{"componentChunkName":"component---src-templates-blog-list-template-js","path":"/91","result":{"data":{"allMarkdownRemark":{"edges":[{"node":{"excerpt":"What is Standard Login Standard Login is a fundamental component of the Login method, which allows you to provide your consumers with a…","fields":{"slug":"/identity/what-is-standard-login/"},"html":"<h1 id=\"what-is-standard-login\" style=\"position:relative;\"><a href=\"#what-is-standard-login\" aria-label=\"what is standard login permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is Standard Login</h1>\n<p>Standard Login is a fundamental component of the Login method, which allows you to provide your consumers with a seamless authentication flow by leveraging a unique ID (Email or Username) and password. It consists of features like Registration, Login, Customer Profile, and Password Management.</p>\n<p>It is the simplest and quite basic authentication system available in the traditional local authentication method.</p>\n<p>In Standard Login, you need to provide email/username and password information for each authenticatable user collected locally on the server system. The user then sends their usernames and passwords in plain text format to the server system, which compares their information with its local database. If the provided credentials match, the user is successfully authenticated.</p>\n<p>This is the model used for login authentication on traditional multi-user systems, and it has been replicated numerous times within various applications.</p>\n<h2 id=\"why-should-you-use-standard-login\" style=\"position:relative;\"><a href=\"#why-should-you-use-standard-login\" aria-label=\"why should you use standard login permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Why Should You Use Standard Login</h2>\n<p>Standard Login is an essential aspect of website authentication. It focuses on the user and computer interactions. As a result, user authentication is critical to understand when creating or improving a website's login procedure.</p>\n<p>Whether you want to increase your internal security, improve consumer acquisition or provide a better user experience for individuals exploring your site, it's essential to know how user authentication fits into the equation.</p>\n<p>That's why we've created this guide. This way, organizations can understand:</p>\n<p>With a better security perspective, your organization can look into more robust registration and login processes that move beyond the traditional offerings.</p>\n<p>Additionally, when you get a full scenario of the different <a href=\"https://www.loginradius.com/authentication/\">user authentication</a> types, you will see that passwords are not the only option for your website and learn more about top passwordless alternatives.</p>\n<p>Most users are familiar with passwords as it has been used for user authentication since the beginning of the internet. You probably have several passwords for yourself!</p>\n<p>A password dependent user authentication process generally look like as given below:</p>\n<ul>\n<li>You will be asked to input your username and password.</li>\n<li>After that, your credentials will be sent to the website's server, and they will be compared with the information they have on records.</li>\n<li>Once a password match is found, you will be able to access your account.</li>\n</ul>\n<p>Passwords are mainly used to secure personal accounts for social media profiles (Facebook, Google, etc), eCommerce sites, online banking, and other online resources.</p>\n<p>However, passwords are not considered a very secure option as many users think they can be predicted or hacked, and damage can be done if a hacker gains access to one of these accounts!</p>\n<h2 id=\"how-is-standard-login-useful-for-business\" style=\"position:relative;\"><a href=\"#how-is-standard-login-useful-for-business\" aria-label=\"how is standard login useful for business permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How is Standard Login Useful For Business</h2>\n<p>When a user authenticates a security process, it requires the user to register and log in. In other words, authentication asks users, \"Confirm your identity?\" and verifies their response.</p>\n<p>The user authentication process essentially allows users to repeat access to their accounts while blocking unauthenticated user access. This means that User X can log in to their account, while User Y would be denied access. Conversely, User Y could access their account, while User X would be unable to.</p>\n<p>If the user needs access, they must provide valid credentials and prove to the website that they are an authorized user. The User ID and Password key are enough to confirm the User's identity, which will allow the system to authorize the User.</p>\n<p>When a match is detected, the system will authenticate users and give them access to their accounts. If a match isn't found, users will be prompted to try their credentials again.</p>\n<p>Upon several failed attempts, the account may be flagged for suspicious activity or require additional authentication methods such as a reset password or a one-time password.</p>\n<p>User authentication is crucial because it keeps unauthorized users from gaining access to sensitive information. X strengthened authentication process guarantees that User X only has access to the information they need and can't see User Y's sensitive data.</p>\n<p>It's always important to note that authorization, on the other hand, is what dictates what users can access and do after they log in.</p>\n<p>While <a href=\"https://www.loginradius.com/blog/identity/2020/06/authentication-vs-authorization-infographic/\">authentication and authorization</a> are often used interchangeably, these two different terms work together to create a secure login process.</p>\n<p>User authentication has the following tasks:</p>\n<ol>\n<li>Manage the connection between the User and the server.</li>\n<li>Verify the User's identifications.</li>\n<li>Verify the authentication so the system can move to authorize the User.</li>\n</ol>\n<p>The process is simple; users input credentials on the login form. That information is carried to an authentication server, where the data is compared with user credentials on the available record.</p>\n<h2 id=\"tips-to-improve-standard-login\" style=\"position:relative;\"><a href=\"#tips-to-improve-standard-login\" aria-label=\"tips to improve standard login permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Tips to Improve Standard Login</h2>\n<p>If you want your login process to be more robust, user-friendly, or a combination of both, these best practices can help.</p>\n<p>Encourage users to build stronger passwords to improve security. Businesses should encourage users to create more effective passwords and enforce these guidelines internally so that employees manage secure accounts.</p>\n<ul>\n<li>More distant passwords are more secure. Security experts recommend that you create passwords with a least of 8 characters, but we suggest that you keep the length to 12 characters.</li>\n<li>Passwords should have a combination of characters. Passwords with a random combination of numbers, uppercase, and lowercase letters, and symbols are harder to crack.</li>\n<li>Avoid using formulas when producing passwords. Patterns and formulas make it convenient for <a href=\"https://www.loginradius.com/blog/engineering/password-security-best-practices-compliance/\">hackers to guess your password</a> and can allow users a false sense of security.</li>\n</ul>\n<p>Always use these do's and don'ts as a way to strengthen your user authentication practices.</p>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>A consumer's standard login accounts help them manage their data securely and put them in the driver's seat. They can easily deal with their data by using the credentials.</p>\n<p>When organizations let consumers see and regulate their data, it builds trust with consumers, which fosters transparency about what data is collected by an organization.</p>\n<p>Also, login is incredibly important for enterprises. Consumers want to have everything within their system securely, which means facilitating a sign-up that works with the enterprise's login necessities.</p>\n<p>Cheers!</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-loginradius\"\n        title=\"book-a-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"March 26, 2021","updated_date":null,"description":"Standard Login is an essential aspect of website authentication. With a better security perspective, your organization can look into more robust registration and login processes that move beyond the traditional offerings. That's why we've created this guide.","title":"What is Standard Login","tags":["login","user authentication","cx"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5037593984962405,"src":"/static/135d94eccab695db25383d95deffd440/f9f16/standard_login_cover_pic.jpg","srcSet":"/static/135d94eccab695db25383d95deffd440/f836f/standard_login_cover_pic.jpg 200w,\n/static/135d94eccab695db25383d95deffd440/2244e/standard_login_cover_pic.jpg 400w,\n/static/135d94eccab695db25383d95deffd440/f9f16/standard_login_cover_pic.jpg 761w","sizes":"(max-width: 761px) 100vw, 761px"}}},"author":{"id":"Keshav Kumar","github":null,"avatar":null}}}},{"node":{"excerpt":"Companies usually plan their years to meet their business goals and execute profit-driven strategies ably. Therefore, it was no big surprise…","fields":{"slug":"/growth/how-to-make-businesses-marketing-plans-after-coronavirus/"},"html":"<p>Companies usually plan their years to meet their business goals and execute profit-driven strategies ably. Therefore, it was no big surprise that at the end of the year 2019, businesses were looking forward to the transition to yet another year full of opportunity. But none of us could have factored a global pandemic into our calculations.</p>\n<p>Traditional business models and tried and tested methods of engaging with consumers and communities were no longer feasible. Now, there are even concerns that the world will never go back to the way it was before the pandemic.</p>\n<p>Business-to-business organizations need to acclimate to this new normal and adopt new <a href=\"https://www.loginradius.com/b2b-identity/\">B2B marketing strategies post COVID</a> to remain relevant and achieve success.</p>\n<h2 id=\"the-state-of-marketing-before-covid-19\" style=\"position:relative;\"><a href=\"#the-state-of-marketing-before-covid-19\" aria-label=\"the state of marketing before covid 19 permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>The State of Marketing Before COVID-19</h2>\n<p>Business models previously relied on direct delivery of services and products to consumers through physical events such as exhibitions, product seminars, ads, face-to-face interactions, and interviews.</p>\n<p>If there was an online component, it was more an added advantage offered by companies than a necessary addition. Spending patterns across the world trended downward in the wake of the pandemic, while strategy, tactics, and messaging needed an urgent overhaul to suit a drastically altered landscape.</p>\n<p>B2B marketing post-COVID focuses more on the digitization of businesses where consumers are now reached via web articles, digital ads, emails, videos, and virtual <a href=\"https://www.visme.co/templates/presentations/\">presentations</a>. There is much emphasis on fostering better connections with consumers and communities, delivering relevant, helpful, and human content with added empathy to build long-term relationships.</p>\n<p>Creative content strategy has now emerged as one of the most reliable B2B marketing strategies. It can help attract and engage audiences in innovative ways to educate them about the changing industry and entertain them at the same time.</p>\n<p>Let's now explore some of the strategies employed by companies to survive in a post-pandemic world.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 698px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 56.15384615384615%; position: relative; bottom: 0; left: 0; background-image: url('data:image/jpeg;base64,/9j/2wBDABALDA4MChAODQ4SERATGCgaGBYWGDEjJR0oOjM9PDkzODdASFxOQERXRTc4UG1RV19iZ2hnPk1xeXBkeFxlZ2P/2wBDARESEhgVGC8aGi9jQjhCY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2P/wgARCAALABQDASIAAhEBAxEB/8QAFgABAQEAAAAAAAAAAAAAAAAABAAD/8QAFgEBAQEAAAAAAAAAAAAAAAAAAgAB/9oADAMBAAIQAxAAAAECyuQBaW3/xAAaEAACAgMAAAAAAAAAAAAAAAABAgADEBEh/9oACAEBAAEFAoqArizg1P/EABQRAQAAAAAAAAAAAAAAAAAAABD/2gAIAQMBAT8BP//EABQRAQAAAAAAAAAAAAAAAAAAABD/2gAIAQIBAT8BP//EABcQAQEBAQAAAAAAAAAAAAAAAAEQABH/2gAIAQEABj8C3RoE/8QAHBAAAgICAwAAAAAAAAAAAAAAAAERIRAxQWFx/9oACAEBAAE/IRUsRc2sLZxYuvBof//aAAwDAQACAAMAAAAQDM//xAAVEQEBAAAAAAAAAAAAAAAAAAABEP/aAAgBAwEBPxAn/8QAFREBAQAAAAAAAAAAAAAAAAAAARD/2gAIAQIBAT8QZ//EABkQAQEBAQEBAAAAAAAAAAAAAAERAFEQcf/aAAgBAQABPxDGGClCHafPCMPMQ4TFBKxrLN//2Q=='); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"covid-loginradius\"\n        title=\"covid-loginradius\"\n        src=\"/static/d89c5deb297e86d9b8d5491f448269fe/765c5/covid-loginradius.jpg\"\n        srcset=\"/static/d89c5deb297e86d9b8d5491f448269fe/6aca1/covid-loginradius.jpg 650w,\n/static/d89c5deb297e86d9b8d5491f448269fe/765c5/covid-loginradius.jpg 698w\"\n        sizes=\"(max-width: 698px) 100vw, 698px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<h2 id=\"9-successful-b2b-marketing-strategies-post-covid\" style=\"position:relative;\"><a href=\"#9-successful-b2b-marketing-strategies-post-covid\" aria-label=\"9 successful b2b marketing strategies post covid permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>9 Successful B2B Marketing Strategies Post COVID</h2>\n<h3 id=\"1-focus-more-on-existing-consumers\" style=\"position:relative;\"><a href=\"#1-focus-more-on-existing-consumers\" aria-label=\"1 focus more on existing consumers permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. Focus more on existing consumers.</h3>\n<p>It says a lot about the consumer's loyalty that has stayed with you despite the pandemic. The focus on serving existing consumers has emerged as one of the most popular B2B <a href=\"https://www.loginradius.com/blog/identity/2020/03/loginradius-business-continuity-covid-19-outbreak/\">marketing trends after COVID</a>. Create services and ad campaigns targeting their needs which are sure to have changed with the changing times.</p>\n<p>Offering new, relevant services and providing them with the required resources will ensure their loyalty further. What's more, companies can also track consumer journeys and come up with people-oriented stories to showcase their work and promote the company brand.</p>\n<h3 id=\"2-digitize-your-offerings\" style=\"position:relative;\"><a href=\"#2-digitize-your-offerings\" aria-label=\"2 digitize your offerings permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. Digitize your offerings.</h3>\n<p>With the travel restrictions, lockdown, and social distancing protocols, it doesn’t surprise that everyone has now moved online. Companies are not only enhancing their websites; they are also executing digital ad campaigns and setting up a dedicated social media channel to focus more on e-commerce channels and trends.</p>\n<p>Digital marketing strategies are replacing traditional B2B marketing strategies as companies race to improve their online presence.</p>\n<p>Invest in good CRM (consumer relationship management) software to efficiently manage your consumers. Host informative webinars for consumers and your employees to increase their digital capability and attract new consumers. The more processes companies can bring online, the more they can engage their audiences to stay relevant and achieve business goals.</p>\n<h3 id=\"3-lead-consumers-with-empathy\" style=\"position:relative;\"><a href=\"#3-lead-consumers-with-empathy\" aria-label=\"3 lead consumers with empathy permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3. Lead consumers with empathy.</h3>\n<p>The pandemic has affected us all equally. Many of us have lost friends and family to the virus, have had our jobs impacted by it, and feel the sense of displacement it has created. If there ever was a time to lead with empathy, this is it.</p>\n<p>B2B marketing post COVID must be consumer-centric, adding an emotional touch to creative assets to connect better with consumers.</p>\n<p>Companies should offer free resources whenever possible and employ user experience to improve brand loyalty and awareness. Inject conversations with empathy as the impact of this pandemic is far from over.</p>\n<h3 id=\"4-think-human-to-human-not-b2b\" style=\"position:relative;\"><a href=\"#4-think-human-to-human-not-b2b\" aria-label=\"4 think human to human not b2b permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>4. Think human-to-human, not B2B.</h3>\n<p>Companies must realize that businesses will most definitely transform and that consumers’ needs will have likely changed accordingly.</p>\n<p>Engage key clients from both new and existing consumers in empathetic conversation to understand how they have changed, how their financial demands and dynamics have changed, and how their business strategies have evolved.</p>\n<p>Come up with relevant, engaging content and employ creative storytelling with a human touch to reel consumers in.</p>\n<h3 id=\"5-deploy-omnichannel-strategies\" style=\"position:relative;\"><a href=\"#5-deploy-omnichannel-strategies\" aria-label=\"5 deploy omnichannel strategies permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>5. Deploy omnichannel strategies.</h3>\n<p>Digital marketing has gone from being a USP to becoming a necessity overnight. Omnichannel strategies in a post-pandemic setting will provide greater access, increasing both outreach and productivity.</p>\n<p>From search engine optimization to email marketing, digital ad campaigns, and creative content implementation, omnichannel allows companies to serve consumers where and when they need them and enable companies to customize their solutions.</p>\n<p>Companies are better served by taking advantage of the digital spectrum and remain omnipresent across various digital marketing platforms.</p>\n<p><a href=\"https://www.loginradius.com/resource/how-retail-and-consumer-goods-companies-use-loginradius-identity-solution/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"How-Retail-Consumer-Goods-Companies-Use-the-LoginRadius\"\n        title=\"How-Retail-Consumer-Goods-Companies-Use-the-LoginRadius\"\n        src=\"/static/50a566e7c30d10ea977c0b62e3ace640/e5715/How-Retail-Consumer-Goods-Companies-Use-the-LoginRadius.png\"\n        srcset=\"/static/50a566e7c30d10ea977c0b62e3ace640/a6d36/How-Retail-Consumer-Goods-Companies-Use-the-LoginRadius.png 650w,\n/static/50a566e7c30d10ea977c0b62e3ace640/e5715/How-Retail-Consumer-Goods-Companies-Use-the-LoginRadius.png 768w,\n/static/50a566e7c30d10ea977c0b62e3ace640/2bef9/How-Retail-Consumer-Goods-Companies-Use-the-LoginRadius.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<h3 id=\"6-employ-data-driven-storytelling\" style=\"position:relative;\"><a href=\"#6-employ-data-driven-storytelling\" aria-label=\"6 employ data driven storytelling permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>6. Employ data-driven storytelling.</h3>\n<p>Though everything looks rather radical on the surface, the pandemic has only accelerated trends that were already reshaping the influencer and B2B media landscape. Businesses must hear out and understand their audiences better to develop innovative storytelling driven by facts and figures to make it more compelling.</p>\n<p>Data analytics provides companies with a wide variety of consumer data that can be used to craft meaningful content that will find resonance with people. A dedicated social media channel can provide companies with the platform they need to tell their stories and, at the same time, drive up consumer engagement and sales.</p>\n<h3 id=\"7-increase-employee-digital-capability\" style=\"position:relative;\"><a href=\"#7-increase-employee-digital-capability\" aria-label=\"7 increase employee digital capability permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>7. Increase employee digital capability.</h3>\n<p>Offsite strategy sessions in picturesque locations are now out the window. Acclimatize your teams to <a href=\"https://www.loginradius.com/blog/fuel/2021/02/tips-managing-remote-team/\">managing remote work</a> (WFH) options to not lose out on productivity. This includes devoting resources towards upskilling and digital capability development, as required, to ensure high-performing remote work options.</p>\n<p>Businesses will save on overhead and maintenance costs and help maximize their employees' safety by cutting down on all non-essential travel.</p>\n<h3 id=\"8-address-consumer-needs\" style=\"position:relative;\"><a href=\"#8-address-consumer-needs\" aria-label=\"8 address consumer needs permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>8. Address consumer needs.</h3>\n<p>B2B marketing post-COVID is consumer-centric with a focus on a positive user experience. Companies must make all their actions all about the needs of their consumers.</p>\n<p>The concentration is now on how businesses help solve their problems, meet their needs, and adapt to changes. Companies must draw deeply from consumer experience and make them the story's heroes to strike a chord with audiences.</p>\n<h3 id=\"9-turn-salespersons-into-advocates\" style=\"position:relative;\"><a href=\"#9-turn-salespersons-into-advocates\" aria-label=\"9 turn salespersons into advocates permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>9. Turn salespersons into advocates.</h3>\n<p>One of the most popular marketing strategies post-COVID is employing staff members to amplify content offerings and act as marketing advocates. <a href=\"https://www.loginradius.com/b2b-identity/\">Business identity</a> also exists through the profiles of executives, sales teams, and thought leaders, the people who face your organization.</p>\n<p>High-value B2B rarely deals closely with a conversation, and companies need their marketing and sales executives to advocate for them for a more significant impact.</p>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>While there is no way to tell which B2B marketing trends post COVID continue to remain in favor, consumer-centric offerings will always find relevance in a post-pandemic world. Incorporate any of the above suggestions in your B2B marketing strategies to reap the combined benefits of maximum consumer loyalty, satisfaction, and sustained profitability.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"Makeover-book-a-demo\"\n        title=\"Makeover-book-a-demo\"\n        src=\"/static/c9ab924f722ed5737714b5205e5bb0a1/e5715/Makeover-book-a-demo.png\"\n        srcset=\"/static/c9ab924f722ed5737714b5205e5bb0a1/a6d36/Makeover-book-a-demo.png 650w,\n/static/c9ab924f722ed5737714b5205e5bb0a1/e5715/Makeover-book-a-demo.png 768w,\n/static/c9ab924f722ed5737714b5205e5bb0a1/63ff0/Makeover-book-a-demo.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"March 25, 2021","updated_date":null,"description":"B2B marketing post-COVID focuses more on the digitization of businesses where consumers are now reached via web articles, digital ads, emails, videos, and virtual presentations. There is much emphasis on fostering better connections, and delivering relevant content to build long-term relationships.","title":"Thinking Beyond the Pandemic: How to Make Marketing Plans After Coronavirus","tags":null,"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5037593984962405,"src":"/static/c8bf94dd5418d28f3d6f6f02905e07d8/14b42/business-after-covid-loginradius.jpg","srcSet":"/static/c8bf94dd5418d28f3d6f6f02905e07d8/f836f/business-after-covid-loginradius.jpg 200w,\n/static/c8bf94dd5418d28f3d6f6f02905e07d8/2244e/business-after-covid-loginradius.jpg 400w,\n/static/c8bf94dd5418d28f3d6f6f02905e07d8/14b42/business-after-covid-loginradius.jpg 800w,\n/static/c8bf94dd5418d28f3d6f6f02905e07d8/cc3a0/business-after-covid-loginradius.jpg 1013w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},{"node":{"excerpt":"The Authorization Code Flow for OAuth 2.0 is targeted at web applications that have a server-side component, which allows the client secret…","fields":{"slug":"/engineering/authorization-code-flow-oauth/"},"html":"<p>The Authorization Code Flow for OAuth 2.0 is targeted at web applications that have a server-side component, which allows the client secret for the authorization server to be kept secret (confidential client). Typically, authorization servers will require a secret to be used when making authentication requests if more sensitive data is wanted, such as personal data or refresh tokens. Without it, you would be restricted to following the Implicit flow for <a href=\"https://www.loginradius.com/docs/single-sign-on/tutorial/federated-sso/oauth-2-0/oauth-2-0-overview/\">OAuth 2.0</a>, which only returns an access token from the authorization server.</p>\n<p>In the Authorization Code flow, the server-side component of the web application can freely manage the user's session upon authenticating with the authorization server without revealing anything about the authorization server's response (such as personal data or refresh token) to the end-user.</p>\n<h3 id=\"overview\" style=\"position:relative;\"><a href=\"#overview\" aria-label=\"overview permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Overview</h3>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 59.692307692307686%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"Authorization Code Flow Diagram\"\n        title=\"Authorization Code Flow Diagram\"\n        src=\"/static/709b8a5d49870d1186fa474732e74119/e5715/acf.png\"\n        srcset=\"/static/709b8a5d49870d1186fa474732e74119/a6d36/acf.png 650w,\n/static/709b8a5d49870d1186fa474732e74119/e5715/acf.png 768w,\n/static/709b8a5d49870d1186fa474732e74119/e1031/acf.png 803w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>The flow illustrated above aims to provide a rough overview of a typical Authorization Code workflow:</p>\n<ol>\n<li>The Client-Server attempts to access a resource that requires authorization that it does not have. It redirects the user to the authorization server for authentication.</li>\n<li>The Authorization Server authenticates the user by asking for their login credentials. The server determines if the user should be granted or denied their request.</li>\n<li>If the User is determined to be authentic, an Authorization Code is issued and returned to the User Client. This code is used to retrieve an access token from the Authorization Server.</li>\n<li>The retrieved Authorization Code is sent to the Client-Server. </li>\n<li>The Client-Server makes a POST request to the Authorization Server, containing its client key, secret, and Authorization Code.</li>\n<li>The Authorization Server verifies the key, secret and code, and issues an ID Token and access token. The ID Token is a JWT that is typically used to store user data from the Authorization Server.</li>\n<li>The Client-Server receives and processes the ID token and access token. The access token is then kept in the Client-Server, which can request resources on behalf of the User Client without exposing the token itself.</li>\n</ol>\n<p>So you might ask yourself what the whole point of the Authorization Code is. At first glance, it would seem that the code is issued, only to be returned to exchange for an access token. The code is what allows us to keep the token hidden away from the User Client, which could be potentially exposed to malicious agents seeking to steal the token for nefarious means. </p>\n<p>In cases where you'd like the Authorization Server to return the access token immediately, you would use the Implicit flow for OAuth 2.0. Most authorization servers will limit the amount of data that can be returned using this flow; the OAuth 2.0 spec recommends limited scopes and short lifespans for tokens returned using this flow.</p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"March 24, 2021","updated_date":null,"description":"This article will help you to understand the OAuth 2.0 authorization code flow.","title":"Guide to Authorization Code Flow for OAuth 2.0","tags":["Oauth","Authorization Code Flow"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.492537313432836,"src":"/static/70f6529baa97e7fead70e053fa796bcd/14b42/unsplash.jpg","srcSet":"/static/70f6529baa97e7fead70e053fa796bcd/f836f/unsplash.jpg 200w,\n/static/70f6529baa97e7fead70e053fa796bcd/2244e/unsplash.jpg 400w,\n/static/70f6529baa97e7fead70e053fa796bcd/14b42/unsplash.jpg 800w,\n/static/70f6529baa97e7fead70e053fa796bcd/47498/unsplash.jpg 1200w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Nick Chim","github":"nickc95","avatar":null}}}},{"node":{"excerpt":"Internal communication is a gratifying profession. By bridging the gap between employees and the management, internal communication…","fields":{"slug":"/growth/8-effective-communication-strategies-for-internal-alignment-and-growth-in-2021/"},"html":"<p>Internal communication is a gratifying profession. By bridging the gap between employees and the management, internal communication facilitates information flow to every last employee in an organization.</p>\n<p>In this article, we'll take a closer look at what internal communication means for organizations, why businesses need to have an internal comms plan, and look at some of the best strategies for <strong><a href=\"https://www.loginradius.com/b2b-identity/\">B2B</a></strong> tech companies.</p>\n<h2 id=\"what-is-internal-communication\" style=\"position:relative;\"><a href=\"#what-is-internal-communication\" aria-label=\"what is internal communication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is Internal Communication</h2>\n<p>Internal communication can be defined as the key to delivering excellent <strong><a href=\"https://www.loginradius.com/customer-experience-solutions/\">customer  experiences solutions</a></strong>. Besides the broader day-to-day function of facilitating employee interaction, internal communication strategies also involve employing a standard, agreed-upon style and mode of language about a company and its products communicated to the outside world.</p>\n<p>An effective internal communications plan acts as a guide to keep team members informed about a company's goals and initiatives.</p>\n<p>Internal communications professionals produce messages on behalf of the company and the higher management and facilitate two-way communication between the organization and its workers.</p>\n<p>Successful internal communications planning involves promoting company culture for better employee engagement and effective communication at all times. For any organization to achieve its business goals, it must have the support of its workforce.</p>\n<p>An effective internal communication strategy and a communications plan to execute it are crucial for a business's success. Internal communication efforts do more than ensure effective communication.</p>\n<p>They also create an engaging, community-like environment to build lasting relationships based on trust and use internal communication channels to gather employee feedback to improve their offerings continually. Effective internal communication makes workers feel cared for and helps them thrive at their jobs, leading to an organization's overall success.</p>\n<p>Internal communications 2021 have become significantly more challenging on account of the pandemic. Now, with a majority of the workforce working from home and with companies forcing to lay off their employees, internal comms have to develop new strategies and communication tools to keep the staff working from remote locations apprised of the situation without causing alarm with the no hassle of <strong><a href=\"https://www.loginradius.com/blog/fuel/2021/02/tips-managing-remote-team/\">leading and managing remote teams</a></strong>.</p>\n<p>This article shall look at some of the best international communication strategies and internal communication best practices to help organizations weather these difficult times. But first, we'll explore why businesses must have an internal communications plan.</p>\n<h2 id=\"3-reasons-why-you-need-an-internal-communications-plan\" style=\"position:relative;\"><a href=\"#3-reasons-why-you-need-an-internal-communications-plan\" aria-label=\"3 reasons why you need an internal communications plan permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3 Reasons Why You Need an Internal Communications Plan</h2>\n<p>We open with a hard fact: Workforce engagement can make or break your business. Right from recruitment and retention of an employee to customer service success and  <strong><a href=\"https://www.loginradius.com/blog/identity/2018/10/digital-transformation-safeguarding-customer-experience/\">safeguarding the customer experience</a></strong>, employee engagement is crucial.</p>\n<p>Internal communication is the tool with which companies can achieve higher levels of employee engagement by building trust, helping team members understand the direction in which the company is going, and, more importantly, their role in achieving its vision and goals.</p>\n<p>Let's take a look at the reasons why you must have a plan.</p>\n<h3 id=\"1-to-turn-your-employees-into-your-brand-advocates\" style=\"position:relative;\"><a href=\"#1-to-turn-your-employees-into-your-brand-advocates\" aria-label=\"1 to turn your employees into your brand advocates permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. To turn your employees into your brand advocates.</h3>\n<p>Your employees are the ones that deliver your brand's promise to your customers. It is, therefore, essential to view internal comms as an internal marketing/branding exercise.</p>\n<p>Companies can tailor messages to provide an exceptional experience for their employees by knowing the audiences and their goals. This, in turn, makes the staff believe in the brand and turns them into brand advocates.</p>\n<h3 id=\"2-to-promote-company-culture-and-build-employee-trust\" style=\"position:relative;\"><a href=\"#2-to-promote-company-culture-and-build-employee-trust\" aria-label=\"2 to promote company culture and build employee trust permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. To promote company culture and build employee trust.</h3>\n<p>Better employee engagement drives dialogue, promotes inclusive values, and has more employees communicating about their shared vision for the company. When your workforce feels seen and heard, trust and engagement will flow, resulting in a robust corporate culture.</p>\n<h3 id=\"3-to-avoid-reinventing-the-wheel-in-the-absence-of-a-plan\" style=\"position:relative;\"><a href=\"#3-to-avoid-reinventing-the-wheel-in-the-absence-of-a-plan\" aria-label=\"3 to avoid reinventing the wheel in the absence of a plan permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3. To avoid reinventing the wheel in the absence of a plan.</h3>\n<p>Lack of an effective internal communications strategy can lead to confusion, decreased productivity, and cause employees to become disillusioned with your organization and lose focus.</p>\n<p>Not having a plan can be disastrous, and that's not exclusive to internal comms alone. Draw up goals and objectives and achieve them to lead your employees in the right direction efficiently.</p>\n<p><a href=\"https://www.loginradius.com/resource/how-public-sector-companies-use-the-loginradius-identity-platform/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"How-Public-Sector-Companies-Use-the-LoginRadius-Identity-Platfor\"\n        title=\"How-Public-Sector-Companies-Use-the-LoginRadius-Identity-Platfor\"\n        src=\"/static/9bf345eb654ad0555d320005047c6c10/e5715/How-Public-Sector-Companies-Use-the-LoginRadius-Identity-Platform.png\"\n        srcset=\"/static/9bf345eb654ad0555d320005047c6c10/a6d36/How-Public-Sector-Companies-Use-the-LoginRadius-Identity-Platform.png 650w,\n/static/9bf345eb654ad0555d320005047c6c10/e5715/How-Public-Sector-Companies-Use-the-LoginRadius-Identity-Platform.png 768w,\n/static/9bf345eb654ad0555d320005047c6c10/63ff0/How-Public-Sector-Companies-Use-the-LoginRadius-Identity-Platform.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<h2 id=\"8-internal-communications-strategies-for-b2b-tech-companies\" style=\"position:relative;\"><a href=\"#8-internal-communications-strategies-for-b2b-tech-companies\" aria-label=\"8 internal communications strategies for b2b tech companies permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>8 Internal Communications Strategies for B2B Tech Companies</h2>\n<h3 id=\"1-know-your-position\" style=\"position:relative;\"><a href=\"#1-know-your-position\" aria-label=\"1 know your position permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. Know your position.</h3>\n<p>Companies need to know what they are, what they represent, and what sets them apart from their competition.</p>\n<p>More importantly, companies must also learn how to effectively talk about these aspects and communicate them to their employees to have their facts straight.</p>\n<p>Companies are better served by discussing their objectives honestly with their workforce to achieve the best results.</p>\n<h3 id=\"2-ensure-smooth-communication-flow\" style=\"position:relative;\"><a href=\"#2-ensure-smooth-communication-flow\" aria-label=\"2 ensure smooth communication flow permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. Ensure smooth communication flow.</h3>\n<p>Internal comms must create a communications workflow that specifies who and where information comes from.</p>\n<p>Communication and collaboration among various departments and teams, especially sales and marketing, is critical to achieve sales objectives and meet quality targets.</p>\n<h3 id=\"3-simplify-your-communication\" style=\"position:relative;\"><a href=\"#3-simplify-your-communication\" aria-label=\"3 simplify your communication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3. Simplify your communication.</h3>\n<p>One of the communication best practices is keeping things simple. Complicated messages can be easily misinterpreted and lead to the spread of misinformation.</p>\n<p>We know how quickly messaging can get complicated in B2B tech. When developing messages, include the sales, product, and marketing teams to ensure clarity, accuracy, and easy delivery.</p>\n<h3 id=\"4-centralize-your-message\" style=\"position:relative;\"><a href=\"#4-centralize-your-message\" aria-label=\"4 centralize your message permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>4. Centralize your message.</h3>\n<p>Focus on simplifying the content creation process to the best possible extent. Create a list of materials that your sales teams need for their products. This ensures that sales teams have an equal number of content pieces for their products.</p>\n<p>Centralize information by preparing master documents with facts about the company and provide access to your teams to update them as necessary.</p>\n<h3 id=\"5-provide-training\" style=\"position:relative;\"><a href=\"#5-provide-training\" aria-label=\"5 provide training permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>5. Provide training.</h3>\n<p>Whenever a new product is released or a significant update is announced, gather your staff in training sessions to roll out these developments. Offer mandatory training to support and operations teams as well to ensure everyone is on the same page.</p>\n<p>Make sure that these training sessions, virtual or otherwise are creative and fun while being instructional to ensure maximum retention.</p>\n<h3 id=\"6-facilitate-open-communication-between-teams\" style=\"position:relative;\"><a href=\"#6-facilitate-open-communication-between-teams\" aria-label=\"6 facilitate open communication between teams permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>6. Facilitate open communication between teams.</h3>\n<p>The best communication tools will not work if sales and marketing are not aligned. Equally important are sales-product and sales-support alignments. Encourage open communication between teams to make it easy for them to ask questions and get the required clarifications.</p>\n<p>Roll out company-wide initiatives where members from different departments can meet, albeit virtually, and connect and exchange knowledge.</p>\n<h3 id=\"7-send-internal-newsletters\" style=\"position:relative;\"><a href=\"#7-send-internal-newsletters\" aria-label=\"7 send internal newsletters permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>7. Send internal newsletters.</h3>\n<p>Newsletters are a mainstay in most c and the best way to keep employees informed. Create monthly newsletters with information that staff members need to know, such as product updates, upcoming events, announcements from key stakeholders, staff changes, etc., to keep employees in the know.</p>\n<p>Newsletters are also a great way to reward employee accomplishments, create motivation through recognition of extra efforts, and facilitate communication among the workforce. Newsletters can also be shared on social media to increase brand visibility.</p>\n<h3 id=\"8-hire-individuals-who-respect-your-company-culture\" style=\"position:relative;\"><a href=\"#8-hire-individuals-who-respect-your-company-culture\" aria-label=\"8 hire individuals who respect your company culture permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>8. Hire individuals who respect your company culture.</h3>\n<p>During the interview process itself, check if candidates' values align with those of the company. Make value alignment part of the evaluation process to successfully hire individuals that respect your company culture and provide the best fit to propagate your company values to others.</p>\n<p>Internal communications 2021 especially requires comms professionals to remind the workforce of the organization's mission and values and consistently reinforce their belief in the system in this pandemic.</p>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>All the above internal communication strategies are tried and tested. See which one works best for your organization, and eventually, you'll be able to come up with your strategies that aid in your business's growth.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"loginradius-free-Consultation\"\n        title=\"loginradius-free-Consultation\"\n        src=\"/static/4e5414b04a66bd0747366ee1a5ecce4b/e5715/loginradius-free-Consultation.png\"\n        srcset=\"/static/4e5414b04a66bd0747366ee1a5ecce4b/a6d36/loginradius-free-Consultation.png 650w,\n/static/4e5414b04a66bd0747366ee1a5ecce4b/e5715/loginradius-free-Consultation.png 768w,\n/static/4e5414b04a66bd0747366ee1a5ecce4b/63ff0/loginradius-free-Consultation.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"March 24, 2021","updated_date":null,"description":"Internal communication can be defined as the key to delivering excellent customer and employee experiences. Besides the broader day-to-day function of facilitating employee interaction, internal communication strategies also involve employing a standard, agreed-upon style and mode of language about a company and its products communicated to the outside world.","title":"8 Effective Communication Strategies for Internal Alignment and Growth in 2021","tags":null,"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.4492753623188406,"src":"/static/2cfd54928a0eed7227b0c9e9004d0250/14b42/communication-strategies-Loginradius.jpg","srcSet":"/static/2cfd54928a0eed7227b0c9e9004d0250/f836f/communication-strategies-Loginradius.jpg 200w,\n/static/2cfd54928a0eed7227b0c9e9004d0250/2244e/communication-strategies-Loginradius.jpg 400w,\n/static/2cfd54928a0eed7227b0c9e9004d0250/14b42/communication-strategies-Loginradius.jpg 800w,\n/static/2cfd54928a0eed7227b0c9e9004d0250/a7715/communication-strategies-Loginradius.jpg 1000w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Yash Rathi","github":"yashrathi29","avatar":null}}}},{"node":{"excerpt":"Airports have been increasingly dependent on digital technology in recent years. This shift had become much more apparent when the concept…","fields":{"slug":"/identity/iot-authentication-airlines/"},"html":"<p>Airports have been increasingly dependent on digital technology in recent years. This shift had become much more apparent when the concept of the Internet of Things (IoT) began to receive traction. </p>\n<p>IoT offers a framework or foundation upon which several devices will receive a connection to each other. Therefore, a place like an airport can integrate and coordinate different devices that are in use. </p>\n<p>Digital tech now plays an important role in security through IoT authentication in the airline industry. </p>\n<h2 id=\"smart-airport-technology\" style=\"position:relative;\"><a href=\"#smart-airport-technology\" aria-label=\"smart airport technology permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Smart Airport Technology</h2>\n<p>Airports are known to be chaotic with the passengers and flights. However, behind this chaos, there is control as well. This control is due to the extensive communication that takes place between the various groups of people involved. </p>\n<p>With the adoption of IoT authentication in the airline industry communication devices and mainframe, an airport is now a Smart Airport. </p>\n<p>Airports are adopting IoT for the following reasons: </p>\n<ul>\n<li>An increasing number of devices need protection through IoT authentication in the airline industry. </li>\n<li>Common people are becoming more tech-savvy as they use tablets, smartphones are other devices. </li>\n<li>Desire to create a better passenger experience. </li>\n<li>Increase in the number of travelers opting to travel by flight. </li>\n<li>Increase in the number of flights. </li>\n</ul>\n<h2 id=\"security-for-smart-airports\" style=\"position:relative;\"><a href=\"#security-for-smart-airports\" aria-label=\"security for smart airports permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Security for Smart Airports</h2>\n<p>Airports pride themselves on strict security measures to promise maximum safety to their passengers. Although this involves multiple security checks for the passengers, airports should also pay heed to the security of the technology. </p>\n<p>An airport requires computers, phones, tablets, and other devices. Ensuring the protection of all these devices can prove to be a difficult task. Thus, incorporating IoT authentication in the airline industry <strong>could prove beneficial</strong>.</p>\n<p>The problem may not be as uncommon as one would guess. Cyberattacks have taken place approximately <a href=\"https://www.itnews.com.au/news/how-airbus-defends-against-12-big-cyber-attacks-each-year-418131\">12 times a year</a> at one of the USA's biggest airplane manufacturers. Therefore, IoT offers a type of surveillance system just for their devices. </p>\n<h2 id=\"iot-security-certification-framework-for-aviation-systems\" style=\"position:relative;\"><a href=\"#iot-security-certification-framework-for-aviation-systems\" aria-label=\"iot security certification framework for aviation systems permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>IoT Security Certification Framework for Aviation Systems</h2>\n<p>Through IoT applications for smart airports, one can implement two security measures: protecting devices and maintaining airplanes. </p>\n<p>IoT authentication in the airline industry can ensure the required protective measures on the cybersecurity front. In addition to this, it can also regulate the repairs and quality checks of an airplane.</p>\n<p>An airplane is the sum of several devices and technology. Each piece works together to fly 200+ individuals in the air. Airports usually carry out routine checks and test each piece of the equipment. However, this tedious process need not be so long. </p>\n<p>With IoT overseeing the health of all the airplanes, one could receive an automatic notification or alert if something does go wrong. </p>\n<p>In this, IoT serves as the framework for carrying out necessary security certification. Thus, it increases the operational efficiency of the system. </p>\n<h2 id=\"what-exactly-is-facial-recognition\" style=\"position:relative;\"><a href=\"#what-exactly-is-facial-recognition\" aria-label=\"what exactly is facial recognition permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What Exactly is Facial Recognition</h2>\n<p>Facial recognition and its implementation have been a hot topic for most governments. However, leaving aside the ethics of this technology, it can contribute greatly to security. The technology will be grouped under the <a href=\"https://www.loginradius.com/blog/identity/2020/12/iot-smart-authentication/\">IoT authentication</a> in the airline industry if it is in use. </p>\n<p>This technology can map out the face of an individual and place it in a database. This data will prove vital in verifying identity and in restricting access to staff-only rooms.  </p>\n<p>Another way facial recognition and IoT authentication in the airline industry comes together in an airport is through touchless boarding. This is a process where the passport and travel documents of passengers are not scanned. </p>\n<p>Instead, their faces are scanned for proof of identity. In times of pandemic-borne social distancing, this technology can help airport authorities confirm identity accurately while maintaining hygiene and safety standards.</p>\n<h2 id=\"how-does-loginradius-ensure-an-effortless-login-experience-using-iot-authentication\" style=\"position:relative;\"><a href=\"#how-does-loginradius-ensure-an-effortless-login-experience-using-iot-authentication\" aria-label=\"how does loginradius ensure an effortless login experience using iot authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How Does LoginRadius Ensure an Effortless Login Experience Using IoT Authentication</h2>\n<p>LoginRadius aims to create a <a href=\"https://www.loginradius.com/blog/fuel/2020/07/improving-airline-customer-experience/\">safer consumer experience</a>. <strong>The plan is to do so by incorporating</strong> <strong>IoT authentication in the airline industry.</strong> The fact of the matter is that many passengers are using online portals to book tickets. </p>\n<p>Therefore, it is essential to ensure that bank details and identities receive the required encryption. This is possible through the IoT authentication program that is available at LoginRadius. </p>\n<p>The program involves authentication in two ways: </p>\n<ul>\n<li><strong>QR code:</strong> This type of login involves scanning the QR code provided to access their account. </li>\n<li><strong>Personal link:</strong> The login occurs after an individual click on the link sent to another email or an IoT device. </li>\n</ul>\n<p>With the introduction of these login options, an individual will be able to book flights safely. </p>\n<p>In addition to this, the collection of this consumer data should undergo proper management. This is possible through the LoginRadius Consumer Identity and Access Management. </p>\n<p>In addition to IoT authentication in the airline industry <strong>for registration</strong>, the data can be collected for further analysis. This will help airlines prioritize their consumers, as they alter aspects of the business to the consumer’s liking.</p>\n<p>In essence, the airlines will be carrying out the collection of big data through CIAM. </p>\n<p>The CIAM platform provides features like self-service account management, single sign-on, directory services, and others. </p>\n<p>CIAM acts as a centralized database aiding in improved operational efficiency. This could revolutionize the airlines' consumer service, as only a <a href=\"https://www.forbes.com/sites/christinecrandell/2013/01/21/customer-experience-is-it-the-chicken-or-egg/?sh=38f67ec83557\">measly 1% of consumers </a>believe they receive adequate assistance. </p>\n<p><a href=\"https://www.loginradius.com/blog/identity/2019/06/customer-identity-and-access-management/\">CIAM</a> also contributes to the following airport IoT <strong>use cases</strong>, as well:  </p>\n<ul>\n<li><strong>Bag tracking</strong></li>\n</ul>\n<p>With the help of IoT beacons, luggage can be tracked as it moves through customs. The tracking can involve sending out real-time updates on the whereabouts of the bag. </p>\n<ul>\n<li><strong>Delays or alterations in flight</strong></li>\n</ul>\n<p>Research shows around <a href=\"https://www.weforum.org/agenda/2015/01/how-the-internet-of-things-is-transforming-aviation/\">$20 billion is lost due</a> to delayed flights leading to communication problems between the airport and consumers. With** **IoT authentication in the airline industry, it is possible to identify which airplane the passenger will be boarding and track the movement of the flight. This can reduce the confusion over flight timings and delays, making communication gaps a thing of the past.</p>\n<ul>\n<li><strong>Mapping out the airport</strong></li>\n</ul>\n<p>Airports, being large, can be overwhelming for first-time flyers. With IoT cellular network-connected devices, an individual will be able to find their flight and terminal quickly through the directory.</p>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>The best aspect of IoT authentication in the airline industry or the general use of IoT is the convenience that it brings. It can ease the anxiety of a passenger as they receive reassurance that their data will not see the light of day. Tracking of luggage and decreased wait times will make the passenger experience a breeze. Therefore, IoT authentication in airlines lay the path towards the future of stress-free traveling.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAGCAYAAADDl76dAAAACXBIWXMAAAsSAAALEgHS3X78AAABdElEQVQY002RO0/CUBzFG6PtbZWHCAmRmBB5P8vDII9SSC0omog4oAEGjZMO6OKEuLjoJ2Fx0cSBwUQnXZxcHPwux38LJA7nNvfec8+5v1tOCCiwpbbhye2BxbYgBMtgIRVioDRRsARGXxZUzLlEHmehBaesQ4rrEMPViYf2DR9nDGKkChbVICVqsMt1WJI1sHCFwhUsUIFohJH49TxECvRUjhDW2mAbB5iP6hB8hUkhiRPN5KIZYJdrsEYrcCSpmQqMm6/m9ylUhSulY7N5ivROB3L9GOlGF3Ktbc4zuz341UPw/uIk0ESbBjoSGlYIx8BfzjSwVmyCEYEUUmCPa3Bnd+hwC75yC95S05SxbolU/iEbOCFCpDexEfIioTNCNd6Tp6IlMnNuGeeDe3z//OLx5RWj5zFGT2O8fXxh/P4Ja6w6vSEFCnTIlW2YiDzhzX7ATFKojDlvjpBPcDF4QPdyiG5/iE7/BmfXd+hd3VKpCoG8fzxWw2+c+yTpAAAAAElFTkSuQmCC'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-loginradius-banner\"\n        title=\"book-a-demo-loginradius-banner\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"March 24, 2021","updated_date":null,"description":"The best aspect of IoT authentication in the airline industry or the general use of IoT is the convenience that it brings. It can ease the anxiety of a passenger as they receive reassurance that their data will not see the light of day. In addition, it ensures the required protective measures on the cybersecurity front.","title":"IoT authentication in the airline industry","tags":["customer-experience"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.834862385321101,"src":"/static/dbbaac1ad858404a0c4c70059c1fd41d/14b42/iot-authentication-airlines-cover.jpg","srcSet":"/static/dbbaac1ad858404a0c4c70059c1fd41d/f836f/iot-authentication-airlines-cover.jpg 200w,\n/static/dbbaac1ad858404a0c4c70059c1fd41d/2244e/iot-authentication-airlines-cover.jpg 400w,\n/static/dbbaac1ad858404a0c4c70059c1fd41d/14b42/iot-authentication-airlines-cover.jpg 800w,\n/static/dbbaac1ad858404a0c4c70059c1fd41d/16310/iot-authentication-airlines-cover.jpg 1024w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},{"node":{"excerpt":"The most common response to any of your queries is to simply 'Google' it. This means that anytime your target audience is looking for…","fields":{"slug":"/growth/how-to-drive-in-the-highest-quality-leads-in-2021-with-content-and-seo/"},"html":"<p>The most common response to any of your queries is to simply 'Google' it. This means that anytime your target audience is looking for content related to your business, your content must have a strong presence online to be visible.</p>\n<p>The easiest and most effective way to improve your online presence is through content marketing and <strong><a href=\"https://www.loginradius.com/blog/fuel/2017/04/sign-up-forms-best-practices/\">SEO lead generation</a></strong>.</p>\n<p>Recent statistics suggest that content marketing not only costs about <a href=\"https://www.demandmetric.com/content/content-marketing-infographic\">62% less than traditional marketing</a> strategies but is also one of the most efficient options to generate leads.</p>\n<h2 id=\"how-do-seo-and-lead-generation-work-together\" style=\"position:relative;\"><a href=\"#how-do-seo-and-lead-generation-work-together\" aria-label=\"how do seo and lead generation work together permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How Do SEO and Lead Generation Work Together</h2>\n<p>When it comes to digitally google marketing, SEO and lead generation techniques go hand in hand. As long as your content is SEO-friendly, you are bound to generate leads in one way or the other. The basic step to follow is to create high-quality content paired with the right SEO practices to generate leads for your business in no time.</p>\n<p>Content marketing and lead generation strategies aim to create trust within your target audience through high-quality content and the best SEO strategy, leading to more lead generations.</p>\n<h2 id=\"the-role-of-seo-in-driving-the-highest-quality-leads-in-2021\" style=\"position:relative;\"><a href=\"#the-role-of-seo-in-driving-the-highest-quality-leads-in-2021\" aria-label=\"the role of seo in driving the highest quality leads in 2021 permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>The Role of SEO in Driving the Highest Quality Leads in 2021</h2>\n<p>As more businesses and consumers shift online for ease, the only way to stay connected with your audience is by being on the first page of Search Engine Result Pages (SERPs). For this, finding relevant and high-traffic keywords is necessary. A high-quality, well-researched content that hasn't been optimized as per SEO would be invisible unless specifically searched for and generate fewer leads than average SEO-optimized content.</p>\n<p>SEO helps your content to rank higher on Search Engine Result Pages (SERPs). Thus, driving in more traffic and, in turn, leading to more conversions. The major use of SEO is to generate more leads and conversions by diverting more traffic towards your webpage. <a href=\"https://blog.hubspot.com/marketing/the-future-of-content-marketing\">57% B2B marketers</a> swear by SEO for generating more leads and prefer the same more than other marketing forms.</p>\n<p><a href=\"https://www.loginradius.com/resource/guide-to-modern-customer-identity/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"EB-Guide-to-Modern-Customer-Identity\"\n        title=\"EB-Guide-to-Modern-Customer-Identity\"\n        src=\"/static/04bf5e11f74fd31f8819d64573a1e02c/e5715/EB-Guide-to-Modern-Customer-Identity.png\"\n        srcset=\"/static/04bf5e11f74fd31f8819d64573a1e02c/a6d36/EB-Guide-to-Modern-Customer-Identity.png 650w,\n/static/04bf5e11f74fd31f8819d64573a1e02c/e5715/EB-Guide-to-Modern-Customer-Identity.png 768w,\n/static/04bf5e11f74fd31f8819d64573a1e02c/63ff0/EB-Guide-to-Modern-Customer-Identity.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<h2 id=\"important-questions-to-ask-when-using-seo-for-lead-generation\" style=\"position:relative;\"><a href=\"#important-questions-to-ask-when-using-seo-for-lead-generation\" aria-label=\"important questions to ask when using seo for lead generation permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Important Questions to Ask When Using SEO for Lead Generation</h2>\n<p>The world of SEO and lead generation is vast; before diving into finding the best lead generation tips 2021 for your business, here are some helpful questions that you must seek answers to.</p>\n<ol>\n<li>What type of leads do you want?</li>\n</ol>\n<p>Leads and conversions are different for different businesses. SEO lead generation for small businesses will be very different from a large-scale online retail store. The process of generating leads starts with understanding the kind of leads you are aiming for.</p>\n<p>It can be a specific group of people who belong to a particular age group, geographical area, or gender. It can be a large group of people of all ages with a similar interest in a topic. Doing this is important as <a href=\"https://junto.digital/blog/seo-stats/\">18% of location-based searches</a> result in a sale within a day. Therefore, once you are sure about your ideal target audience, you can start looking for keywords to promote your products and services.</p>\n<ol start=\"2\">\n<li>How will you speak to your leads?</li>\n</ol>\n<p>The presentation of your product or service has a huge impact on your target audience. For example, if your target audience consists of parents with toddlers, your products must be child-friendly. Similarly, it is vital to focus on your product's cost-effectiveness when selling something specifically for college-going young adults.</p>\n<p>While your website doesn't have to be entirely about your target audience, you should, however, dedicate a small section of your page to attract them. Do it by directing your audience to specific sections of your landing pages based on the long-tail keywords they have used.</p>\n<ol start=\"3\">\n<li>How can you engage your dream leads?</li>\n</ol>\n<p>Finding and driving a potential consumer to your page is just the first step. Getting them to take action like buying a product or sharing content is harder but not impossible. This is where social media and call-to-action phrases come into play. Depending upon your potential consumers' social media preferences, you can use several <strong><a href=\"https://www.loginradius.com/integrations/google-marketing-platform/\">google marketing platforms</a></strong> to your advantage. Even in a tweet, valuable content will help provide you more reach through retweets and shares.</p>\n<p>Using SEO strategy in blog posts is a great way to generate organic traffic on search engines. Depending upon their niche and target consumers, business owners can use one or more ways to engage their leads.</p>\n<ol start=\"4\">\n<li>How will you convert dream leads into loyal consumers?</li>\n</ol>\n<p>After driving leads to your landing pages and engaging them, the next step will be to ensure conversions. This can be effectively done by using the call-to-action phrases to encourage conversions. Another way to ensure this is by writing informative content that provides something valuable to your audience. Continuous inflow of valuable information related to your niche builds trust and convinces them about your expertise.</p>\n<h2 id=\"the-role-of-content-marketing-in-driving-the-highest-quality-leads-in-2021\" style=\"position:relative;\"><a href=\"#the-role-of-content-marketing-in-driving-the-highest-quality-leads-in-2021\" aria-label=\"the role of content marketing in driving the highest quality leads in 2021 permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>The Role of Content Marketing in Driving the Highest Quality Leads in 2021</h2>\n<p>Now that we have established the significance of SEO in generating leads and ways to attract a potential consumer through them, it is time to understand content marketing and its role in lead generation. As explained before, SEO and lead generation go hand in hand.</p>\n<p>More SEO-friendly content means better content marketing strategies for your business. Content marketing can generate <a href=\"https://www.hubspot.com/state-of-marketing\">54% more leads</a> than traditional marketing methods.</p>\n<ul>\n<li>Increase site traffic</li>\n</ul>\n<p>The traffic on your website is directly related to your ranking on search engines. The higher you are on the SERPs, the more your visibility will be. An expert SEO agency will be perfect for ensuring high search engine rankings for all your content.</p>\n<ul>\n<li>Create a landing page</li>\n</ul>\n<p>Your landing page is like the entrance to your online store. Unless it is easy to navigate and interactive for your audience, it won't lead to conversions. It is better to take help from a professional web designer to help plan your landing pages.</p>\n<ul>\n<li>Organic traffic</li>\n</ul>\n<p><strong><a href=\"https://www.loginradius.com/blog/fuel/2021/02/attract-consumers-to-your-website/\">Organic traffic</a></strong> for your website is the best way to ensure long-term loyal conversions. Well-framed content marketing strategies with the best SEO practices are sure to generate more leads and conversions for your business.</p>\n<ul>\n<li>Lead conversion</li>\n</ul>\n<p>Content marketing through social media platforms or blog posts provides the user with valuable content related to your niche and generates more leads through call-to-action phrases. These CTAs can be used to encourage sales, share information, or simply direct the reader to more information about the topic.</p>\n<h2 id=\"implementing-a-winning-seo-and-content-strategy\" style=\"position:relative;\"><a href=\"#implementing-a-winning-seo-and-content-strategy\" aria-label=\"implementing a winning seo and content strategy permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Implementing a Winning SEO and Content Strategy</h2>\n<p>The basics of content marketing strategies are the same for all. To ensure that your content stands out amongst the thousands of web pages, implementing a winning content strategy is necessary. <a href=\"https://www.smartinsights.com/content-management/content-marketing-strategy/essential-content-marketing-statistics/\">69% of B2B marketers</a> have a sound content marketing strategy, and you need one, too.</p>\n<p>  <span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 56.30769230769231%; position: relative; bottom: 0; left: 0; background-image: url('data:image/jpeg;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"content-marketing-loginradius\"\n        title=\"content-marketing-loginradius\"\n        src=\"/static/8f5cb289ad0e09af0353a92b8f3ba05b/212bf/content-seo-loginradius.jpg\"\n        srcset=\"/static/8f5cb289ad0e09af0353a92b8f3ba05b/6aca1/content-seo-loginradius.jpg 650w,\n/static/8f5cb289ad0e09af0353a92b8f3ba05b/212bf/content-seo-loginradius.jpg 768w,\n/static/8f5cb289ad0e09af0353a92b8f3ba05b/0f98f/content-seo-loginradius.jpg 1920w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>Here are some strategies you can employ for your business:</p>\n<ol>\n<li>Define the objectives of your content marketing</li>\n</ol>\n<p>When curating content for your webpage or social media handles, having a fixed goal is essential. With clearly defined objectives and goals for conversion and leads, you can plan your content effectively. For Eg., if your main goal is to make more sales, your blog content should also include the call-to-action phrases used for the same.</p>\n<ol start=\"2\">\n<li>Keyword research</li>\n</ol>\n<p>Keywords are the most commonly used search terms that your target audience would use to look up content similar to yours. When selecting keywords for your content, it is better to focus on long-term keywords along with the commonly used ones. Long-term keywords help you create content and focus better on your target audience.</p>\n<ol start=\"3\">\n<li>Topic research</li>\n</ol>\n<p>To level up your content marketing strategies, you can work on providing value through well-researched content. This helps build trust among your potential consumers and also reflects positively on the expertise of your work.</p>\n<ol start=\"4\">\n<li>Plan your content</li>\n</ol>\n<p>Planning your content ahead of time is the key to implementing winning SEO and content strategies. It enables you to thoughtfully create well-researched content to ensure the quality and creativity of content relevant to your brand message.</p>\n<ol start=\"5\">\n<li>Develop your content</li>\n</ol>\n<p>While it is essential to come up with new content, it is equally essential to revamp your existing content as per the latest SEO trends and practices to ensure <strong><a href=\"https://www.loginradius.com/blog/fuel/2021/01/engineering-as-marketing/\">effective marketing</a></strong> of your webpage and brand instead of only focusing on the newer content.</p>\n<ol start=\"6\">\n<li>Promote your content and build backlinks</li>\n</ol>\n<p>Simply relying on organic traffic  through searches and SEO strategies is not enough to maintain your page's visibility and reach. A strong backlink network interlinking your content and the content of other similar pages from your niches helps increase the discoverability of your content, increasing its rank on search results.</p>\n<ol start=\"7\">\n<li>Evaluate, re-optimize, and leverage content</li>\n</ol>\n<p>The only constant when working with content marketing strategies is change. As long as you keep track of the latest market trends and refresh your content strategies accordingly, you will stay on top of your game. Simply put, the main job is to understand the new trends and change your strategies to fit in with the market. This ultimately gives your content leverage over the others, improving your reach, leads, and conversions.</p>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>SEO lead generation is all about constant change. Understanding the market trends and keeping up with them is necessary. With the proper keywords and SEO strategy, business owners can successfully generate leads and conversions to sell their products and services. SEO leads have a <a href=\"https://cdn2.hubspot.net/hub/212967/file-28030930-pdf/the_2012_state_of_inbound_marketing.pdf\">14.6% close rate</a>, more than any type. Therefore, effective SEO usage is necessary for businesses to stand apart from other competitors in the market.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"try-with-us-Partner\"\n        title=\"try-with-us-Partner\"\n        src=\"/static/de654dc21dca09244813b4e7fd97c28a/e5715/try-with-us-Partner.png\"\n        srcset=\"/static/de654dc21dca09244813b4e7fd97c28a/a6d36/try-with-us-Partner.png 650w,\n/static/de654dc21dca09244813b4e7fd97c28a/e5715/try-with-us-Partner.png 768w,\n/static/de654dc21dca09244813b4e7fd97c28a/63ff0/try-with-us-Partner.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"March 23, 2021","updated_date":null,"description":"When it comes to digital marketing, SEO and lead generation techniques go hand in hand. As long as your content is SEO-friendly, you are bound to generate leads in one way or the other. The basic step to follow is to create high-quality content paired with the right SEO practices to generate leads for your business in no time.","title":"How to Drive in the Highest Quality Leads in 2021 with Content and SEO","tags":null,"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":2,"src":"/static/518f27c98116727411b8728f52b95809/14b42/content-marketing-loginradius.jpg","srcSet":"/static/518f27c98116727411b8728f52b95809/f836f/content-marketing-loginradius.jpg 200w,\n/static/518f27c98116727411b8728f52b95809/2244e/content-marketing-loginradius.jpg 400w,\n/static/518f27c98116727411b8728f52b95809/14b42/content-marketing-loginradius.jpg 800w,\n/static/518f27c98116727411b8728f52b95809/a7715/content-marketing-loginradius.jpg 1000w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Deependra Singh","github":null,"avatar":null}}}}]},"markdownRemark":{"excerpt":"Identity is evolving, and developers are at the forefront of this transformation. Every day brings a new learning—adapting to new standards…","fields":{"slug":"/identity/developer-first-identity-provider-loginradius/"},"html":"<p>Identity is evolving, and developers are at the forefront of this transformation. Every day brings a new learning—adapting to new standards and refining approaches to building secure, seamless experiences.</p>\n<p>We’re here to support developers on that journey. We know how important simplicity, efficiency, and well-structured documentation are when working with identity and access management solutions. That’s why we’ve redesigned the <a href=\"https://www.loginradius.com/\">LoginRadius website</a>—to be faster, more intuitive, and developer-first in every way.</p>\n<p>The goal? Having them spend less time searching and more time building.</p>\n<h2 id=\"whats-new-and-improved-on-the-loginradius-website\" style=\"position:relative;\"><a href=\"#whats-new-and-improved-on-the-loginradius-website\" aria-label=\"whats new and improved on the loginradius website permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What’s New and Improved on the LoginRadius Website?</h2>\n<p>LoginRadius’ vision is to give developers a product that simplifies identity management so they can focus on building, deploying, and scaling their applications. To enhance this experience, we’ve spent the last few months redesigning our interface— making navigation more intuitive and reassuring that essential resources are easily accessible.</p>\n<p>Here’s a closer look at what’s new and why it’s important:</p>\n<h3 id=\"a-developer-friendly-dark-theme\" style=\"position:relative;\"><a href=\"#a-developer-friendly-dark-theme\" aria-label=\"a developer friendly dark theme permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>A Developer-Friendly Dark Theme</h3>\n<p><img src=\"/f46881583c7518a93bb24e94c32320de/a-developer-friendly-dark-theme.webp\" alt=\"This image shows how LoginRadius offers several authentication methods like traditional login, social login, passwordless login, passkeys and more in a dark mode.\">    </p>\n<p>Developers spend long hours working in dark-themed IDEs and terminals, so we’ve designed the LoginRadius experience to be developer-friendly and align with that preference.</p>\n<p>The new dark mode reduces eye strain, enhances readability, and provides a seamless transition between a coding environment and our platform. Our new design features a clean, modern aesthetic with a consistent color scheme and Barlow typography, ensuring better readability. High-quality graphics and icons are thoughtfully placed to enhance the content without adding visual clutter.</p>\n<p>So, whether you’re navigating our API docs or configuring authentication into your system, our improved interface will make those extended development hours more comfortable and efficient.</p>\n<h3 id=\"clear-categorization-for-loginradius-capabilities\" style=\"position:relative;\"><a href=\"#clear-categorization-for-loginradius-capabilities\" aria-label=\"clear categorization for loginradius capabilities permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Clear Categorization for LoginRadius Capabilities</h3>\n<p><img src=\"/e5358b82be414940f3fb146013845933/capabilities.webp\" alt=\"This image shows a breakdown of all the LoginRadius CIAM capabilities, including authentication, security, UX, scalability and multi-brand management.\"></p>\n<p>We’ve restructured our website to provide a straightforward breakdown of our customer identity and access management platform capabilities, helping you quickly find what you need:</p>\n<ul>\n<li>Authentication: Easily understand <a href=\"https://www.loginradius.com/blog/identity/authentication-option-for-your-product/\">how to choose the right login method</a>, from traditional passwords and OTPs to social login, federated SSO, and passkeys with few lines of code.</li>\n<li>Security: Implement no-code security features like bot detection, IP throttling, breached password alerts, DDoS protection, and adaptive MFA to safeguard user accounts.</li>\n<li>User Experience: Leverage AI builder, hosted pages, and drag-and-drop workflows to create smooth, branded sign-up and login experiences.</li>\n<li>High Performance &#x26; Scalability: Confidently scale with sub-100ms API response times, 100% uptime, 240K+ RPS, and 28+ global data center regions.</li>\n<li>Multi-Brand Management: Efficiently manage multiple identity apps, choosing isolated or shared data stores based on your brand’s unique needs.</li>\n</ul>\n<p>This structured layout ensures you can quickly understand each capability and how it integrates into your identity ecosystem.</p>\n<h3 id=\"developer-first-navigation\" style=\"position:relative;\"><a href=\"#developer-first-navigation\" aria-label=\"developer first navigation permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Developer-First Navigation</h3>\n<p><img src=\"/a8c155c2b6faf3d5f4b4de4e2b14d763/developers-menu.webp\" alt=\"This image shows the LoginRadius menu bar, highlighting the developer dropdown.\">   </p>\n<p>We’ve been analyzing developer workflows to identify how you access key resources. That’s why we redesigned our navigation with one goal in mind: to reduce clicks and make essential resources readily available.</p>\n<p>The new LoginRadius structure puts APIs, SDKs, and integration guides right at the menu bar under the Developers dropdown so you can get started faster. Our Products, Solutions, and Customer Services are also clearly categorized, helping development teams quickly find the right tools and make informed decisions.</p>\n<h3 id=\"quick-understanding-of-integration-benefits\" style=\"position:relative;\"><a href=\"#quick-understanding-of-integration-benefits\" aria-label=\"quick understanding of integration benefits permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Quick Understanding of Integration Benefits</h3>\n<p><img src=\"/b2f9a964a2da0ea83e2f8596b833bba7/we-support-your-tech-stack.webp\" alt=\"This image shows a list of popular programming languages and frameworks offered by LoginRadius.\"></p>\n<p>Developers now have a clear view of the tech stack available with LoginRadius, designed to support diverse business needs.</p>\n<p>Our platform offers pre-built SDKs for Node.js, Python, Java, and more, making CIAM integration seamless across popular programming languages and frameworks.</p>\n<h2 id=\"over-to-you-now\" style=\"position:relative;\"><a href=\"#over-to-you-now\" aria-label=\"over to you now permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Over to You Now!</h2>\n<p>Check out our <a href=\"https://www.loginradius.com/\">revamped LoginRadius website</a> and see how the improved experience makes it easier to build, scale, and secure your applications.</p>\n<p>Do not forget to explore the improved navigation and API documentation, and get started with our free trial today. We’re excited to see what you’ll build with LoginRadius!</p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"February 21, 2025","updated_date":null,"description":"LoginRadius’ vision is to give developers a product that simplifies identity management so they can focus on building, deploying, and scaling their applications. To enhance this experience, we’ve redesigned our website interface, making navigation more intuitive and reassuring that essential resources are easily accessible.","title":"Revamped & Ready: Introducing the New Developer-First LoginRadius Website","tags":["Developer tools","API","Identity Management","User Authentication"],"pinned":true,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.7857142857142858,"src":"/static/80b4e4fbe176a10a327d273504607f32/58556/hero-section.webp","srcSet":"/static/80b4e4fbe176a10a327d273504607f32/61e93/hero-section.webp 200w,\n/static/80b4e4fbe176a10a327d273504607f32/1f5c5/hero-section.webp 400w,\n/static/80b4e4fbe176a10a327d273504607f32/58556/hero-section.webp 800w,\n/static/80b4e4fbe176a10a327d273504607f32/99238/hero-section.webp 1200w,\n/static/80b4e4fbe176a10a327d273504607f32/7c22d/hero-section.webp 1600w,\n/static/80b4e4fbe176a10a327d273504607f32/1258b/hero-section.webp 2732w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},"pageContext":{"limit":6,"skip":540,"currentPage":91,"type":"///","numPages":161,"pinned":"ee8a4479-3471-53b1-bf62-d0d8dc3faaeb"}},"staticQueryHashes":["1171199041","1384082988","2100481360","23180105","528864852"]}