{"componentChunkName":"component---src-templates-blog-list-template-js","path":"/89","result":{"data":{"allMarkdownRemark":{"edges":[{"node":{"excerpt":"On average, an individual is exposed to thousands of advertising messages daily, ranging from TV and radio ads, newspapers, and magazines to…","fields":{"slug":"/growth/which-marketing-strategy-is-best-for-you/"},"html":"<p>On average, an individual is exposed to thousands of advertising messages daily, ranging from TV and radio ads, newspapers, and magazines to the internet and social media posts. This is the level of competition one has to go up against when pushing for prospects’ attention.</p>\n<p>Today, the <strong><a href=\"https://www.loginradius.com/blog/fuel/2021/01/engineering-as-marketing/\">marketing strategy</a></strong> has boiled down to two essential methods, inbound marketing, and outbound marketing. Many companies employ both strategies in accordance with their requirements. Let’s take a closer look at inbound vs. outbound marketing to understand which approach best suits your business.</p>\n<h2 id=\"inbound-marketing\" style=\"position:relative;\"><a href=\"#inbound-marketing\" aria-label=\"inbound marketing permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Inbound Marketing</h2>\n<p>Though a relatively new concept, inbound marketing is fast catching on for its unique ways to draw in consumers. Also known as content marketing, inbound marketing examples include the utilization of social media, <a href=\"https://www.visme.co/make-infographics/\">infographics</a>, email newsletters, white papers, creative blog posts, and other content-based activities to attract people’s interest.</p>\n<p>Inbound marketing has found massive success in recent years for its ability to pull in potential customers and positively impact companies through interactive engagements. Inbound marketing is indirect; there are no sales pitches or direct calls to action.</p>\n<p>Instead, it employs constant engagement with brands to stimulate people’s interest and propel them to take action.</p>\n<h2 id=\"outbound-marketing\" style=\"position:relative;\"><a href=\"#outbound-marketing\" aria-label=\"outbound marketing permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Outbound Marketing</h2>\n<p>Previously known just as simply ‘marketing,’ outbound marketing is an interruptive approach featuring content that is pushed at audiences whether they want it or not. Traditional sales approaches such as TV and radio ads, billboards, newspaper and magazine ads, banners, telemarketing, cold calling, and pop-up website ads are outdoor marketing examples.</p>\n<p>While once perhaps the only way to get people’s attention, outdoor marketing has steadily fallen out of favor with audiences. These days, audiences ignore these advances and do not feel obliged in the slightest.</p>\n<p><a href=\"https://www.loginradius.com/resource/digital-identity-future-whitepaper\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"the-Future-of-Digital-Identity\"\n        title=\"the-Future-of-Digital-Identity\"\n        src=\"/static/14504a482f49a68fd66cdbf009cda5de/e5715/the-Future-of-Digital-Identity.png\"\n        srcset=\"/static/14504a482f49a68fd66cdbf009cda5de/a6d36/the-Future-of-Digital-Identity.png 650w,\n/static/14504a482f49a68fd66cdbf009cda5de/e5715/the-Future-of-Digital-Identity.png 768w,\n/static/14504a482f49a68fd66cdbf009cda5de/63ff0/the-Future-of-Digital-Identity.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<h2 id=\"inbound-marketing-methodology\" style=\"position:relative;\"><a href=\"#inbound-marketing-methodology\" aria-label=\"inbound marketing methodology permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Inbound Marketing Methodology</h2>\n<p>It is no secret that nobody likes being bombarded with advertising messages in any form or being forced into making choices. And therein lays the advantage of inbound marketing. This strategy relies on enticing consumers with quality content, engaging and interacting with them, and giving them a choice to take further action.</p>\n<p>We see inbound marketing examples worldwide, yet they are often subtle and engaging and, therefore, do not seem intrusive. Instead of pushing out messages to uninterested audiences, inbound marketing solely aims to attract the best prospects, people that are actively looking for solutions online.</p>\n<p>Inbound marketing employs a wide range of <a href=\"https://www.loginradius.com/blog/fuel/2021/03/how-to-make-businesses-marketing-plans-after-coronavirus/\"><strong>marketing strategies</strong></a> like digital marketing, email marketing in newsletters and infotainment posts, and <strong><a href=\"https://www.loginradius.com/blog/fuel/2021/03/how-to-drive-in-the-highest-quality-leads-in-2021-with-content-and-seo/\">content marketing</a></strong> through blog posts and creative social media posts to attract potential consumers. Whether it is a product or service, inbound <strong><a href=\"https://www.loginradius.com/integrations/google-marketing-platform/\">marketing</a></strong> tactics seek to align their offerings with consumers' needs so that their products and services are needed rather than merely available.</p>\n<p>The inbound marketing methodology relies much on content to do the job. In this process, strangers are attracted to websites through blogs, relevant content, and paid optimization of keywords and search engine results.</p>\n<p>These strangers turn into visitors who might keep coming back for more and are directed to landing pages and exposed to calls for action in a subtle yet effective manner.</p>\n<p>Compelling, interactive, and engaging content is at the heart of inbound marketing. This content makes visitors share their email IDs and other contact information as relevant, which helps <strong>lead generation</strong> and fill the sales funnel.</p>\n<p>Success stories and case studies of people finding the right kind of help turn these customers into promoters keen on sharing their experience through surveys, social monitoring, and smart content.</p>\n<p>The sales and marketing space's saturation has necessitated the need to shift to newer methods to engage consumers. So far, the content strategy has been gaining steady popularity. Internet and social media are less expensive and easy-to-use tools, but their accessibility and widespread presence can be leveraged to achieve success in inbound marketing.</p>\n<h2 id=\"outbound-marketing-methodology\" style=\"position:relative;\"><a href=\"#outbound-marketing-methodology\" aria-label=\"outbound marketing methodology permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Outbound Marketing Methodology</h2>\n<p>Outbound marketing is called traditional marketing for a reason: there was a time when it was the only means to reach customers. These days, outbound tactics like interruptive messaging, cold calling, and newspaper and magazine ads have lost their effectiveness due to saturation and technology advancement.</p>\n<p>Smartphones have now made it possible to identify sales and promotional calls on smartphones and disconnect them straight away, while ad-blockers on computers can block pop-up advertisements.</p>\n<p>The people themselves have been so exposed to digital ads that they have now developed \"banner blindness,\" a phenomenon where web users ignore banner ads, consciously or unconsciously.</p>\n<p>Click-through rates for web display ads have also fallen to dismal levels, which means that unless a product or service is exceptional, relevant, or aligned with visitors' needs on a particular site, its outbound marketing campaigns are not going to work.</p>\n<h2 id=\"a-fusion-of-inbound-and-outbound\" style=\"position:relative;\"><a href=\"#a-fusion-of-inbound-and-outbound\" aria-label=\"a fusion of inbound and outbound permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>A Fusion of Inbound and Outbound</h2>\n<p>Many companies have begun to rely on a fusion of both inbound and outbound marketing to reach their goals in today's marketing landscape. That way, organizations can create brand awareness and visibility and engage with their audiences while giving the hard sell to targeted audiences.</p>\n<p>Marketing pixels allow companies to gather information about visitors and send them paid ads that are most likely to be of use or interest. Retargeting pixels and contextual ads featuring quality content are some of the best ways to attract visitors' attention.</p>\n<p>Companies would benefit from trying out new strategies while continuing to deploy those that work for them. Combining with regular data analysis to assess profitability will help companies stay on top of the game.\n<a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAGCAYAAADDl76dAAAACXBIWXMAAAsSAAALEgHS3X78AAABQklEQVQY01WR607CQBCFiUbcLZhoRGOCQSuUi1aUApa2yx0ViUAx0ZiggCa+nb9N1AfwsY6zdmv0x2Qms2e+OZONMMMDzwowGVRrlLmqwz5Xtcwxs4uEM0HipAfN7IEXWkofzESkiCnItnWBxOk5GAlZrhEsydYRalZ0G+ywjWTjDvnOLVjFx3KhG/QVI8LVUCxXR/JsgI3jDnjxEuyo++ssmnF/HDn+M6zBA6yrKSrDOcqUnfEC9vgJ++4I0bQTAgO6hG3SIDfJZb4ZAGnRKmX5dlCfIOWOKUbYc4bYta+R8nzo1N8p99XJEkjncXK5braxVQrcSSAjmHQfz5JQF1jUivjydbzdmPiYeXif2vgcpfE6MLBmOIga4r9DjQA8/JQ/oRFwKSNQLdl4ESU8iirmLRezZg0Lz8K9U0Y8J+gSgW9/I7juqjeCPAAAAABJRU5ErkJggg=='); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-Consultation\"\n        title=\"book-a-demo-Consultation\"\n        src=\"/static/c9ab924f722ed5737714b5205e5bb0a1/e5715/loginradius-book-a-demo.png\"\n        srcset=\"/static/c9ab924f722ed5737714b5205e5bb0a1/a6d36/loginradius-book-a-demo.png 650w,\n/static/c9ab924f722ed5737714b5205e5bb0a1/e5715/loginradius-book-a-demo.png 768w,\n/static/c9ab924f722ed5737714b5205e5bb0a1/63ff0/loginradius-book-a-demo.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"March 31, 2021","updated_date":null,"description":"Inbound marketing and outbound marketing are the two most important strategies in today's marketing strategy. Many companies employ both in accordance with their requirements. Let’s take a closer look at inbound vs. outbound marketing to understand which approach best suits your business.","title":"Inbound Vs Outbound: Which Marketing Strategy is Best for You","tags":null,"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5037593984962405,"src":"/static/e8efc8739236dcb287cdad93d8c965b9/14b42/marketing-plan.jpg","srcSet":"/static/e8efc8739236dcb287cdad93d8c965b9/f836f/marketing-plan.jpg 200w,\n/static/e8efc8739236dcb287cdad93d8c965b9/2244e/marketing-plan.jpg 400w,\n/static/e8efc8739236dcb287cdad93d8c965b9/14b42/marketing-plan.jpg 800w,\n/static/e8efc8739236dcb287cdad93d8c965b9/47498/marketing-plan.jpg 1200w,\n/static/e8efc8739236dcb287cdad93d8c965b9/0e329/marketing-plan.jpg 1600w,\n/static/e8efc8739236dcb287cdad93d8c965b9/6a059/marketing-plan.jpg 6000w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Shachindra Saxena","github":null,"avatar":null}}}},{"node":{"excerpt":"Consumer relations are about engaging with their audience at every level of a sales funnel to improve consumer experience. And you are only…","fields":{"slug":"/growth/emotional-intelligence/"},"html":"<p>Consumer relations are about engaging with their audience at every level of a sales funnel to improve consumer experience. And you are only as good as your emotional intelligence.</p>\n<p>Since marketing and sales teams are mostly responsible for building it, consumer relations is most prevalent in the support department.</p>\n<p>A pitch-perfect communication with consumers on the phone, via email, in person, or live chats can contribute more than one might think.</p>\n<p>The <strong><a href=\"https://www.loginradius.com/customer-experience-solutions/\">consumer experience</a></strong> and service industry requires agents to have the ability to relate to people on a personal level. Consumers need to feel as if they communicate with someone who genuinely cares and wants to solve their problem.</p>\n<p>It's not about hard skills but emotional intelligence (EI) of your agents, which you’re responsible for helping them develop.</p>\n<h2 id=\"emotional-intelligence-the-basics\" style=\"position:relative;\"><a href=\"#emotional-intelligence-the-basics\" aria-label=\"emotional intelligence the basics permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Emotional Intelligence: The Basics</h2>\n<p>Emotional intelligence helps people to communicate and resolve conflicts. It determines how teams work together efficiently and how they stay motivated to work better.</p>\n<p>The concept surged in popularity in the 1990s after the <a href=\"http://www.danielgoleman.info/topics/emotional-intelligence/\">Emotional Intelligence</a> book by Daniel Goleman got published.</p>\n<p>Psychologist and science journalist, Goleman examined EI with application to leadership and workspace. He revealed direct links between the emotional intelligence of entrepreneurs and their business.</p>\n<p>It appeared that the <a href=\"https://www.cognitiveinstitute.org/get-smart-about-emotional-intelligence/\">top five components of EI</a> — self-awareness, self-regulation, motivation, empathy, and social skills — result in an influence on business communication.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 60.61538461538461%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"business-communication\"\n        title=\"business-communication\"\n        src=\"/static/6cbab335bdd604ef07f2fec77df44499/e5715/1.png\"\n        srcset=\"/static/6cbab335bdd604ef07f2fec77df44499/a6d36/1.png 650w,\n/static/6cbab335bdd604ef07f2fec77df44499/e5715/1.png 768w,\n/static/6cbab335bdd604ef07f2fec77df44499/d0143/1.png 1025w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>In plain English, emotional intelligence is \"the ability to perceive, control and evaluate emotions – in oneself and others – and to use that information appropriately.\" (<a href=\"https://www.psychologytoday.com/intl/blog/your-mind-your-body/201201/10-ways-enhance-your-emotional-intelligence\">Source</a>)</p>\n<p>That's how Goleman explained the growing interest in emotional intelligence in the workplace:</p>\n<p>\"It stems from the widespread recognition that these abilities – self-awareness, self-management, empathy, and social skill – separate the most successful workers and leaders from the average. It's especially true in roles like the professions and higher-level executives, where everyone is about as smart as everyone else, and how people manage themselves and their relationships gives the best and edge.\" (<a href=\"https://positivepsychology.com/emotional-intelligence-workplace/\">Source</a>)</p>\n<p>He described EI with four domains and <a href=\"https://hbr.org/2017/02/emotional-intelligence-has-12-elements-which-do-you-need-to-work-on\">twelve competencies</a> a person needed to develop to become emotionally intelligent:</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 60.61538461538461%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"business-communication\"\n        title=\"business-communication\"\n        src=\"/static/1d3b0432e5680a98399b6fa33a1ce485/e5715/2.png\"\n        srcset=\"/static/1d3b0432e5680a98399b6fa33a1ce485/a6d36/2.png 650w,\n/static/1d3b0432e5680a98399b6fa33a1ce485/e5715/2.png 768w,\n/static/1d3b0432e5680a98399b6fa33a1ce485/d0143/2.png 1025w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>Today, experts agree on two statements:</p>\n<ol>\n<li>Emotional intelligence is possible to grow and improve with practice.</li>\n<li>Emotional intelligence impacts a job performance.</li>\n</ol>\n<p>Managers must pay attention to their agents' EI skills and help to grow them for improved consumer service.</p>\n<h2 id=\"why-emotional-intelligence-improves-consumer-relations\" style=\"position:relative;\"><a href=\"#why-emotional-intelligence-improves-consumer-relations\" aria-label=\"why emotional intelligence improves consumer relations permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Why Emotional Intelligence Improves Consumer Relations</h2>\n<p>Emotional intelligence helps agents develop consumer service skills like empathy, adaptability, self-control, teamwork, and willingness to improve. Having emotional self-awareness and the ability to admit they don't have the answer improves communication.</p>\n<p>Consumer satisfaction and <strong><a href=\"https://www.loginradius.com/blog/fuel/2021/03/how-customer-retention-can-help-businesses-grow/\">consumer retention</a></strong> increase with emotionally intelligent support teams.</p>\n<p>According to studies, <a href=\"https://info.microsoft.com/rs/157-GQE-382/images/2018StateofGlobalCustomerServiceReport.pdf\">61% of consumers</a> won't buy from a company providing them with poor consumer experience. On the contrary, 60% of consumers will work with a business handling consumer service well, even if the outcome isn't what they expected at first.</p>\n<p>The emotional intelligence of consumer service agents give insight into problems because their conflict <a href=\"https://www.loginradius.com/blog/fuel/2021/03/8-effective-communication-strategies-for-internal-alignment-and-growth-in-2021/\"><strong>management and communication skills</strong></a> encourage consumers to share feedback. Better individual interactions with consumers influence their buying decisions over time.</p>\n<p>So, why not foster positive consumer relations by helping your agents become more emotionally intelligent?</p>\n<h2 id=\"how-to-help-agents-grow-their-emotional-intelligence\" style=\"position:relative;\"><a href=\"#how-to-help-agents-grow-their-emotional-intelligence\" aria-label=\"how to help agents grow their emotional intelligence permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How to Help Agents Grow Their Emotional Intelligence</h2>\n<p>Start by growing a culture of emotional intelligence in your organization. Follow an education plan for why agents need EI and how it helps them build better consumer relations.</p>\n<ul>\n<li>Introduce the core principles of EI and discuss them during business meetups or team building events.</li>\n<li>Suggest <a href=\"https://bookauthority.org/books/new-emotional-intelligence-books\">books</a> or <a href=\"https://bid4papers.com/blog/critical-essay/\">critical essays</a> on the topic.</li>\n<li>Visit seminars and workshops with your support team or organize your own in the company.</li>\n<li>Recommend <a href=\"https://www.inc.com/justin-bariso/5-more-brilliant-ted-talks-that-will-boost-your-emotional-intelligence.html\">TED talks</a> or educational <a href=\"https://blog.feedspot.com/emotional_intelligence_podcasts/\">podcasts</a> about EI.</li>\n</ul>\n<p>When talking to consumers by phone or in live chats, consumer service agents need to stay engaged and adapt quickly. Implement simple tactics to ensure emotional intelligence success.</p>\n<ul>\n<li>Preparation. Motivate agents to improve by encouraging their participation in business processes.</li>\n<li>Training. Set clear goals and be a smart leader who fosters a positive relationship between team members. But make sure the goals and rules you establish for agents connect to your values. The guidelines need to support both business and team members' beliefs; only then, your agents will accept and approve the rules you set.</li>\n<li>Support. Encourage your agents to self-educate and learn new things, and create the conditions for efficient team collaboration.</li>\n</ul>\n<p>Setting up your team to succeed also requires some larger strategies.</p>\n<h3 id=\"workspace-organization\" style=\"position:relative;\"><a href=\"#workspace-organization\" aria-label=\"workspace organization permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Workspace Organization</h3>\n<p>Work environment matters for EI growth. It can influence health, mood, and motivation. It can boost productivity and help to control emotions. Organize the workspace for your consumer service agents so they could feel comfortable there.</p>\n<p>Think of a proper temperature level in the office. Consider light, comfortable furniture, and ventilation; also, make sure that every member of your team has an intimate environment. Remember to train them on hard skills too like using business software and understanding the product to improve consumer relations.</p>\n<h3 id=\"social-responsibility\" style=\"position:relative;\"><a href=\"#social-responsibility\" aria-label=\"social responsibility permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Social Responsibility</h3>\n<p>Encourage the social responsibility of your consumer support agents if possible. It's one of the highest emotional intelligence levels, so it would be a good thing to develop it in your team.</p>\n<p>Let them participate in volunteer events, encourage to make donations to charity, and promote positive changes in a non-intrusive way. The big chances are that most of your consumer support agents are Millennials, so they are a generation who's more concerned about doing something meaningful rather than earning money only. They'll support such an initiative by all means!</p>\n<p>Social responsibility is about what a business can contribute to others. In the context of emotional intelligence, it's a chance to train self-awareness and self-control of your agents.</p>\n<h3 id=\"stress-management\" style=\"position:relative;\"><a href=\"#stress-management\" aria-label=\"stress management permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Stress Management</h3>\n<p>Building and supporting consumer relations are time- and energy-consuming. It requires creativity and the ability to be flexible, which is stressful and can lead to the agents getting burned out. When in stress, they will hardly think of being emotionally intelligent in communication with consumers.</p>\n<p>Use simple tactics to keep the stress levels down.</p>\n<ul>\n<li>Don't let them work overtime. Stick to schedule and share tips on how they can get more energy at work.</li>\n<li>Encourage your agents to take breaks and rejuvenate. Consumer relations won't win if building them with tired and frustrated call center operators or live chat agents.</li>\n<li>Resolve conflicts. Address issues before they disrupt the healthy atmosphere in the office. Conflict management is among EI competencies for both managers and support agents to have</li>\n<li>Forget about multitasking. This technique doesn't work and impacts <a href=\"https://bid4papers.com/blog/time-management-for-college-students/\">time management skills</a> of your consumer support agents. Encourage them to focus on one thing at a time, as multitasking doubles the time it takes to complete tasks.</li>\n<li>Be empathetic. Grow the skills of treating your people with respect, kindness, and professionalism. Understand their needs and viewpoints. Forget about a one-size-fits-all approach to interacting with consumer support agents.</li>\n</ul>\n<h3 id=\"giving-a-voice\" style=\"position:relative;\"><a href=\"#giving-a-voice\" aria-label=\"giving a voice permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Giving a Voice</h3>\n<p>Stellar communication skills are a must for your consumer support agents to have. These skills are not only about the ability to talk via phones, chats, or emails but also about active listening, gaining a better understanding of body language, and the opportunity to express frustrations and concerns. Help your consumer service team develop them.</p>\n<p>Allow your team to share their ideas with you. Organize brainstorming sessions, present a storyboarding technique to them, and ask how they would solve problems.</p>\n<h2 id=\"appeal-to-agents-ei-for-better-communication-for-positive-consumer-relations\" style=\"position:relative;\"><a href=\"#appeal-to-agents-ei-for-better-communication-for-positive-consumer-relations\" aria-label=\"appeal to agents ei for better communication for positive consumer relations permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Appeal to Agents' EI for Better Communication for Positive Consumer Relations</h2>\n<p>The way your agents talk to consumers impacts your business reputation so be sure to appeal to their emotional intelligence.</p>\n<p>Emotional intelligence addresses such consumer service skills as persuasion and the ability to communicate clearly, use positive language, and \"read\" the consumer's current emotional state.</p>\n<p>Use the appropriate tone and style during phone calls or live chat communication with consumers.</p>\n<p>Encourage best practices with your consumer service agents like:</p>\n<ul>\n<li>Use positive language and tone of voice when speaking to consumers. Create a style guide they could use in communication: It's the list of dos and don'ts of your <strong><a href=\"https://www.loginradius.com/industry-media-and-communications/\">brand communication</a></strong>. Encourage your agents to use the vocabulary of phrases that reflect your brand identity and values.</li>\n<li>Adapt to consumers' communication styles. It's the EI capability giving your agents the understanding that they should mirror a consumers’ mood in the messages. For example, when talking to an angry person, there's no place for smiles but delicacy. And when a consumer is excited about something, it's okay to maintain the same mood in communication with him.</li>\n<li>Offer listening indicators. Encourage <a href=\"https://www.nicereply.com/blog/customer-support-agents-productivity/\">consumer service agents</a> to use so-called listening signals when communicating with consumers. Phrases like \"Okay,\" \"Oh, I see..,\" \"I understand,\" and others are indicators of empathy. They signal to consumers that an agent is on the same track with them.</li>\n</ul>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>Emotional intelligence is the ability to control emotions and relate well to others. Incorporating EI training into their management programs and encouraging the staff to grow EI builds a more robust business.</p>\n<p>It takes commitment and time but yields loyalty. Grow the emotional intelligence of your agents, be emotionally intelligent yourself, and implement them across business communication systems for productive consumer relations.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-Consultation\"\n        title=\"book-a-demo-Consultation\"\n        src=\"/static/c9ab924f722ed5737714b5205e5bb0a1/e5715/loginradius-book-a-demo.png\"\n        srcset=\"/static/c9ab924f722ed5737714b5205e5bb0a1/a6d36/loginradius-book-a-demo.png 650w,\n/static/c9ab924f722ed5737714b5205e5bb0a1/e5715/loginradius-book-a-demo.png 768w,\n/static/c9ab924f722ed5737714b5205e5bb0a1/63ff0/loginradius-book-a-demo.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"March 31, 2021","updated_date":null,"description":"Steps to Grow Your Emotional Intelligence for Better Consumer Relations | LoginRadius.","title":"Steps to Grow Your Emotional Intelligence for Better Consumer Relations","tags":null,"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.4388489208633093,"src":"/static/be2db10c7ec57c22d673b9e6115d5138/14b42/emotional-intelligence-loginradius.jpg","srcSet":"/static/be2db10c7ec57c22d673b9e6115d5138/f836f/emotional-intelligence-loginradius.jpg 200w,\n/static/be2db10c7ec57c22d673b9e6115d5138/2244e/emotional-intelligence-loginradius.jpg 400w,\n/static/be2db10c7ec57c22d673b9e6115d5138/14b42/emotional-intelligence-loginradius.jpg 800w,\n/static/be2db10c7ec57c22d673b9e6115d5138/47498/emotional-intelligence-loginradius.jpg 1200w,\n/static/be2db10c7ec57c22d673b9e6115d5138/f2e3f/emotional-intelligence-loginradius.jpg 1400w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Lesley Vos","github":null,"avatar":null}}}},{"node":{"excerpt":"Customer Authentication and Identity platforms offer a seemingly, complex web of tools that touch every aspect of a customer-facing business…","fields":{"slug":"/identity/calcualting-roi-build-vs-buy/"},"html":"<p>Customer Authentication and Identity platforms offer a seemingly, complex web of tools that touch every aspect of a customer-facing business and can have a significant impact on your bottom line. </p>\n<p>Most businesses with legacy systems are stuck between choosing to maintain an existing in-house system, investing in building a new in-house system, or working with a vendor. Making </p>\n<p>the wrong decision can be expensive, time-consuming, can put you at risk of a data breach, and may only keep you in regulatory compliance in the short-term. </p>\n<p>Working with an identity vendor who is an expert in the space is the safest and most economical approach to avoiding the pitfalls I mentioned above. </p>\n<p>A modern solution offers short-term wins and long-term value, highlighted by:</p>\n<ul>\n<li>Reducing costs.</li>\n<li>Boosting revenue.</li>\n<li>Ensuring your data is protected.</li>\n<li>Allowing your business to be more adaptable in a shifting technological and legal landscape. </li>\n</ul>\n<p>Mix those benefits in with a speedy implementation period, and your teams can get back to focusing on innovating and growing your business. </p>\n<p>This blog is a multi-part series where we will outline the value of working with LoginRadius over maintaining and building up your existing systems.</p>\n<h2 id=\"time-effort-and-maintenance\" style=\"position:relative;\"><a href=\"#time-effort-and-maintenance\" aria-label=\"time effort and maintenance permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Time, Effort, and Maintenance</h2>\n<p>Most businesses that hesitate to invest in a vendor solution are often unaware of how much their existing approach is costing them – and not just in money. </p>\n<p>To understand why a vendor approach is so economical, we must first outline the existing costs associated with maintaining an outdated and decentralized authentication and identity system.</p>\n<p>At the end of this section, you should have a blueprint for understanding what your internally built system costs to run today. </p>\n<p>Use a chart like the one below to enter your costs. Remember, even rough estimated will very quickly outline the scale of these costs:</p>\n<ul>\n<li><strong>Assigned staff</strong>: Maintaining an authentication and identity offering is usually a full-time job for at least one developer. Larger businesses with more complex use-cases may require multiple developers to manage these systems. Enter the total salary of the staff members assigned to these functions. You may also use a percentage of an annual salary if a team member is not dedicating 100% of their time to this work. </li>\n<li><strong>Adding or fixing features</strong>: In any given year, a business will undertake several projects related to their authentication or customer data management systems. This work can include maintaining integrations, building new integrations, maintaining authentication systems, adding new features, and <a href=\"https://www.loginradius.com/resource/fixing-broken-authentication-with-adaptive-mfa/\">fixing broken features</a>. Enter the total salary of the staff members assigned to these functions. You may also use a percentage of an annual salary if a team member is not dedicating 100% of their time to this work.</li>\n<li><strong>Customer service</strong>: Dealing with authentication-related issues such as lost passwords take up most of a support desk’s time. Try to calculate a percentage of their salaries as it relates to these efforts.</li>\n</ul>\n<table>\n  <tr>\n   <td>\n#\n   </td>\n   <td>Item\n   </td>\n   <td>Amount ($)\n   </td>\n  </tr>\n  <tr>\n   <td>1\n   </td>\n   <td>Assigned Staff Salary Totals\n   </td>\n   <td>\n   </td>\n  </tr>\n  <tr>\n   <td>2\n   </td>\n   <td>Adding or Fixing Features Totals\n   </td>\n   <td>\n   </td>\n  </tr>\n  <tr>\n   <td>3\n   </td>\n   <td>Customer Service Salary Totals\n   </td>\n   <td>\n   </td>\n  </tr>\n  <tr>\n   <td>4\n   </td>\n   <td><p style=\"text-align: right\">\nTotal</p>\n   </td>\n   <td>\n   </td>\n  </tr>\n</table>\n<p>The maintenance costs of in-house Authentication and Identity are pretty high even if we only define “maintenance” as keeping the existing system working properly. </p>\n<p>When businesses embark on a project to improve or update those systems, those costs skyrocket – entire teams of developers, project managers, and executives must turn their efforts towards these pushes. </p>\n<p>Customer service efforts make up a huge chunk of the hidden costs associated with legacy authentication systems. These teams see large swaths of their time drained by dealing with end-users trying to reset their passwords, recover their accounts, cancel memberships, revoke access to data, and more.</p>\n<p><a href=\"https://www.loginradius.com/resource/the-case-for-buying-over-building/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"The Case for Buying over Building 1\"\n        title=\"The Case for Buying over Building 1\"\n        src=\"/static/57f557d0de5a1542f05a0772cc1131c7/e5715/The-Case-for-Buying-over-Building-1.png\"\n        srcset=\"/static/57f557d0de5a1542f05a0772cc1131c7/a6d36/The-Case-for-Buying-over-Building-1.png 650w,\n/static/57f557d0de5a1542f05a0772cc1131c7/e5715/The-Case-for-Buying-over-Building-1.png 768w,\n/static/57f557d0de5a1542f05a0772cc1131c7/2bef9/The-Case-for-Buying-over-Building-1.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<h2 id=\"case-study\" style=\"position:relative;\"><a href=\"#case-study\" aria-label=\"case study permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Case Study</h2>\n<p>One of our news and media customers told us a story about a project they took on a couple of years before working with us. It started with a question: _Do we want to add Google as a social login option to our website? _</p>\n<p>They launched a research team that was asked to determine whether their users would leverage that option enough to make a difference in conversion; these findings had to be presented to leadership, and then a decision had to be made by that group. Once that decision was, they assigned a project manager and a series of front-end and back-end developers to update their site and apps with the new login option. This involved developing the social login connectors, QA testing, staging environments, then a go-live team for their web and mobile offerings. This effort took over four months to complete. </p>\n<p>This same project would take LoginRadius customers no more than a couple of weeks. How?</p>\n<p>Well, the connectors are already built. We have detailed step-by-step guides in our documentation. Our support is available 24/7/365 to help solve any issues, and our dashboard-driven deployment tools offer pre-built and customizable options from a UI/UX perspective. </p>\n<p>If the business decision is already made, you could easily add a <a href=\"https://www.loginradius.com/blog/identity/2021/02/social-login-infographic/\">social login</a> option to your website and mobile apps in the afternoon and go live that same night – we know this because we see our customers do it all the time!</p>\n<p><strong>Stayed tuned for Part II of this series, where I will help you calculate lost revenue associated with authentication and system availability.</strong></p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAGCAYAAADDl76dAAAACXBIWXMAAAsSAAALEgHS3X78AAABdElEQVQY002RO0/CUBzFG6PtbZWHCAmRmBB5P8vDII9SSC0omog4oAEGjZMO6OKEuLjoJ2Fx0cSBwUQnXZxcHPwux38LJA7nNvfec8+5v1tOCCiwpbbhye2BxbYgBMtgIRVioDRRsARGXxZUzLlEHmehBaesQ4rrEMPViYf2DR9nDGKkChbVICVqsMt1WJI1sHCFwhUsUIFohJH49TxECvRUjhDW2mAbB5iP6hB8hUkhiRPN5KIZYJdrsEYrcCSpmQqMm6/m9ylUhSulY7N5ivROB3L9GOlGF3Ktbc4zuz341UPw/uIk0ESbBjoSGlYIx8BfzjSwVmyCEYEUUmCPa3Bnd+hwC75yC95S05SxbolU/iEbOCFCpDexEfIioTNCNd6Tp6IlMnNuGeeDe3z//OLx5RWj5zFGT2O8fXxh/P4Ja6w6vSEFCnTIlW2YiDzhzX7ATFKojDlvjpBPcDF4QPdyiG5/iE7/BmfXd+hd3VKpCoG8fzxWw2+c+yTpAAAAAElFTkSuQmCC'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book a demo loginradius\"\n        title=\"book a demo loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"March 31, 2021","updated_date":null,"description":"Most businesses with legacy systems are stuck between choosing to maintain an existing in-house system, investing in building a new in-house system, or working with a vendor. Making the wrong decision can be expensive. This blog is a multi-part series where we have outlined the value of working with LoginRadius over maintaining and building up your existing systems.","title":"Calculating ROI, Build vs Buy (Part 1)","tags":["customer authentication","identity management","cx"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5037593984962405,"src":"/static/95457fd0469650a4a716e0d2837f0db5/14b42/calcualting-roi-build-vs-buy-cover.jpg","srcSet":"/static/95457fd0469650a4a716e0d2837f0db5/f836f/calcualting-roi-build-vs-buy-cover.jpg 200w,\n/static/95457fd0469650a4a716e0d2837f0db5/2244e/calcualting-roi-build-vs-buy-cover.jpg 400w,\n/static/95457fd0469650a4a716e0d2837f0db5/14b42/calcualting-roi-build-vs-buy-cover.jpg 800w,\n/static/95457fd0469650a4a716e0d2837f0db5/16310/calcualting-roi-build-vs-buy-cover.jpg 1024w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Cooper Matheson","github":null,"avatar":null}}}},{"node":{"excerpt":"There’s a significant increase in the number of identity theft cases amid the global pandemic since the internet became the second home for…","fields":{"slug":"/identity/identity-theft-frauds/"},"html":"<p>There’s a significant increase in the number of identity theft cases amid the global pandemic since the internet became the second home for everyone in 2020.</p>\n<p>With so many businesses adopting diverse working environments, fraudsters are quickly finding new ways to breach security and gain access to confidential information.</p>\n<p>As per the<a href=\"https://public.tableau.com/profile/federal.trade.commission#!/vizhome/COVID-19andStimulusReports/Map\"> FTC’s COVID-19 &#x26; Stimulus Report</a>, 143,992 fraud reports linked to COVID-19 have been reported in the year 2020.</p>\n<p>However, experts predict that the number of cybercrimes in 2020 was just the tip of the iceberg since cybercriminals are already geared to sneak into a user’s system by trespassing into newly adopted working environments.  </p>\n<p>But what’s more alarming is the fact that these<a href=\"https://idtheftinfo.org/latest-news/145\"> numbers are expected to surge in 2021</a>, which further increases the risk for businesses with a frail line of defense.</p>\n<p>Undoubtedly, businesses must anticipate potential frauds to minimize the risk for their employees’ and clients’ identities in 2021.</p>\n<p>Let’s understand the major identity theft frauds for 2021 along with aspects that help in preventing these frauds.</p>\n<h2 id=\"what-is-identity-theft-fraud\" style=\"position:relative;\"><a href=\"#what-is-identity-theft-fraud\" aria-label=\"what is identity theft fraud permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is Identity Theft Fraud</h2>\n<p>Identity theft could be defined as the illegal access to your data including name, personal identity number, bank details, and enterprise login credentials.</p>\n<p>This unauthorized access is intended to steal crucial details, transfer funds, or even manipulate the data of a particular enterprise.</p>\n<p>The victim may receive an email demanding a certain action. For instance, an email with a malware link, which when clicked, may install malicious software on someone’s computer and gain access to their business or personal information.</p>\n<h2 id=\"identity-theft-fraud-predictions-for-2021\" style=\"position:relative;\"><a href=\"#identity-theft-fraud-predictions-for-2021\" aria-label=\"identity theft fraud predictions for 2021 permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Identity Theft Fraud Predictions for 2021</h2>\n<p>Here’s the list of trends that are predicted by global cybersecurity professionals that businesses could witness in 2021:</p>\n<h3 id=\"1-biometric-fraud\" style=\"position:relative;\"><a href=\"#1-biometric-fraud\" aria-label=\"1 biometric fraud permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. Biometric Fraud</h3>\n<p>With fraudsters bypassing every secure and reliable mode of authentication, biometric fraud could be the next big thing when it comes to data breaches.</p>\n<p>Hackers are already working on breaching biometric authentication by the means of replacing the original pictures of an individual with fake ones.</p>\n<p>This would help in bypassing the essential identity verification systems to crucial data including banking details and media.</p>\n<p>Several cases of biometric frauds have been reported in 2020, which are predicted to surge in 2021. Only a secure <a href=\"https://www.loginradius.com/blog/identity/2019/06/what-is-multi-factor-authentication/\">multi-factor authentication</a>, based on risk analysis can help in preventing biometric frauds.</p>\n<h3 id=\"2-innovative-forms-of-attacks\" style=\"position:relative;\"><a href=\"#2-innovative-forms-of-attacks\" aria-label=\"2 innovative forms of attacks permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. Innovative Forms of Attacks</h3>\n<p>Besides the usual attacks that businesses across the globe witness every day, attackers are now figuring out new innovative ways to bypass authentication or gain access to a user’s confidential information.</p>\n<p>The rising number of social engineering and ransomware attacks is a good example of how attackers can utilize a malicious program for financial benefits.  </p>\n<p>Creating awareness among employees and consumers could be the most efficient way of reducing any kinds of<a href=\"https://www.loginradius.com/blog/identity/2020/10/social-engineering-attacks/\"> social engineering</a> and ransomware attacks.</p>\n<h3 id=\"3-synthetic-identity-frauds\" style=\"position:relative;\"><a href=\"#3-synthetic-identity-frauds\" aria-label=\"3 synthetic identity frauds permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3. Synthetic Identity Frauds</h3>\n<p>Another expected trend in cybercrime to witness in the year 2021 is the use of synthetic identity.</p>\n<p>Synthetic identity theft is fraud that helps in authenticating an unauthorized professional by combining real and fake information about an individual.</p>\n<p>Cybercriminals steal social security numbers and combine the same with fake information including names or addresses and may get unnoticed for months.</p>\n<p>Considering the use of CIAM (consumer identity and access management) solution could be the best option for securing identities and shunning any chance of identity theft.</p>\n<h3 id=\"4-a-surge-in-the-number-of-coercion-attacks\" style=\"position:relative;\"><a href=\"#4-a-surge-in-the-number-of-coercion-attacks\" aria-label=\"4 a surge in the number of coercion attacks permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>4. A Surge in the Number of Coercion Attacks</h3>\n<p>Just like ransomware, which demands a certain amount of fees to unlock your files once malicious software is installed in your computer, other forms of coercion attacks could be witnessed in 2021.</p>\n<p>These kinds of attacks are projected to demand money to unlock the files on a system that are encrypted through a software program.</p>\n<p>This software program is installed when a user accidentally clicks on a link in a spam email or can be even injected while the user is browsing on a suspected website.</p>\n<p>Using an antivirus program could be the best option to prevent any kinds of coercion attacks.</p>\n<h3 id=\"5-credential-stuffing\" style=\"position:relative;\"><a href=\"#5-credential-stuffing\" aria-label=\"5 credential stuffing permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>5. Credential Stuffing</h3>\n<p><a href=\"https://www.loginradius.com/blog/identity/2019/09/prevent-credential-stuffing-attacks/\">Credential stuffing</a> allows an unauthorized professional to get access to a user through credentials, which are repeatedly used by a user on different platforms.</p>\n<p>This kind of attack could be quite dangerous since attackers can log in to multiple websites and platforms with a single user id and password as set by the user.</p>\n<p>Multi Factor authentication implementation for businesses could help in preventing credential stuffing attacks on their employees as well as consumers.</p>\n<h2 id=\"ways-to-prevent-identity-theft\" style=\"position:relative;\"><a href=\"#ways-to-prevent-identity-theft\" aria-label=\"ways to prevent identity theft permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Ways to Prevent Identity Theft</h2>\n<p>Here are some effective ways to prevent identity theft for businesses:</p>\n<ol>\n<li><strong>Use Strong Passwords:</strong> Businesses need to understand the fact that strong passwords are crucial more than ever before in 2021. Users/employees with weak passwords may increase the vulnerabilities.</li>\n<li><strong>Adding Two-Factor Authentication:</strong> Two-factor authentication helps to minimize the risk of identity theft and prevents unauthorized login. Businesses need to understand the importance of email or OTP-based authentication processes for enhancing security.</li>\n<li><strong>Never Share Your Social Security Number or PIN:</strong> Avoid sharing SSNs or PINs over emails as it increases the chances of misuse of confidential data. If someone needs to share an account for some reason, prefer sharing the PIN/SSN verbally.</li>\n<li><strong>Implement CIAM:</strong> Organizations must consider implementing a CIAM (consumer identity and access management) solution to ensure maximum safety for their consumers and employees. A CIAM solution helps to secure millions of identities through secure signing options. </li>\n</ol>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>Lack of adequate cyber awareness leads to identity theft frauds. It’s crucial for businesses to cyber-aware their employees as well as clients.</p>\n<p>The aforementioned aspects also require adequate consideration when it comes to securing the identities of individuals and consumers.</p>\n<p>Implementation of identity and access management solutions could be the game-changer for businesses that are striving to <a href=\"https://www.loginradius.com/blog/identity/2019/12/digital-privacy-best-practices/\">protect consumer identities</a>.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAGCAYAAADDl76dAAAACXBIWXMAAAsSAAALEgHS3X78AAABdElEQVQY002RO0/CUBzFG6PtbZWHCAmRmBB5P8vDII9SSC0omog4oAEGjZMO6OKEuLjoJ2Fx0cSBwUQnXZxcHPwux38LJA7nNvfec8+5v1tOCCiwpbbhye2BxbYgBMtgIRVioDRRsARGXxZUzLlEHmehBaesQ4rrEMPViYf2DR9nDGKkChbVICVqsMt1WJI1sHCFwhUsUIFohJH49TxECvRUjhDW2mAbB5iP6hB8hUkhiRPN5KIZYJdrsEYrcCSpmQqMm6/m9ylUhSulY7N5ivROB3L9GOlGF3Ktbc4zuz341UPw/uIk0ESbBjoSGlYIx8BfzjSwVmyCEYEUUmCPa3Bnd+hwC75yC95S05SxbolU/iEbOCFCpDexEfIioTNCNd6Tp6IlMnNuGeeDe3z//OLx5RWj5zFGT2O8fXxh/P4Ja6w6vSEFCnTIlW2YiDzhzX7ATFKojDlvjpBPcDF4QPdyiG5/iE7/BmfXd+hd3VKpCoG8fzxWw2+c+yTpAAAAAElFTkSuQmCC'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-loginradius\"\n        title=\"book-a-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"March 31, 2021","updated_date":null,"description":"With so many businesses adopting diverse working environments, fraudsters are quickly finding new ways to breach security and gain access to confidential information. Businesses must anticipate potential frauds to minimize the risk for their employees’ and clients’ identities in 2021.","title":"Identity Theft Frauds- Staying Ahead in 2021","tags":["data security","mfa","cx"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.4705882352941178,"src":"/static/a968aaf38f403b91d10e8dd3679a6854/14b42/identity-theft-fraud-cover.jpg","srcSet":"/static/a968aaf38f403b91d10e8dd3679a6854/f836f/identity-theft-fraud-cover.jpg 200w,\n/static/a968aaf38f403b91d10e8dd3679a6854/2244e/identity-theft-fraud-cover.jpg 400w,\n/static/a968aaf38f403b91d10e8dd3679a6854/14b42/identity-theft-fraud-cover.jpg 800w,\n/static/a968aaf38f403b91d10e8dd3679a6854/16310/identity-theft-fraud-cover.jpg 1024w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Vishal Sharma","github":null,"avatar":null}}}},{"node":{"excerpt":"The booming number of data breaches across the globe depicts that privacy compliance is the need of the hour.  For those who don't know what…","fields":{"slug":"/identity/privacy-compliance/"},"html":"<p>The booming number of data breaches across the globe depicts that privacy compliance is the need of the hour. </p>\n<p>For those who don't know what privacy compliance is—it's an important data security practice that is becoming progressively necessary as data privacy laws like the EU’s GDPR become more stringent.</p>\n<p>Here are the stats showcasing total data breaches and exposed records in the US alone from 2005-2020. </p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 142.92307692307693%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"privacy-compliance-1\"\n        title=\"privacy-compliance-1\"\n        src=\"/static/6db627375d66608b27468c4e12ce77bc/e5715/privacy-compliance-1.png\"\n        srcset=\"/static/6db627375d66608b27468c4e12ce77bc/a6d36/privacy-compliance-1.png 650w,\n/static/6db627375d66608b27468c4e12ce77bc/e5715/privacy-compliance-1.png 768w,\n/static/6db627375d66608b27468c4e12ce77bc/2bef9/privacy-compliance-1.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>Source: <a href=\"https://www.statista.com/statistics/273550/data-breaches-recorded-in-the-united-states-by-number-of-breaches-and-records-exposed/\">Statista</a></p>\n<p>Some of the major data breaches over the last couple of years include Marriott, T-Mobile, Quora, British Airways, and recently, Capital One Bank in the US. </p>\n<p>Considering these high-profile leaks, the data protection compliance program in business is now crucial than ever before. </p>\n<p>A business won’t even realize a breach for weeks but all it takes is a minute for a successful data leak. </p>\n<h2 id=\"what-is-privacy-compliance-law\" style=\"position:relative;\"><a href=\"#what-is-privacy-compliance-law\" aria-label=\"what is privacy compliance law permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is Privacy Compliance Law</h2>\n<p>Privacy compliance law states how organizations (regardless of their industry) meet regulatory and legal requirements for the collection, processing, and maintenance of personal information. </p>\n<p>A breach in data privacy can lead to legal consequences and may be followed by investigations and fines.</p>\n<p>But why do organizations need to immediately think about getting privacy compliant?</p>\n<p>Well, consumers or employees can respond with civil lawsuits whenever their privacy is compromised while an organization collects and processes personal information. </p>\n<h2 id=\"past-and-current-privacy-laws\" style=\"position:relative;\"><a href=\"#past-and-current-privacy-laws\" aria-label=\"past and current privacy laws permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Past and Current Privacy Laws</h2>\n<p>Privacy compliance is the line between the legal and the illegal. Privacy laws and regulations help protect consumers in different countries by ensuring data is handled appropriately. </p>\n<p>The EU Data Protection Directive (Directive 95/46/EC), adopted back in 1995, was designed for protecting the privacy and security of personal data. </p>\n<p>According to EUDPD, the data protection rules must be considered whenever personal data related to EU citizens is collected or exchanged for processing. </p>\n<p>Moreover, the General Data Protection Regulation (GDPR), a legal framework approved in 2016, replaces its predecessor EUPD and sets essential guidelines for collecting &#x26; processing personal information from the European Union residents. </p>\n<p>For US citizens, the California Consumer Privacy Act (CCPA) is intended to protect unauthorized access to PII (Personally Identifiable Information).</p>\n<p>Companies not in compliance with the <a href=\"https://www.loginradius.com/blog/identity/2019/09/ccpa-vs-gdpr-the-compliance-war/\">GDPR and CCPA</a> face hefty fines and may end up tarnishing their brand reputation. </p>\n<p>Businesses must consider the fact that these regulations not only apply when the responsible parties are established or operated within the countries but are also applicable when the concerned organizations are operated and located outside the countries but attracting the EU or the US residents. </p>\n<h2 id=\"privacy-compliance-challenges-that-organizations-might-face-in-2021\" style=\"position:relative;\"><a href=\"#privacy-compliance-challenges-that-organizations-might-face-in-2021\" aria-label=\"privacy compliance challenges that organizations might face in 2021 permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Privacy Compliance Challenges that Organizations Might Face in 2021</h2>\n<ul>\n<li>**Increasing DSARs **</li>\n</ul>\n<p>While the world is fighting an uphill battle amidst the COVID-19 pandemic, there’s a significant surge in data subject access requests (DSARs). </p>\n<p>DSAR (Data Subject Access Requests) is a request by an employee or a consumer to an organization regarding the detailed information of processing of their data along with an explanation of the purpose. </p>\n<p>The below-mentioned stats depict the submission of Data Subject Access Requests in the UK in 2020. </p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 60.61538461538461%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAMCAYAAABiDJ37AAAACXBIWXMAAAsSAAALEgHS3X78AAABmklEQVQoz6WSQWsTQRiGv9mZ7O7stkm6jYaQTZsiIVZakIqFKkQraBC0B6s3aX+GF5EWTy3o2R5axB/gX9DiTfEk/QMFoTd7V3ic3UQqpGtRB15m+YZ5dt7v/UREOE3KyfdLaPGd1MmZ8ii6M1TxofJiznfGMSsJMreExJNnwU6AxhjCMMQ6+UHgaoqt21X231ZRRyny6iPy4gtya+1sYBRFNJtN0jSl3Z6mOlnnyZ0Ydi7wfLWCdDXSmEEePUV2vyK9x39nuZ7E/HizxPZqMtqG9S3Cl58olROiwCfIXFmbawSotc73e/dXgO8sLswP6sYFoUv5t3fxGpXXh/jdRcZ8TejcxXGcawSo1CDNfr9Ptno3lodAg3iDn8nCXWTvCJmaL7YcuBBarVauRqNBp9Ph2/Ex++/f5ePz+wV/9ibmoetlVBnW1CgwSzjrQZbyr6dvbjzjw+cD7PRl1Pg5bC0lnLmC7fYwthBWPIfZy4JaC92+ip1dZur6A6qXenjl+r8Pdg7WBhWMoW2ZiaTm5jT4D6A6zZL6I/An+fskX67R+owAAAAASUVORK5CYII='); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"privacy-compliance-2\"\n        title=\"privacy-compliance-2\"\n        src=\"/static/43132ced88d74577d16c7c1432790264/e5715/privacy-compliance-2.png\"\n        srcset=\"/static/43132ced88d74577d16c7c1432790264/a6d36/privacy-compliance-2.png 650w,\n/static/43132ced88d74577d16c7c1432790264/e5715/privacy-compliance-2.png 768w,\n/static/43132ced88d74577d16c7c1432790264/2bef9/privacy-compliance-2.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>Source: <a href=\"https://www.statista.com/statistics/1177143/submitters-of-data-subject-access-requests-uk/\">Statista</a></p>\n<p>The overwhelming DSAR requests by consumers demanding to know the type of data that is being collected by a company is perhaps the main reason why organizations must cover their back and have the required compliance policies in place.</p>\n<p>Organizations can consider <a href=\"https://www.loginradius.com/compliances/\">LoginRadius to handle multiple compliances</a> with all major data security and privacy laws.</p>\n<ul>\n<li><strong>Increasing Number of Data Breaches</strong></li>\n</ul>\n<p>The paradigm shift in the way people used to work conventionally and adoption of the work from home approach has further increased the risk.</p>\n<p>There’s a huge surge in the number of data breaches during the COVID-19 pandemic as cybercriminals are significantly targeting the new vulnerabilities in a company’s overall defense system.</p>\n<p><strong>Also read</strong>: <a href=\"https://www.loginradius.com/blog/identity/2020/05/cyber-threats-business-risk-covid-19/\">Protecting Organization from Cyber-Threats: Business at Risk during COVID-19</a></p>\n<p>Meanwhile, it can take up to months for a company to identify a security/data breach as cybercriminals are already focusing on a particular company’s new processes.</p>\n<p>So organizations must quickly respond to the current scenario and assess what destruction has been done so far and work on getting adequate safety and compliance.</p>\n<h2 id=\"why-is-privacy-compliance-important\" style=\"position:relative;\"><a href=\"#why-is-privacy-compliance-important\" aria-label=\"why is privacy compliance important permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Why is Privacy Compliance Important</h2>\n<p>One of the biggest reasons why organizations must comply with privacy regulations is to avoid heavy fines.</p>\n<p>The ones that don’t implement the privacy regulations could be fined up to millions of dollars and can also face penalties for years.</p>\n<p>Due to an increase in the number of regulations including the EU’s GDPR and the United States’ CCPA that protects unauthorized access to crucial data, privacy compliance is now crucial for every business.</p>\n<p>Since it not only protects consumers’ privacy but eventually improves brand value and offers a competitive advantage; businesses must partner with a reputed CIAM service provider to ensure they’re compliant with the government privacy regulations.</p>\n<p><strong>How organizations can benefit from complying with data privacy</strong></p>\n<ul>\n<li>Prevents data breaches</li>\n<li>Improves and maintains a brand value</li>\n<li>Strengthens business growth</li>\n<li>Builds customer trust and loyalty</li>\n</ul>\n<h2 id=\"how-loginradius-ciam-solution-helps-in-maintaining-data-privacy-and-compliance\" style=\"position:relative;\"><a href=\"#how-loginradius-ciam-solution-helps-in-maintaining-data-privacy-and-compliance\" aria-label=\"how loginradius ciam solution helps in maintaining data privacy and compliance permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How LoginRadius CIAM Solution Helps in Maintaining Data Privacy and Compliance</h2>\n<p>As a leading GDPR-compliance-ready CIAM platform, LoginRadius works seamlessly for any business model. </p>\n<p>LoginRadius simplifies data privacy compliance by bringing all the consumer data under a single roof, which enables complete profile management of an individual consumer in a single intuitive admin console.</p>\n<p>Our platform ensures you remain compliant with GDPR and stay ahead of your competitors when it comes to securing important consumer data.</p>\n<p>Need help in getting compliance-ready? <a href=\"https://www.loginradius.com/contact-sales/\">Reach us</a> for a Free Consultation.</p>\n<p><a href=\"https://www.loginradius.com/resource/privacy-policy-management-datasheet\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"privacy-policy-management-datasheet\"\n        title=\"privacy-policy-management-datasheet\"\n        src=\"/static/4a6a4d40995fdda4041041c29221207a/e5715/privacy-policy-management-datasheet.png\"\n        srcset=\"/static/4a6a4d40995fdda4041041c29221207a/a6d36/privacy-policy-management-datasheet.png 650w,\n/static/4a6a4d40995fdda4041041c29221207a/e5715/privacy-policy-management-datasheet.png 768w,\n/static/4a6a4d40995fdda4041041c29221207a/81501/privacy-policy-management-datasheet.png 2886w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>Protecting consumer data should be the #1 priority of businesses seeking substantial growth in the year 2021 and beyond.</p>\n<p>Any security breach leading to personal data theft of consumers could negatively impact the brand reputation of an organization leading to legal consequences.</p>\n<p>As discussed earlier, businesses must seek professional help to ensure compliance to stay ahead of the curve.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-loginradius\"\n        title=\"book-a-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"March 31, 2021","updated_date":null,"description":"Privacy compliance is the line between the legal and the illegal. Such regulations help protect consumers in different countries by ensuring data is handled appropriately. Another reason why organizations must comply is to avoid heavy fines.","title":"What is privacy compliance and why is it so important?","tags":["data privacy","compliance","cx"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.7699115044247788,"src":"/static/beac91fef24f0cc0070572eaed6869d5/14b42/privacy-compliance-cover.jpg","srcSet":"/static/beac91fef24f0cc0070572eaed6869d5/f836f/privacy-compliance-cover.jpg 200w,\n/static/beac91fef24f0cc0070572eaed6869d5/2244e/privacy-compliance-cover.jpg 400w,\n/static/beac91fef24f0cc0070572eaed6869d5/14b42/privacy-compliance-cover.jpg 800w,\n/static/beac91fef24f0cc0070572eaed6869d5/16310/privacy-compliance-cover.jpg 1024w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Vishal Sharma","github":null,"avatar":null}}}},{"node":{"excerpt":"In this age of social media marketing, are you among those who believe email marketing is dead? Far from being redundant, email marketing is…","fields":{"slug":"/growth/7-best-marketing-emails-to-attract-consumers-right-away/"},"html":"<p>In this age of social media marketing, are you among those who believe email marketing is dead? Far from being redundant, email marketing is thriving in today's world.</p>\n<p>Here are some latest statistics: 87% of B2B marketing teams still use email to boost their customer reach, while 79% of B2C marketing teams use email to share new blogs and articles. Overall, the <strong><a href=\"/blog/growth/sign-up-tips-conversion-rate/\">new user signups</a></strong> and ROI on email marketing to attract consumers is good at $44 revenue for every $1 spent in expenses.</p>\n<p>The right type of marketing emails with an interesting subject line and body can go a long way to engage with new client prospects and boost your sales numbers and <strong><a href=\"https://www.loginradius.com/customer-experience-solutions/\">enhance customer experience</a></strong>.</p>\n<p>Having said that, email fatigue is also a real problem – with thousands of promotional emails flooding our inboxes. How can you use email marketing to attract customers without sounding \"too salesy\" or making it a \"hard sell?\"</p>\n<p>  <a href=\"https://www.loginradius.com/resource/understanding-credential-stuffing-attacks-whitepaper\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"Credential-stuffing\"\n        title=\"Credential-stuffing\"\n        src=\"/static/091051c0e36ccf509c9dea986078f13a/e5715/Credential-stuffing.png\"\n        srcset=\"/static/091051c0e36ccf509c9dea986078f13a/a6d36/Credential-stuffing.png 650w,\n/static/091051c0e36ccf509c9dea986078f13a/e5715/Credential-stuffing.png 768w,\n/static/091051c0e36ccf509c9dea986078f13a/63ff0/Credential-stuffing.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<p>Here are the seven best types of promotional emails that should be part of your email marketing strategy:</p>\n<h2 id=\"7-awesome-emails-that-will-attract-more-consumers\" style=\"position:relative;\"><a href=\"#7-awesome-emails-that-will-attract-more-consumers\" aria-label=\"7 awesome emails that will attract more consumers permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>7 Awesome Emails That Will Attract More Consumers</h2>\n<h3 id=\"1-welcome-emails\" style=\"position:relative;\"><a href=\"#1-welcome-emails\" aria-label=\"1 welcome emails permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. Welcome emails</h3>\n<p>Also known as introductory emails, welcome emails simply introduce yourself and your business to potential customers.</p>\n<p>At this early stage, you are not sending an email for selling any product or informing clients of a new marketing campaign. Apart from introducing your business, talk more about how your product or service can help clients improve their business. Include an interesting subject line for the email and thank the client for taking an interest in your business (example, “Thanks for signing up!”).</p>\n<p>Here are some good tips for effective welcome emails:</p>\n<ul>\n<li>Personalize your welcome email by including a “quirky” or “interesting” fact about your brand or team.</li>\n<li>Avoid talking about your product/ service in your welcome email.</li>\n<li>Include an image of yourself or your brand to make it personal and develop an acquaintance with your client.</li>\n<li>In short, mention how your brand is helping clients or improving their lives.</li>\n</ul>\n<h3 id=\"2-limited-time-offers\" style=\"position:relative;\"><a href=\"#2-limited-time-offers\" aria-label=\"2 limited time offers permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. Limited Time Offers</h3>\n<p>Limited time offers are among the best tools of using email marketing to attract customers, particularly if you are in the eCommerce space. You can send a promotional email with a limited-time offer that could include free shipping, a gift, or a discount – all available only for a limited time. An example of this is the <a href=\"https://www.barkbox.com/subscribe/name\">special offer from BarkBox</a> that offers free extra toys for your dog with a multi-month subscription.</p>\n<p>Limited time offers effectively convert undecided (or \"on the fence\") types of prospects into customers. Here are some tips that you can use when sending out emails with limited time offers:</p>\n<ul>\n<li>Always include and highlight the offer validity (example, \"Valid for 3 days 10 hours and 5 minutes\" or \"Only 5 hours left\").</li>\n<li>Use words that signify urgency or immediate action, such as \"flash sale, \"shop now,\" or \"claim your gift today.\" Include similar words in the email subject line too.</li>\n</ul>\n<h3 id=\"3-exclusive-offers-for-subscribers\" style=\"position:relative;\"><a href=\"#3-exclusive-offers-for-subscribers\" aria-label=\"3 exclusive offers for subscribers permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3. Exclusive offers for subscribers</h3>\n<p>Subscriber emails are a different form of welcome emails that you can send out after a client has signed up for a newsletter or e-book, free trial, or filled up an online customer form. Like welcome email, subscriber emails are effective at converting new sign-up clients into brand loyalists. Retail brand, <a href=\"https://www.bananarepublic.eu/newslettersignup?mlink=pd_emailsignup\">Banana Republic</a>, is an apt example – with its 15% discount for new subscribers.</p>\n<p>If you have previously promised the client a special offer or discount, it is now the right time to fulfill your promise through the subscriber email. Even if you have not, offer your new subscriber an exclusive offer – like 15% off on their first purchase, or free shipping, or a promotional code.</p>\n<p>Alternatively, you can introduce your new subscribers to your social media pages (\"Like us on <strong><a href=\"https://www.loginradius.com/blog/engineering/login-with-facebook/\">Facebook</a></strong>\" or \"follow us on Pinterest\") that work to build customer engagement with your brand. Use the following client tips when sending our subscriber emails:</p>\n<ul>\n<li>Send this business email immediately after the client sign-up.</li>\n<li>Make the new subscriber \"feel special\" with words such as \"Just for You\" or \"You're on the list\" or \"Pleased to meet you.\"</li>\n<li>Always include a CTA button in your email – with labels such as \"Get started\" or \"Shop today\" or \"Read more.\"</li>\n</ul>\n<h3 id=\"4-product-launches\" style=\"position:relative;\"><a href=\"#4-product-launches\" aria-label=\"4 product launches permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>4. Product launches</h3>\n<p>Be it new products or services, a new book, or a new software tool, product launches offer exciting email ideas to gain new customers – or even repeat purchases. At this stage, you have done most of your sales-related groundwork with potential clients and are ready to go ahead with the \"hard sell.\"</p>\n<p>For a successful product launch email campaign, your customers must know your brand and product line – and have sufficient interest in engaging with your brand.</p>\n<p>How do you develop a successful product launch email strategy? Here are some effective tips:</p>\n<ul>\n<li>Do not include a long explanation about your product features – instead, add a product link like \"Learn more about…\" or \"Tell me more.\"</li>\n<li>Explain in short how the product or a feature can benefit the customer (example, \"keep yourself fit…\" or \"music that you have never experienced before\").</li>\n<li>Always include multiple CTAs in your email that encourage your clients to click and engage with your brand in many ways. Some CTAs include \"Buy Now\" or \"Show me how\" or \"Try it out.\"</li>\n</ul>\n<h3 id=\"5-new-arrivals\" style=\"position:relative;\"><a href=\"#5-new-arrivals\" aria-label=\"5 new arrivals permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>5. New arrivals</h3>\n<p>When you are running an online store as a small business, new product launches may not happen every week or month. You are more likely to have new product arrivals like the latest bedroom furniture or the new season's fashion wear. Online shoppers are always keen to see what \"new stuff\" you have added to your product catalog – so why not inform them about it by sending new arrivals emails to their inbox?</p>\n<p>Here are some tips for new arrivals email marketing:</p>\n<ul>\n<li>Use subject lines that mention \"new arrivals\" to generate the client's curiosity.</li>\n<li>Make it easy for customers to browse for new product arrivals by adding links or CTAs like \"Just In\" or \"Shop Now\"</li>\n<li>Send \"sneak peek\" emails of fresh arrivals (before the official release) to loyal customers that give them a \"good feeling\" about the brand. Here is one <a href=\"https://www.mailcharts.com/emails/855be3b4-2cdd-a215-8521-77a40e64be07\">use case</a> from New York-based Petite Studio.</li>\n</ul>\n<h3 id=\"6-seasonal-or-holiday-offers\" style=\"position:relative;\"><a href=\"#6-seasonal-or-holiday-offers\" aria-label=\"6 seasonal or holiday offers permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>6. Seasonal or holiday offers</h3>\n<p>Holiday seasons – the time when both consumers and retailers look forward to. Be it Halloween, Easter, or Christmas, there is always a special day around the corner (no matter which part of the world you are located in).</p>\n<p>Seasonal campaigns are a great marketing channel that can improve your conversion rate. Here are <a href=\"https://sleeknote.com/blog/holiday-email-examples\">14 best examples</a> of holiday emails that you can check out.</p>\n<p>Below are some effective tips for implementing your seasonal holiday email campaign:</p>\n<ul>\n<li>Run your promotional campaign at least a week before the holiday – and keep increasing your reach as the holiday date approaches near.</li>\n<li>Differentiate your holiday offer by using keywords like \"holiday,\" \"sale,\" \"discount,\" and \"gift.\"</li>\n<li>Along with free shipping, offer free gift wrapping – particularly for holidays when consumers buy gifts for their loved ones.</li>\n<li>Try to be creative and offer a to-do checklist for the holidays or gift ideas – that will stand your business apart from other competitors.</li>\n</ul>\n<h3 id=\"7-giveaways\" style=\"position:relative;\"><a href=\"#7-giveaways\" aria-label=\"7 giveaways permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>7. Giveaways</h3>\n<p>Free trips, contests, free stays, or cash prizes – Giveaway emails always promote products, drive customer engagement, or increase sales. Want to grow your subscriber email list? Giveaway emails can work wonders for that too.</p>\n<p>Giveaway emails should vary depending on your product category. Here are some tips that should keep you in good stead:</p>\n<ul>\n<li>Use an interesting subject line for your giveaway email or promotion. For example, \"Enter to win this…\" or \"Win an exciting trip...\" or mention the term \"giveaway\" in your subject.</li>\n<li>Do not send your giveaway email to a wider audience, else you could end up with plenty of unqualified leads in your subscriber list. Prepare a list of qualified leads that you want on your email list.</li>\n<li>For each CTA in your giveaway email, design a landing page where the user must complete a few steps before availing the giveaway item.</li>\n</ul>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>Even in this day and age of social media marketing, email marketing remains among the best marketing tools to attract and grow your customer base. This article outlines the seven most effective types of marketing emails that your sales prospects would love to see in their mailbox. Having said that, you need to design your email with the right tips to <a rel=\"nofollow\" href=\"https://blog.zumvu.com/improve-your-email-campaign-using-social-media/\">improve your email marketing campaign</a> and email conversions in a short time.</p>\n<p>For any marketing business, protecting their customer identities is also important to prevent any data breaches. LoginRadius provides the <strong><a href=\"https://www.loginradius.com/\">best identity management tools</a></strong> that can protect your customers during the login, registration process, and other customer touchpoints on your website.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-Consultation\"\n        title=\"book-a-demo-Consultation\"\n        src=\"/static/4e5414b04a66bd0747366ee1a5ecce4b/e5715/book-a-demo-Consultation.png\"\n        srcset=\"/static/4e5414b04a66bd0747366ee1a5ecce4b/a6d36/book-a-demo-Consultation.png 650w,\n/static/4e5414b04a66bd0747366ee1a5ecce4b/e5715/book-a-demo-Consultation.png 768w,\n/static/4e5414b04a66bd0747366ee1a5ecce4b/63ff0/book-a-demo-Consultation.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"March 30, 2021","updated_date":null,"description":"Even in this day and age of social media marketing, email marketing remains among the best marketing tools to attract and grow your customer base. This article outlines the seven most effective types of marketing emails that your sales prospects would love to see in their mailbox.","title":"7 Best Marketing Emails to Attract Consumers Right Away","tags":null,"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5037593984962405,"src":"/static/8cec9b56b838ea225223ab45281a3783/14b42/email-business-Loginradius.jpg","srcSet":"/static/8cec9b56b838ea225223ab45281a3783/f836f/email-business-Loginradius.jpg 200w,\n/static/8cec9b56b838ea225223ab45281a3783/2244e/email-business-Loginradius.jpg 400w,\n/static/8cec9b56b838ea225223ab45281a3783/14b42/email-business-Loginradius.jpg 800w,\n/static/8cec9b56b838ea225223ab45281a3783/16310/email-business-Loginradius.jpg 1024w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Deependra Singh","github":null,"avatar":null}}}}]},"markdownRemark":{"excerpt":"Identity is evolving, and developers are at the forefront of this transformation. Every day brings a new learning—adapting to new standards…","fields":{"slug":"/identity/developer-first-identity-provider-loginradius/"},"html":"<p>Identity is evolving, and developers are at the forefront of this transformation. Every day brings a new learning—adapting to new standards and refining approaches to building secure, seamless experiences.</p>\n<p>We’re here to support developers on that journey. We know how important simplicity, efficiency, and well-structured documentation are when working with identity and access management solutions. That’s why we’ve redesigned the <a href=\"https://www.loginradius.com/\">LoginRadius website</a>—to be faster, more intuitive, and developer-first in every way.</p>\n<p>The goal? Having them spend less time searching and more time building.</p>\n<h2 id=\"whats-new-and-improved-on-the-loginradius-website\" style=\"position:relative;\"><a href=\"#whats-new-and-improved-on-the-loginradius-website\" aria-label=\"whats new and improved on the loginradius website permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What’s New and Improved on the LoginRadius Website?</h2>\n<p>LoginRadius’ vision is to give developers a product that simplifies identity management so they can focus on building, deploying, and scaling their applications. To enhance this experience, we’ve spent the last few months redesigning our interface— making navigation more intuitive and reassuring that essential resources are easily accessible.</p>\n<p>Here’s a closer look at what’s new and why it’s important:</p>\n<h3 id=\"a-developer-friendly-dark-theme\" style=\"position:relative;\"><a href=\"#a-developer-friendly-dark-theme\" aria-label=\"a developer friendly dark theme permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>A Developer-Friendly Dark Theme</h3>\n<p><img src=\"/f46881583c7518a93bb24e94c32320de/a-developer-friendly-dark-theme.webp\" alt=\"This image shows how LoginRadius offers several authentication methods like traditional login, social login, passwordless login, passkeys and more in a dark mode.\">    </p>\n<p>Developers spend long hours working in dark-themed IDEs and terminals, so we’ve designed the LoginRadius experience to be developer-friendly and align with that preference.</p>\n<p>The new dark mode reduces eye strain, enhances readability, and provides a seamless transition between a coding environment and our platform. Our new design features a clean, modern aesthetic with a consistent color scheme and Barlow typography, ensuring better readability. High-quality graphics and icons are thoughtfully placed to enhance the content without adding visual clutter.</p>\n<p>So, whether you’re navigating our API docs or configuring authentication into your system, our improved interface will make those extended development hours more comfortable and efficient.</p>\n<h3 id=\"clear-categorization-for-loginradius-capabilities\" style=\"position:relative;\"><a href=\"#clear-categorization-for-loginradius-capabilities\" aria-label=\"clear categorization for loginradius capabilities permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Clear Categorization for LoginRadius Capabilities</h3>\n<p><img src=\"/e5358b82be414940f3fb146013845933/capabilities.webp\" alt=\"This image shows a breakdown of all the LoginRadius CIAM capabilities, including authentication, security, UX, scalability and multi-brand management.\"></p>\n<p>We’ve restructured our website to provide a straightforward breakdown of our customer identity and access management platform capabilities, helping you quickly find what you need:</p>\n<ul>\n<li>Authentication: Easily understand <a href=\"https://www.loginradius.com/blog/identity/authentication-option-for-your-product/\">how to choose the right login method</a>, from traditional passwords and OTPs to social login, federated SSO, and passkeys with few lines of code.</li>\n<li>Security: Implement no-code security features like bot detection, IP throttling, breached password alerts, DDoS protection, and adaptive MFA to safeguard user accounts.</li>\n<li>User Experience: Leverage AI builder, hosted pages, and drag-and-drop workflows to create smooth, branded sign-up and login experiences.</li>\n<li>High Performance &#x26; Scalability: Confidently scale with sub-100ms API response times, 100% uptime, 240K+ RPS, and 28+ global data center regions.</li>\n<li>Multi-Brand Management: Efficiently manage multiple identity apps, choosing isolated or shared data stores based on your brand’s unique needs.</li>\n</ul>\n<p>This structured layout ensures you can quickly understand each capability and how it integrates into your identity ecosystem.</p>\n<h3 id=\"developer-first-navigation\" style=\"position:relative;\"><a href=\"#developer-first-navigation\" aria-label=\"developer first navigation permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Developer-First Navigation</h3>\n<p><img src=\"/a8c155c2b6faf3d5f4b4de4e2b14d763/developers-menu.webp\" alt=\"This image shows the LoginRadius menu bar, highlighting the developer dropdown.\">   </p>\n<p>We’ve been analyzing developer workflows to identify how you access key resources. That’s why we redesigned our navigation with one goal in mind: to reduce clicks and make essential resources readily available.</p>\n<p>The new LoginRadius structure puts APIs, SDKs, and integration guides right at the menu bar under the Developers dropdown so you can get started faster. Our Products, Solutions, and Customer Services are also clearly categorized, helping development teams quickly find the right tools and make informed decisions.</p>\n<h3 id=\"quick-understanding-of-integration-benefits\" style=\"position:relative;\"><a href=\"#quick-understanding-of-integration-benefits\" aria-label=\"quick understanding of integration benefits permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Quick Understanding of Integration Benefits</h3>\n<p><img src=\"/b2f9a964a2da0ea83e2f8596b833bba7/we-support-your-tech-stack.webp\" alt=\"This image shows a list of popular programming languages and frameworks offered by LoginRadius.\"></p>\n<p>Developers now have a clear view of the tech stack available with LoginRadius, designed to support diverse business needs.</p>\n<p>Our platform offers pre-built SDKs for Node.js, Python, Java, and more, making CIAM integration seamless across popular programming languages and frameworks.</p>\n<h2 id=\"over-to-you-now\" style=\"position:relative;\"><a href=\"#over-to-you-now\" aria-label=\"over to you now permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Over to You Now!</h2>\n<p>Check out our <a href=\"https://www.loginradius.com/\">revamped LoginRadius website</a> and see how the improved experience makes it easier to build, scale, and secure your applications.</p>\n<p>Do not forget to explore the improved navigation and API documentation, and get started with our free trial today. We’re excited to see what you’ll build with LoginRadius!</p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"February 21, 2025","updated_date":null,"description":"LoginRadius’ vision is to give developers a product that simplifies identity management so they can focus on building, deploying, and scaling their applications. To enhance this experience, we’ve redesigned our website interface, making navigation more intuitive and reassuring that essential resources are easily accessible.","title":"Revamped & Ready: Introducing the New Developer-First LoginRadius Website","tags":["Developer tools","API","Identity Management","User Authentication"],"pinned":true,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.7857142857142858,"src":"/static/80b4e4fbe176a10a327d273504607f32/58556/hero-section.webp","srcSet":"/static/80b4e4fbe176a10a327d273504607f32/61e93/hero-section.webp 200w,\n/static/80b4e4fbe176a10a327d273504607f32/1f5c5/hero-section.webp 400w,\n/static/80b4e4fbe176a10a327d273504607f32/58556/hero-section.webp 800w,\n/static/80b4e4fbe176a10a327d273504607f32/99238/hero-section.webp 1200w,\n/static/80b4e4fbe176a10a327d273504607f32/7c22d/hero-section.webp 1600w,\n/static/80b4e4fbe176a10a327d273504607f32/1258b/hero-section.webp 2732w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},"pageContext":{"limit":6,"skip":528,"currentPage":89,"type":"///","numPages":161,"pinned":"ee8a4479-3471-53b1-bf62-d0d8dc3faaeb"}},"staticQueryHashes":["1171199041","1384082988","2100481360","23180105","528864852"]}