 400w,\n/static/aa8ae1427384c4a7385b09bb1963e44d/14b42/risk-management-essentials-enterprise-cover.jpg 800w,\n/static/aa8ae1427384c4a7385b09bb1963e44d/47498/risk-management-essentials-enterprise-cover.jpg 1200w,\n/static/aa8ae1427384c4a7385b09bb1963e44d/0e329/risk-management-essentials-enterprise-cover.jpg 1600w,\n/static/aa8ae1427384c4a7385b09bb1963e44d/d8255/risk-management-essentials-enterprise-cover.jpg 1920w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Vishal Sharma","github":null,"avatar":null}}}},{"node":{"excerpt":"Username and password were considered the only way to authenticate a user when we look back into ancient times. However, with advancements…","fields":{"slug":"/identity/webauth-secures-user-login/"},"html":"<p>Username and password were considered the only way to authenticate a user when we look back into ancient times.</p>\n<p>However, with advancements in technology, authentication has witnessed significant progress in the past couple of years.</p>\n<p>Today, when it comes to securing user accounts and offering the finest user experience, WebAuthn leaves no stone untouched in delivering a seamless authentication experience.</p>\n<p><a href=\"https://www.loginradius.com/blog/engineering/webauthn-authentication-application/\">WebAuth</a> has offered endless benefits to enterprises striving to manage and secure consumer identities and data as it sets a new bar for user authentication.</p>\n<p>Moreover, with robust authentication backed by a flawless user experience, including passwordless experience, WebAuthn provides a long list of opportunities to businesses.</p>\n<p>In this post, we’ll learn more about WebAuthn and how it paves the path for a secure and seamless user login experience.</p>\n<h2 id=\"what-is-webauth\" style=\"position:relative;\"><a href=\"#what-is-webauth\" aria-label=\"what is webauth permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is WebAuth</h2>\n<p>For those who aren’t aware of the term ‘WebAuthn’- it is a new standard for authentication, which is published by the World Wide Web Consortium and is supported by the FIDO alliance.</p>\n<p>WebAuthn works by offering a way for users to authenticate through third-party authentication providers. These third-party authentication providers can be built into the operating system, like Windows Hello, or Android biometrics, and even external authenticators, including a USB authenticator.</p>\n<p>Since the use of WebAuthn is now becoming an industry-standard in the digital world, enterprises must gear up to leverage their true potential when it comes to securing consumer data.</p>\n<h2 id=\"how-webauthn-works\" style=\"position:relative;\"><a href=\"#how-webauthn-works\" aria-label=\"how webauthn works permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How WebAuthn Works</h2>\n<p>WebAuthn is supported on various web browsers including Firefox, Chrome, Edge, and Safari. It’s a part of the <a href=\"https://www.loginradius.com/resource/fido2-authentication-standard-datasheet\">FIDO2 framework</a> and this framework is a set of technologies that enables authentication without the reliance on passwords between servers, authenticators, and web browsers.</p>\n<p>The Web Authentication API (WebAuthn) allows servers to quickly register and provide authentication to users that are using public-key cryptography instead of username and passwords.</p>\n<p>In this overall process, a private-public key pair, i.e., the credential is created for a web application and the private key is securely stored on a particular user’s device. On the other hand, the public key along with the credential ID (randomly generated) is further sent to the server for storage. The server further uses that particular public key to prove the identity of a user.</p>\n<p>Also, the public key here is no secret. The reason is, it becomes useless without a corresponding private key. Now even if the attacker has the public key, it’s of no use.</p>\n<h2 id=\"how-does-it-work-for-user-login\" style=\"position:relative;\"><a href=\"#how-does-it-work-for-user-login\" aria-label=\"how does it work for user login permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How does it Work for User Login</h2>\n<p>WebAuthn is widely used to provide biometric MFA (multi-factor authentication) where voice, fingerprint, or a retina scan is considered as a unique factor to a particular user.</p>\n<p>Today, most of the devices have a biometric device, like a smartphone, which can use the unique data that further creates and manages credentials, which can be accessed only by the owner.</p>\n<p>Since WebAuthn supports MFA, it can help to replace the standard website or web application password as it’s a far more secure way of authenticating.</p>\n<p>Whenever a user needs to prove their identity, the smart biometric can be utilized to authenticate a user on a particular platform without the need to enter credentials again and again.</p>\n<p>Let’s understand this with a real-life example where we can use WebAuthn for handling authentication after an individual has registered with a web application.</p>\n<p><a href=\"https://www.loginradius.com/resource/ebook/buyers-guide-to-multi-factor-authentication/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAGCAYAAADDl76dAAAACXBIWXMAAAsSAAALEgHS3X78AAABkklEQVQY0zWQyy9jYRjGTwQ9vYlQpTrViJ7T0lZIpeq0TqN1mWSmBAuKxCVCIqQrEqEiqUjM7GYjwcaKjQUWkxmJhZmNlZ2NZP6V33znHBZPvuR7n/e5vJJdzeBS01SVT4me/eViYpfVVp363ApSewG3msMu5gZPDmk4onk8qUkau/PYY8PIkSyykkY25gKSQXQoGt6dH/gq9ywnF0koWRKfUsj+EdzhvCBqlqDgOeMjBIZmiQ7P4EhOYYuPiv13Q/FKspLBKRLUrVWQisdIsRmkYJ6GwCS1vgKukG65C7IzohPo/4K/7zNNvaP4E2MEU19pEGnld1FT0Kji3fpO1/4lkaUT/EMlGmNFatwaro5B7OGMSa7t0MzltoECASFkoEWIm5U/BK3KabxrRyjb56jFQ5rT63jC0zg9WepEfVenjuTrYbP8jde3f9z8fOTq9hfXd795en7h4c8z9fGcaWgJGpXEcatVnepQBptIbQsZ/4M4whaqgkn6x5fY2DthvlRmbmvfxMp2hYXSgWlqE8H+AywzymSbMN5UAAAAAElFTkSuQmCC'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"EB-GD-to-MFA\"\n        title=\"EB-GD-to-MFA\"\n        src=\"/static/5093fa5ddf26d3a3ec38a96c3e0387e6/e5715/EB-GD-to-MFA.png\"\n        srcset=\"/static/5093fa5ddf26d3a3ec38a96c3e0387e6/a6d36/EB-GD-to-MFA.png 650w,\n/static/5093fa5ddf26d3a3ec38a96c3e0387e6/e5715/EB-GD-to-MFA.png 768w,\n/static/5093fa5ddf26d3a3ec38a96c3e0387e6/81501/EB-GD-to-MFA.png 2886w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<p>Suppose the user is registered from their phone and navigates to the web application to log in. In that case, they are prompted to enter their password or biometric, which is associated with that particular account. The user can simply use their biometric to log in without the need to enter lengthy passwords.</p>\n<p>Apart from this, the website or web application owner can also use it for multi-factor authentication that further reinforces overall login security.</p>\n<p>In this entire scenario, the user login is secured as attackers that have access to user credentials cannot access the account as MFA kicks in and demands the user to go through another stringent authentication process.</p>\n<h2 id=\"implementing-passwordless-authentication-with-loginradius\" style=\"position:relative;\"><a href=\"#implementing-passwordless-authentication-with-loginradius\" aria-label=\"implementing passwordless authentication with loginradius permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Implementing Passwordless Authentication with LoginRadius</h2>\n<p>The best way to provide seamless registration and authentication for your customers is with a <a href=\"https://www.loginradius.com/blog/identity/passwordless-authentication-the-future-of-identity-and-security/\">passwordless login</a> solution through WebAuthn. This gives your users a hassle-free way to access their accounts—with no passwords needed! </p>\n<p>The LoginRadius Identity Platform is an out-of-the-box way for you to do this easily. The identity and access management platform is fully customizable too, so you can simplify your customer experience to suit your company’s needs.</p>\n<h2 id=\"how-does-loginradius-passwordless-authentication-work\" style=\"position:relative;\"><a href=\"#how-does-loginradius-passwordless-authentication-work\" aria-label=\"how does loginradius passwordless authentication work permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How does LoginRadius Passwordless Authentication Work?</h2>\n<p><strong>Step 1:</strong> On the website login page, a customer will be asked to enter the email address. It will act as their username too.</p>\n<p><strong>Step 2:</strong> LoginRadius will send a temporary verification link to the associated email address. You can custom-set the duration that link will remain active before it expires.</p>\n<p><strong>Step 3:</strong> The customer is prompted to click the verification link, which is then authenticated and redirected to the website the customer originated from.</p>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>As the number of data breaches increases due to credential misuse, adding robust layers of security for your consumers is the need of the hour.</p>\n<p>WebAuthn could be a game-changer for any business striving to <a href=\"https://www.loginradius.com/customer-security/\">win consumer trust</a> as it offers a great user experience backed with the highest level of security.</p>\n<p>If you wish to deliver the next level of login experience to your consumers that not only ensures robust security but eventually helps to scale your business growth, LoginRadius is what you need.</p>\n<p><a href=\"https://www.loginradius.com/contact-sales/\">Reach us</a> for a personalized demo and know-how LoginRadius works for your business.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAGCAYAAADDl76dAAAACXBIWXMAAAsSAAALEgHS3X78AAABdElEQVQY002RO0/CUBzFG6PtbZWHCAmRmBB5P8vDII9SSC0omog4oAEGjZMO6OKEuLjoJ2Fx0cSBwUQnXZxcHPwux38LJA7nNvfec8+5v1tOCCiwpbbhye2BxbYgBMtgIRVioDRRsARGXxZUzLlEHmehBaesQ4rrEMPViYf2DR9nDGKkChbVICVqsMt1WJI1sHCFwhUsUIFohJH49TxECvRUjhDW2mAbB5iP6hB8hUkhiRPN5KIZYJdrsEYrcCSpmQqMm6/m9ylUhSulY7N5ivROB3L9GOlGF3Ktbc4zuz341UPw/uIk0ESbBjoSGlYIx8BfzjSwVmyCEYEUUmCPa3Bnd+hwC75yC95S05SxbolU/iEbOCFCpDexEfIioTNCNd6Tp6IlMnNuGeeDe3z//OLx5RWj5zFGT2O8fXxh/P4Ja6w6vSEFCnTIlW2YiDzhzX7ATFKojDlvjpBPcDF4QPdyiG5/iE7/BmfXd+hd3VKpCoG8fzxWw2+c+yTpAAAAAElFTkSuQmCC'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-loginradius\"\n        title=\"book-a-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"July 20, 2021","updated_date":null,"description":"WebAuthn is a new standard for authentication, which is published by the World Wide Web Consortium and is supported by the FIDO alliance. In this post, we’ve highlighted the role of WebAuthn and how it helps to create a secure login experience for consumers.","title":"How WebAuth Secures Your Users’ Login","tags":["passwordless authentication","mfa","cx"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5037593984962405,"src":"/static/91b58a3e2a44ae93f49c6ab4f14c8b02/14b42/webauth-secures-user-login-cover.jpg","srcSet":"/static/91b58a3e2a44ae93f49c6ab4f14c8b02/f836f/webauth-secures-user-login-cover.jpg 200w,\n/static/91b58a3e2a44ae93f49c6ab4f14c8b02/2244e/webauth-secures-user-login-cover.jpg 400w,\n/static/91b58a3e2a44ae93f49c6ab4f14c8b02/14b42/webauth-secures-user-login-cover.jpg 800w,\n/static/91b58a3e2a44ae93f49c6ab4f14c8b02/16310/webauth-secures-user-login-cover.jpg 1024w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Vishal Sharma","github":null,"avatar":null}}}},{"node":{"excerpt":"Many industries have foreseen the rising digitization of both residential and commercial procedures, products, and services. It includes…","fields":{"slug":"/growth/consumer-identity-role-in-the-digital-banking/"},"html":"<p>Many industries have foreseen the rising digitization of both residential and commercial procedures, products, and services. It includes both commercials as well as industrial processes, goods, and services.</p>\n<p>The banking sector has already adapted to such digitalization and is aiming to procure more consumers via online means and strategies.</p>\n<p>These initiatives sought to improve <a href=\"https://www.loginradius.com/blog/identity/financial-industry-identity-management/\">user banking authentication</a>, increase self-service in banking transactions, and reduce operational inefficiencies, among other things. That is the quantity, time, and complexity of the \"bureaucracy\" required to comply with any activity, allowing the process to be sped up significantly.</p>\n<h2 id=\"banks-have-accepted-and-adapted-digital-means\" style=\"position:relative;\"><a href=\"#banks-have-accepted-and-adapted-digital-means\" aria-label=\"banks have accepted and adapted digital means permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Banks Have Accepted and Adapted Digital Means</h2>\n<p>Banking firms have quickly adapted to shifts in their clients' tastes and consumption patterns, which are becoming increasingly localized on the Internet and through mobile devices. Clients are no longer going to a branch to create an account, get a mortgage, or transfer money.</p>\n<p>They now need to conduct their operations from the comfort of their own homes, or from wherever. All of this is available at the push of a button. It makes them feel in charge of the transaction, ensuring that it is completed quickly and simply.</p>\n<h2 id=\"a-challenge-that-remains-constant\" style=\"position:relative;\"><a href=\"#a-challenge-that-remains-constant\" aria-label=\"a challenge that remains constant permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>A Challenge that Remains Constant</h2>\n<p>Regardless of these broader trends, banks' security remains a top priority. The use of digital banking is on the rise, as are the risks it generates.</p>\n<p>Even today, online users use weak passwords or don't change their passwords frequently enough. It fails secure internet banking authentication. Most importantly, consumers are failing to realize how cybercrime is increasingly targeting mobile platforms and systems.</p>\n<p>Financial affairs control and <a href=\"https://www.loginradius.com/industry-finance-and-banking/\">safe banking authentication</a> are now moved to each of the clients' mobile phones. It is no more being safeguarded in guarded offices and big headquarters safes. This disintermediation fosters identity theft or fabrication, fraud, and, as a result, money laundering and criminal financing.</p>\n<h2 id=\"passwords-are-not-enough\" style=\"position:relative;\"><a href=\"#passwords-are-not-enough\" aria-label=\"passwords are not enough permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Passwords Are Not Enough</h2>\n<p>Safeguarding against cyberattacks is only one aspect of identity management. In a digital environment where data is exploding in volume and velocity, and clients use many platforms to obtain financial services, managing identities is becoming increasingly difficult and costly.</p>\n<p>To put that in context, identity solutions for digital marketing and access management currently account for more than 30% of a big financial institution's overall information security budget.</p>\n<p>The instruments that assure the legality of these distant movements are the electronic signature and systems for certified evidence retention. The main problem, however, is identity identification, which ensures the transaction's authenticity and intentionality. It is no longer sufficient to protect a basic user code and password.</p>\n<p><a href=\"https://www.loginradius.com/resource/loginradius-ciam-passwordless-login/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAGCAYAAADDl76dAAAACXBIWXMAAAsSAAALEgHS3X78AAABgElEQVQY00VRS0sCURgdejmORcFUUJZYPprKR5jo5KRlTeqQkdGil0bQTnqs2mWbVvVDgjZBtOgFQbSI2rRsEVFQtMkWKYm7071Xswsfl/N9h3O+B6e3D4OG0DMMgxREvRRiv0BzdgV/dRq8NQChfxzN8gxE1zj0DhW8NAK9TQFf5nAlsSBanGGIvUE0WGU02gNoH4yhdWACTY5R8DalImhwqugMz6NPnYPgn4XOGWGCrG4rC+pIwuzToEyl4I3Nw+RRUds9BMGtodE59i9YFhVJrs2rEdMIGsg0pXqJw1FAQwolEIgn4dMW4ArPwKQkYIkuo8UTZSKUXGchHZJpOvxxmOQpGH2TEN3E3DJUMWUd1nTLODq9Qj6fx/PLK97eP/CZ/cJPoQB1MY0qsw+c0YO1zD4en14Y9+D4HIcnF7i5f8DlzR1ZTZgZcvQY1V1+nF3fgr5sNotc7hvFYpHhaGodXKeXmfqnV5De3kNyM4PFjW0sbWSwurVL8A47Jl3dLwii3ouAZWc1AAAAAElFTkSuQmCC'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"Product-Passwordless-Login\"\n        title=\"Product-Passwordless-Login\"\n        src=\"/static/f4798092ec43235616eb2638cc648d3f/e5715/Product-Passwordless-Login.png\"\n        srcset=\"/static/f4798092ec43235616eb2638cc648d3f/a6d36/Product-Passwordless-Login.png 650w,\n/static/f4798092ec43235616eb2638cc648d3f/e5715/Product-Passwordless-Login.png 768w,\n/static/f4798092ec43235616eb2638cc648d3f/63ff0/Product-Passwordless-Login.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<h2 id=\"what-to-do-to-highlight-consumer-identity\" style=\"position:relative;\"><a href=\"#what-to-do-to-highlight-consumer-identity\" aria-label=\"what to do to highlight consumer identity permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What To Do To Highlight Consumer Identity</h2>\n<p>The solution currently rests in cutting-edge technologies that combine fluid usability, accessibility from any smartphone, and the implementation of various tests and precise security measures. We're discussing MFA (Multi-factor authentication banking) solutions.</p>\n<h3 id=\"elements-of-mfa\" style=\"position:relative;\"><a href=\"#elements-of-mfa\" aria-label=\"elements of mfa permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Elements of MFA</h3>\n<p>Anything that the user knows (e.g., a password or PIN), anything that the user owns (e.g., a mobile device), and something the user is; are the three fundamental aspects of an MFA (i.e., like a fingerprint, or voice). Multi-factor authentication banking is based on the idea that a second or third authentication element will make up for the deficiency of the first, and vice versa.</p>\n<p>Mobile banking multi-factor authentication  operates by requesting extra information for verification (factors). The one-time password is one of the most prevalent MFA elements that consumers face (OTP).</p>\n<p>Also Read: <a href=\"https://www.loginradius.com/blog/identity/financial-industry-identity-management/\">7 Benefits of Multi-Factor Authentication</a></p>\n<h3 id=\"biometric-way-to-ensure-complete-security\" style=\"position:relative;\"><a href=\"#biometric-way-to-ensure-complete-security\" aria-label=\"biometric way to ensure complete security permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Biometric way to ensure complete security</h3>\n<p>Biometric authentication for online banking is a computer-assisted technique of identifying consumers based on biological features and qualities such as fingerprints, finger vein patterns, iris recognition, and voice recognition. Because biometric authentication is unique to each person and difficult to counterfeit, biometric verification and authentication are widely used in immigration control, law enforcement, and forensic research.</p>\n<p>The advantages of <a href=\"https://www.loginradius.com/blog/identity/biometric-authentication-mobile-apps/\">biometric authentication</a> must exceed the expense and complication of deployment for the target user. When it comes to analyzing alternative biometric solutions for comfort, banks must engage in discussion before using the technique.</p>\n<h2 id=\"meet-the-evolving-consumer-demands-while-protecting-data\" style=\"position:relative;\"><a href=\"#meet-the-evolving-consumer-demands-while-protecting-data\" aria-label=\"meet the evolving consumer demands while protecting data permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Meet The Evolving Consumer Demands While Protecting Data</h2>\n<p>User onboarding expectations have increased in tandem with the evolution of digital services. When it comes to internet banking, consumers increasingly demand user-friendly solutions and streamlined efficiency. If this isn't available, they may easily move to a rival, like with internet purchasing.</p>\n<p>Digital identity, as the boundary of online services, is critical to online banking. Consumer-friendly identity and user management in banking are critical not just for offering seamless experiences, but also for protecting sensitive consumer information. Banks may adopt safe and consumer-centric digital access control by using a CIAM approach to MFA or 2-factor authentication (2FA).</p>\n<p>As a result, several financial institutions are deploying client identification and access management systems.</p>\n<h2 id=\"final-thoughts\" style=\"position:relative;\"><a href=\"#final-thoughts\" aria-label=\"final thoughts permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Final Thoughts</h2>\n<p>Public and commercial banks are emphasizing cybersecurity controls and tactics in digitalization and e-commerce, where criminality takes on more subtle and undetectable forms.</p>\n<p>If identification is the real cash, then digital identity and banking authentication is undoubtedly the new banking. And financial institutions have all of the investments necessary to make this new approach effective in the digital ecosystems of the coming years.</p>\n<p><a href=\"https://www.loginradius.com/\">LoginRadius</a> provides seamless, call or SMS-based Multi-Factor Authentication with a visible layer of security protection. You get to choose whether this security system is mandatory or optional for your consumers. The SMS and call systems hold zero lag with global coverage! <a href=\"https://www.loginradius.com/contact-sales/\">Contact the team</a> today!</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAGCAYAAADDl76dAAAACXBIWXMAAAsSAAALEgHS3X78AAABdElEQVQY002RO0/CUBzFG6PtbZWHCAmRmBB5P8vDII9SSC0omog4oAEGjZMO6OKEuLjoJ2Fx0cSBwUQnXZxcHPwux38LJA7nNvfec8+5v1tOCCiwpbbhye2BxbYgBMtgIRVioDRRsARGXxZUzLlEHmehBaesQ4rrEMPViYf2DR9nDGKkChbVICVqsMt1WJI1sHCFwhUsUIFohJH49TxECvRUjhDW2mAbB5iP6hB8hUkhiRPN5KIZYJdrsEYrcCSpmQqMm6/m9ylUhSulY7N5ivROB3L9GOlGF3Ktbc4zuz341UPw/uIk0ESbBjoSGlYIx8BfzjSwVmyCEYEUUmCPa3Bnd+hwC75yC95S05SxbolU/iEbOCFCpDexEfIioTNCNd6Tp6IlMnNuGeeDe3z//OLx5RWj5zFGT2O8fXxh/P4Ja6w6vSEFCnTIlW2YiDzhzX7ATFKojDlvjpBPcDF4QPdyiG5/iE7/BmfXd+hd3VKpCoG8fzxWw2+c+yTpAAAAAElFTkSuQmCC'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-Consultation\"\n        title=\"book-a-demo-Consultation\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"July 19, 2021","updated_date":null,"description":"Digital identity, as the boundary of online services, is critical to online banking. Consumer-friendly identity and user management in banking are critical not just for offering seamless experiences, but also for protecting sensitive consumer information.","title":"Role of Consumer Identity Authentication in Digital Banking","tags":null,"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.7699115044247788,"src":"/static/ea676fa73be40e718d4afc926baf3fdf/14b42/Digital-banking-platform-making-opt.jpg","srcSet":"/static/ea676fa73be40e718d4afc926baf3fdf/f836f/Digital-banking-platform-making-opt.jpg 200w,\n/static/ea676fa73be40e718d4afc926baf3fdf/2244e/Digital-banking-platform-making-opt.jpg 400w,\n/static/ea676fa73be40e718d4afc926baf3fdf/14b42/Digital-banking-platform-making-opt.jpg 800w,\n/static/ea676fa73be40e718d4afc926baf3fdf/47498/Digital-banking-platform-making-opt.jpg 1200w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Navanita Devi","github":null,"avatar":null}}}},{"node":{"excerpt":"It is scientifically proven that helping others makes people happy. Probably no one knows this better than the developer community around…","fields":{"slug":"/engineering/loginradius-sponsorship-freecodecamp/"},"html":"<p>It is scientifically proven that helping others makes people happy. Probably no one knows this better than the developer community around the world, which continues to amaze by contributing extensively to free and open source software.</p>\n<p>And there is <a href=\"https://www.freecodecamp.org/\">freeCodeCamp</a> community, a nonprofit started in 2014 by <a href=\"https://twitter.com/ossia\">Quincy Larson</a>. It has been helping thousands of aspiring developers learn web development and find their first software jobs. The community features a self-paced learning platform that helps learn various web technologies, including Bootstrap, D3, jQuery, and React, among many others.</p>\n<p>Being a nonprofit, freeCodeCamp entirely works based on charitable donations and contributions of developers to maintain its learning platform. In fact, it is so efficient that with every $5 in donation, it can provide more than 250 hours of learning. And it is so effective that some of its alumni work for marquee tech companies like Apple, Google, Microsoft, and Amazon, among others.</p>\n<p>In 2013, just a year before freeCodeCamp was established, we founded LoginRadius with a vision to secure every identity on this planet. From our early beginnings, we have developed LoginRadius CIAM to empower developers to build more secure applications and simplify the implementation of customer identity and access management on their production applications to save development and maintenance time. Today, burgeoning startups to Fortune 500 companies trust LoginRadius, and we're now collectively handling 1.17 billion user identities for our customers worldwide.</p>\n<p>We are as obsessed as freeCodeCamp to support and enable the developer community to do much more and make this world a better place. And we wanted to continuously help the freeCodeCamp community in any way possible.</p>\n<p>Today, we are a <a href=\"https://www.freecodecamp.org/news/sponsors/\">proud sponsor</a> of freeCodeCamp and supporting the community's developers. </p>\n<p><a href=\"https://accounts.loginradius.com/auth.aspx?action=register\">Signup here</a> if you're a developer from the freeCodeCamp community. And we'll offer $200 credits so you can leverage LoginRadius CIAM — beyond the free developer tier — to implement highly secure, user-centric customer identity and access management.</p>\n<p>This is indeed a moment of joy and pride for everyone at LoginRadius. We would like to extend our gratitude to freeCodeCamp for letting us be a part of its journey in strengthening the developer community.</p>\n<p>By the way, if you want to share your expertise with the developer community, please feel free to write for the LoginRadius Blog portal. We have an open for contributions policy so anyone around the world can <a href=\"https://github.com/LoginRadius/engineering-portal/blob/master/CONTRIBUTING.md\">contribute</a>. Find more details on our public <a href=\"https://github.com/LoginRadius/engineering-portal\">GitHub repo</a>.</p>\n<p><img src=\"https://media.giphy.com/media/xUPGcGJJMFeAPhqrfi/giphy.gif\" alt=\"Squad Goals\"></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"July 16, 2021","updated_date":null,"description":"LoginRadius now supports the freeCodeCamp community through a sponsorship program. We also offer $200 credits to freeCodeCamp developers to help them rapidly implement world-class customer identity and access management in their applications.","title":"One Vision, Many Paths: How We’re Supporting freeCodeCamp","tags":["LoginRadius","sponsorship","freeCodeCamp"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.3333333333333333,"src":"/static/abb83aaeb74765239bafebbba7e9cfd7/ee604/cover.png","srcSet":"/static/abb83aaeb74765239bafebbba7e9cfd7/69585/cover.png 200w,\n/static/abb83aaeb74765239bafebbba7e9cfd7/497c6/cover.png 400w,\n/static/abb83aaeb74765239bafebbba7e9cfd7/ee604/cover.png 800w,\n/static/abb83aaeb74765239bafebbba7e9cfd7/a8378/cover.png 1024w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Raghunath Reddy","github":"raghunath-r-a","avatar":null}}}}]},"markdownRemark":{"excerpt":"Identity is evolving, and developers are at the forefront of this transformation. Every day brings a new learning—adapting to new standards…","fields":{"slug":"/identity/developer-first-identity-provider-loginradius/"},"html":"<p>Identity is evolving, and developers are at the forefront of this transformation. Every day brings a new learning—adapting to new standards and refining approaches to building secure, seamless experiences.</p>\n<p>We’re here to support developers on that journey. We know how important simplicity, efficiency, and well-structured documentation are when working with identity and access management solutions. That’s why we’ve redesigned the <a href=\"https://www.loginradius.com/\">LoginRadius website</a>—to be faster, more intuitive, and developer-first in every way.</p>\n<p>The goal? Having them spend less time searching and more time building.</p>\n<h2 id=\"whats-new-and-improved-on-the-loginradius-website\" style=\"position:relative;\"><a href=\"#whats-new-and-improved-on-the-loginradius-website\" aria-label=\"whats new and improved on the loginradius website permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What’s New and Improved on the LoginRadius Website?</h2>\n<p>LoginRadius’ vision is to give developers a product that simplifies identity management so they can focus on building, deploying, and scaling their applications. To enhance this experience, we’ve spent the last few months redesigning our interface— making navigation more intuitive and reassuring that essential resources are easily accessible.</p>\n<p>Here’s a closer look at what’s new and why it’s important:</p>\n<h3 id=\"a-developer-friendly-dark-theme\" style=\"position:relative;\"><a href=\"#a-developer-friendly-dark-theme\" aria-label=\"a developer friendly dark theme permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>A Developer-Friendly Dark Theme</h3>\n<p><img src=\"/f46881583c7518a93bb24e94c32320de/a-developer-friendly-dark-theme.webp\" alt=\"This image shows how LoginRadius offers several authentication methods like traditional login, social login, passwordless login, passkeys and more in a dark mode.\">    </p>\n<p>Developers spend long hours working in dark-themed IDEs and terminals, so we’ve designed the LoginRadius experience to be developer-friendly and align with that preference.</p>\n<p>The new dark mode reduces eye strain, enhances readability, and provides a seamless transition between a coding environment and our platform. Our new design features a clean, modern aesthetic with a consistent color scheme and Barlow typography, ensuring better readability. High-quality graphics and icons are thoughtfully placed to enhance the content without adding visual clutter.</p>\n<p>So, whether you’re navigating our API docs or configuring authentication into your system, our improved interface will make those extended development hours more comfortable and efficient.</p>\n<h3 id=\"clear-categorization-for-loginradius-capabilities\" style=\"position:relative;\"><a href=\"#clear-categorization-for-loginradius-capabilities\" aria-label=\"clear categorization for loginradius capabilities permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Clear Categorization for LoginRadius Capabilities</h3>\n<p><img src=\"/e5358b82be414940f3fb146013845933/capabilities.webp\" alt=\"This image shows a breakdown of all the LoginRadius CIAM capabilities, including authentication, security, UX, scalability and multi-brand management.\"></p>\n<p>We’ve restructured our website to provide a straightforward breakdown of our customer identity and access management platform capabilities, helping you quickly find what you need:</p>\n<ul>\n<li>Authentication: Easily understand <a href=\"https://www.loginradius.com/blog/identity/authentication-option-for-your-product/\">how to choose the right login method</a>, from traditional passwords and OTPs to social login, federated SSO, and passkeys with few lines of code.</li>\n<li>Security: Implement no-code security features like bot detection, IP throttling, breached password alerts, DDoS protection, and adaptive MFA to safeguard user accounts.</li>\n<li>User Experience: Leverage AI builder, hosted pages, and drag-and-drop workflows to create smooth, branded sign-up and login experiences.</li>\n<li>High Performance &#x26; Scalability: Confidently scale with sub-100ms API response times, 100% uptime, 240K+ RPS, and 28+ global data center regions.</li>\n<li>Multi-Brand Management: Efficiently manage multiple identity apps, choosing isolated or shared data stores based on your brand’s unique needs.</li>\n</ul>\n<p>This structured layout ensures you can quickly understand each capability and how it integrates into your identity ecosystem.</p>\n<h3 id=\"developer-first-navigation\" style=\"position:relative;\"><a href=\"#developer-first-navigation\" aria-label=\"developer first navigation permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Developer-First Navigation</h3>\n<p><img src=\"/a8c155c2b6faf3d5f4b4de4e2b14d763/developers-menu.webp\" alt=\"This image shows the LoginRadius menu bar, highlighting the developer dropdown.\">   </p>\n<p>We’ve been analyzing developer workflows to identify how you access key resources. That’s why we redesigned our navigation with one goal in mind: to reduce clicks and make essential resources readily available.</p>\n<p>The new LoginRadius structure puts APIs, SDKs, and integration guides right at the menu bar under the Developers dropdown so you can get started faster. Our Products, Solutions, and Customer Services are also clearly categorized, helping development teams quickly find the right tools and make informed decisions.</p>\n<h3 id=\"quick-understanding-of-integration-benefits\" style=\"position:relative;\"><a href=\"#quick-understanding-of-integration-benefits\" aria-label=\"quick understanding of integration benefits permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Quick Understanding of Integration Benefits</h3>\n<p><img src=\"/b2f9a964a2da0ea83e2f8596b833bba7/we-support-your-tech-stack.webp\" alt=\"This image shows a list of popular programming languages and frameworks offered by LoginRadius.\"></p>\n<p>Developers now have a clear view of the tech stack available with LoginRadius, designed to support diverse business needs.</p>\n<p>Our platform offers pre-built SDKs for Node.js, Python, Java, and more, making CIAM integration seamless across popular programming languages and frameworks.</p>\n<h2 id=\"over-to-you-now\" style=\"position:relative;\"><a href=\"#over-to-you-now\" aria-label=\"over to you now permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Over to You Now!</h2>\n<p>Check out our <a href=\"https://www.loginradius.com/\">revamped LoginRadius website</a> and see how the improved experience makes it easier to build, scale, and secure your applications.</p>\n<p>Do not forget to explore the improved navigation and API documentation, and get started with our free trial today. We’re excited to see what you’ll build with LoginRadius!</p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"February 21, 2025","updated_date":null,"description":"LoginRadius’ vision is to give developers a product that simplifies identity management so they can focus on building, deploying, and scaling their applications. To enhance this experience, we’ve redesigned our website interface, making navigation more intuitive and reassuring that essential resources are easily accessible.","title":"Revamped & Ready: Introducing the New Developer-First LoginRadius Website","tags":["Developer tools","API","Identity Management","User Authentication"],"pinned":true,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.7857142857142858,"src":"/static/80b4e4fbe176a10a327d273504607f32/58556/hero-section.webp","srcSet":"/static/80b4e4fbe176a10a327d273504607f32/61e93/hero-section.webp 200w,\n/static/80b4e4fbe176a10a327d273504607f32/1f5c5/hero-section.webp 400w,\n/static/80b4e4fbe176a10a327d273504607f32/58556/hero-section.webp 800w,\n/static/80b4e4fbe176a10a327d273504607f32/99238/hero-section.webp 1200w,\n/static/80b4e4fbe176a10a327d273504607f32/7c22d/hero-section.webp 1600w,\n/static/80b4e4fbe176a10a327d273504607f32/1258b/hero-section.webp 2732w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},"pageContext":{"limit":6,"skip":426,"currentPage":72,"type":"///","numPages":161,"pinned":"ee8a4479-3471-53b1-bf62-d0d8dc3faaeb"}},"staticQueryHashes":["1171199041","1384082988","2100481360","23180105","528864852"]}