{"componentChunkName":"component---src-templates-blog-list-template-js","path":"/identity/51","result":{"data":{"allMarkdownRemark":{"edges":[{"node":{"excerpt":"In today’s constantly changing world, agility is an absolute must for transformation. Any small or large organization can no longer avoid…","fields":{"slug":"/identity/digital-agility/"},"html":"<p>In today’s constantly changing world, agility is an absolute must for transformation. Any small or large organization can no longer avoid – or even delay - digital transformation as they try to remain competitive in an evolving business climate. As aptly stated by <a href=\"https://blog.kintone.com/business-with-heart/11-digital-transformation-quotes-to-lead-change-inspire-action\">Aaron Levie of BOX</a>, “the next 10 years of IT will be about transforming your business.”</p>\n<p>Just like agility is the “way to move quickly and easily,” digital agility is now the means to <a href=\"https://www.striata.com/posts/digital-agility-in-digital-transformation/\">adopt digital transformation</a> quickly and easily through the right tools and processes. </p>\n<p>What exactly is digital agility – and how do you go about achieving its objectives? These are the key questions that we shall try to address over the next few sections. </p>\n<h2 id=\"what-is-digital-agility\" style=\"position:relative;\"><a href=\"#what-is-digital-agility\" aria-label=\"what is digital agility permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is Digital Agility</h2>\n<p>In simple terms, digital agility is the ease with which any organization can adapt to changing business needs – by enabling or changing their business processes. <a href=\"https://business.comcast.com/community/browse-all/details/speed-and-strategy-success-through-agility\">Meredith Whalen of IDC</a> believes that \"the more we get into a digital economy, it is all about adapting and responding quickly as an organization to disruption and changes.\"</p>\n<p>Simply put, for a successful digital transformation, organizations need to invest in resilient business operations, consumer experience initiatives, and technology. For instance, the creation of an identity-driven digital transformation strategy enables various users – including internal &#x26; external – to have the <span style=\"text-decoration:underline;\">right access to the right technology for the right purpose</span>.</p>\n<p>How do you go about achieving your business objectives in digital agility? Among its major building blocks, identity and access management (or IAM) can help in bringing business agility into any organization. </p>\n<p>Traditionally, IAM has always been viewed as an effective security solution that is necessary for software applications and mobile apps. In short, it has been used solely to “keep the bad guys out.” This is true – but the fact is IAM is now much more than simply acting as an authentication tool.</p>\n<p>Among its major benefits, flexible IAM technology can also be used to add to the digital agility progress of any firm. How does IAM technology work in boosting digital agility? Let us discuss that in the following section.</p>\n<h2 id=\"iam-and-digital-agility\" style=\"position:relative;\"><a href=\"#iam-and-digital-agility\" aria-label=\"iam and digital agility permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>IAM and Digital Agility</h2>\n<p>Traditionally, IAM technology has been embedded into applications and frameworks such as AngularJS and React. The constraint of this approach is that IAM-related capabilities remain limited to the specific application or framework. As a result, it is a challenge to integrate these applications with external systems. </p>\n<p>To create a successful digital strategy using IAM, you need to focus on:</p>\n<ul>\n<li>Which users or identities require access rights to the applications?</li>\n<li>How can they go about utilizing these applications?</li>\n<li>What resources do they need for access?</li>\n<li>How can you prevent unauthorized access to the applications?</li>\n</ul>\n<p>Business leaders must plan on having a flexible IAM solution in their working environment that can be both distributed and dynamic for changing business needs.</p>\n<p>For effective <a href=\"https://www.loginradius.com/blog/identity/2021/01/what-is-digital-transformation/\">digital transformation</a>, technology-enabled companies must move from a fixed and rigid IT infrastructure – to a more flexible and component-based API architecture, which can easily be reconstructed or reused. Next, we shall see how an API-based <a href=\"https://www.loginradius.com/blog/identity/2019/06/customer-identity-and-access-management/\">consumer Identity and Access Management (or CIAM)</a> can be the foundation of digital agility and transformation.</p>\n<p><a href=\"https://www.loginradius.com/resource/the-enterprise-buyers-guide-to-consumer-identity/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"enterprise-buyer-guide-to-consumer-identity\"\n        title=\"enterprise-buyer-guide-to-consumer-identity\"\n        src=\"/static/6cf3b3c14d1cbec2bf253b24dcd51704/e5715/enterprise-buyer-guide-to-consumer-identity.png\"\n        srcset=\"/static/6cf3b3c14d1cbec2bf253b24dcd51704/a6d36/enterprise-buyer-guide-to-consumer-identity.png 650w,\n/static/6cf3b3c14d1cbec2bf253b24dcd51704/e5715/enterprise-buyer-guide-to-consumer-identity.png 768w,\n/static/6cf3b3c14d1cbec2bf253b24dcd51704/2bef9/enterprise-buyer-guide-to-consumer-identity.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<h2 id=\"importance-and-benefits-of-api-driven-ciam\" style=\"position:relative;\"><a href=\"#importance-and-benefits-of-api-driven-ciam\" aria-label=\"importance and benefits of api driven ciam permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Importance and Benefits of API-driven CIAM</h2>\n<p>A recent PwC report concludes that <a href=\"https://www.pwc.com/us/en/advisory-services/publications/consumer-intelligence-series/pwc-consumer-intelligence-series-customer-experience.pdf\">32% of consumers</a> will abandon a product or brand – after just one bad experience. This shows a good consumer experience is not just desirable – but essential for business success. </p>\n<p>CIAM technology essentially combines both these requirements. No matter which medium consumers are using to engage with a brand – be it physical, online, or mobile, CIAM solutions ensure a secure and seamless experience. Plus, using their API capabilities, CIAM solutions can be embedded into on-premises software or cloud-based applications.</p>\n<p>Listed below are some of the benefits of CIAM as compared to traditional IAM solutions:</p>\n<ul>\n<li><span style=\"text-decoration:underline;\">A unified consumer experience</span> that is consistent across all channels.</li>\n<li><span style=\"text-decoration:underline;\">Advanced data authentication </span>that can secure your consumer data from online security threats.</li>\n<li><span style=\"text-decoration:underline;\">Consistent performance and scalability </span>with an exponential increase in consumer identities.</li>\n<li><span style=\"text-decoration:underline;\">Data privacy-related compliance</span> ensures that your consumers have complete control over who and how their data is shared.</li>\n</ul>\n<h2 id=\"how-the-loginradius-ciam-solution-can-help-in-your-digital-agility\" style=\"position:relative;\"><a href=\"#how-the-loginradius-ciam-solution-can-help-in-your-digital-agility\" aria-label=\"how the loginradius ciam solution can help in your digital agility permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How the LoginRadius CIAM Solution Can Help in Your Digital Agility</h2>\n<p>As a leading provider of CIAM solutions that works for any business model, LoginRadius ensures digital agility along with a seamless consumer experience. With the LoginRadius identity management platform, you can achieve digital transformation by connecting your consumer data to a host of API-driven tools in analytics, business intelligence (BI), and consumer relationship management (CRM). </p>\n<p>Using the LoginRadius <a href=\"https://www.loginradius.com/identity-api/\">consumer identity APIs</a>, you can easily validate and automate your consumer identification process and prevent the creation of any spam or fraud accounts.</p>\n<p>With its preconfigured integration with third-party tools and applications, you can pull your latest consumer data – thus eliminating data silos and generating valuable insights.</p>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>Organizations need to maximize their digital footprint – to stay relevant in today’s connected world. Are you still working with outdated IT systems and processes? Then it is the right time to go for digital agility that can transform your business. In addition to user authentication, <a href=\"https://www.loginradius.com/blog/identity/2021/01/what-is-iam/\">IAM</a> solutions can go a long way in elevating your consumer experience.</p>\n<p>Built using extensive API functionalities and open-source SDKs, LoginRadius CIAM provides the best of customization and security – that can work for your business needs.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"LoginRadius Book a Demo\"\n        title=\"LoginRadius Book a Demo\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"February 24, 2021","updated_date":null,"description":"Digital agility is the ease with which any organization can adapt to changing business needs – by enabling or changing their business processes. For a successful digital transformation, organizations need to invest in resilient business operations, consumer experience initiatives, and technology.","title":"Why Organizations Must Use API-Driven CIAM for Digital Agility","tags":["ciam solution","digital transformation","cx"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.492537313432836,"src":"/static/20c31de5cbe6cef41a6f3e5ed1b7a892/14b42/digital-agility.jpg","srcSet":"/static/20c31de5cbe6cef41a6f3e5ed1b7a892/f836f/digital-agility.jpg 200w,\n/static/20c31de5cbe6cef41a6f3e5ed1b7a892/2244e/digital-agility.jpg 400w,\n/static/20c31de5cbe6cef41a6f3e5ed1b7a892/14b42/digital-agility.jpg 800w,\n/static/20c31de5cbe6cef41a6f3e5ed1b7a892/16310/digital-agility.jpg 1024w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},{"node":{"excerpt":"Social login allows consumers to authenticate with their existing login information from a social network provider like Facebook, or Google…","fields":{"slug":"/identity/social-login-infographic/"},"html":"<p>Social login allows consumers to authenticate with their existing login information from a social network provider like Facebook, or Google. It means the consumer can simply sign into a third party website without having to create a new account for the website. </p>\n<p>Social login simplifies registration and login for consumers. For this primary reason, social login is gaining popularity among ecommerce brands and retailers looking to turn visitors into buying customers. </p>\n<p>By allowing users to register and verify themselves with a simple click through their existing social media profile eliminates the need for long registration forms, and password recovery. </p>\n<p>Infact, 70.69% of 18-25 year-olds prefer social login in the LoginRadius' <a href=\"https://www.loginradius.com/resource/digital-identity-trends-2020/\">Consumer Identity Trend Report 2020</a>. </p>\n<h2 id=\"how-does-social-login-work\" style=\"position:relative;\"><a href=\"#how-does-social-login-work\" aria-label=\"how does social login work permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How Does Social Login Work</h2>\n<p>You don't need to do a lot for work to implement social login. Here's how it works. </p>\n<p><strong>Step 1:</strong> The consumer chooses the desired social network provider upon entering an application.</p>\n<p><strong>Step 2:</strong> A login request is sent to the social network provider.</p>\n<p><strong>Step 3</strong>: The consumer gets access to the app once the social provider confirms the identity.</p>\n<p><a href=\"https://www.loginradius.com/resource/loginradius-ciam-social-login/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"social-login-datasheet\"\n        title=\"social-login-datasheet\"\n        src=\"/static/f2945ee3c14ddb03e7f77a5db0f15b1f/e5715/social-login-datasheet.png\"\n        srcset=\"/static/f2945ee3c14ddb03e7f77a5db0f15b1f/a6d36/social-login-datasheet.png 650w,\n/static/f2945ee3c14ddb03e7f77a5db0f15b1f/e5715/social-login-datasheet.png 768w,\n/static/f2945ee3c14ddb03e7f77a5db0f15b1f/63ff0/social-login-datasheet.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<h2 id=\"benefits-of-social-login\" style=\"position:relative;\"><a href=\"#benefits-of-social-login\" aria-label=\"benefits of social login permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Benefits of Social Login</h2>\n<p><strong>Easy registration</strong>: Social login offers simplified, quick and easy registration. It provides the convenience to consumers to register in a single click mitigating the time-consuming process of creating a new account. </p>\n<p><strong>Increases consumer sign-up</strong>: Since social login offers hassle-free registration, there is a higher possibility of successful sign-up. Also, it induces <a href=\"https://www.loginradius.com/blog/fuel/2020/05/customer-experience-retail-industry/\">enhanced consumer experience</a> on a platform. </p>\n<p><strong>Reduces cart abandonment</strong>: Online shoppers often need to go through mandatory registration during checkout. With social login, it is easier to ensure that consumers are logging in with a single click, leading to reduced cart abandonment. </p>\n<p><strong>Reduces bounce rate</strong>: It is one of the best options for people who <a href=\"https://www.loginradius.com/blog/identity/2021/01/user-onboarding-revamp-application/\">hate filling up the registration form</a>. These consumers do not think twice before exiting from a website. Implementing social login can reduce bounce rate and increase the average site time simultaneously. </p>\n<p><strong>Fewer login fails</strong>: When consumers do not need to remember usernames and passwords, there is a lesser possibility of login fails. </p>\n<p>To learn more about Social login – how it works and advantages, check out the infographic created by LoginRadius.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 353.84615384615387%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAABHCAYAAAAHk2dUAAAACXBIWXMAAAsSAAALEgHS3X78AAAKb0lEQVRYw61YWWxU1xm+s917Z7mzesH22B5vM96xjY09Nngd78YQ40AJidhMSiLah1Yq6ZaHSlBKgAAJIanSB1SpLymoom9plKhpkygiBIhxXiq1CQHMktCEJSXB5Ov/n3vveMY25AWkj/+c//z/9y/nzMw5liRJgsNuhTMUhlrWBjmyBBa7AtZLVhussgpFVSHJLkh2WdfPhc0OyWLVxw5Zhi83gqymEbgrOqBW9wpSJpMcKhyqCxmZmZCcXiJ16qQ2BxFYdNDcQraKy20EpIklqxhK7QDU6DKolV1QS+M6oYio6GPKNElktepjCihRNTbFiUAwqM+FAQ2U4qVwVifgrOqBPZg/pyTHbElzwVm7A7CwFITcL3ZQ3LASkc0TWtjxfuDs2X82KCkVbrgDtgUcbDbaGKs1OWZpoaoY9wkiCWYrEbbE4xgaGkYikcDg4CB6enrQ0dGB0dFR9Pf3Y3h4GL29vRgbG0NjY6PQs92cHbfDTpE5uqIoKCgoQCwWQyQSQX5+vpgzysrKUFJSIvThcBh5eXmoqKiA1+sVFdiJx6hAwkPF8ePHkYpjx+bOjy04n6s3IeEh/5Pu3r0Lxgzhzrd3ce3WN7h551t8y7qZGdy58w0uX/sc01eu4doX13HpylVc/fyLpO6rmzdhcjCk7777TjCzvE3O12/fMQhnhJ6JL16+igvTOq58fp3m1wzdFTG+cu0LzNy7p2doEt4jxVUyvkqLbPDfr24IPWfJjp9emMZnl67gk88uCXn+4mWcv3QZ//70Am7e/jqZlDQzcw8mvqGSObMbN2/j1tf/Ewac4Zc3booAN27dFvL6lzeo1FukvyXWRHvu6RwPf1Pe/nAKc/H3U1N46+Qk3vrgHGFSH6fgTQLbmLapvpLcvAapcCxdAzX+A2QlNiHUtQGZPRuRYYB1PM/u3QxX6zqyfRRz/QWh0rJWJzOUTiLM6duCbCLI7Z/Qybs3JMfhwa3wLFuvExIU9jM4JCZjMIm3/QmoFJnndjJkB5Y89y5fP6tr0knYVuvaCLVtPVSDRxA6jCihxGbYWtaRw3gyaxuN5WVPQOvcoI+NisSYpPBpXpv0ESVrFD1vYKtAePBJ0SfWu9vWifJySZdHKBz+IZX6mFjj8hnhgQnym8Ai6qsombPj/lSs/jGij2wXMjKyTUTjxnPPimheuvJpLOrbLAh5rXj0KURXbUds7EfCj4OJDJmQjXL7t4iNCFOWGRTA3EFb4zjt+loBHjuMnvLc1/64yJID81xp4V2mzVAIcgshPgslvk7oWcrGuq6bnc8D6SW1ph+pUBjVfTpq+mbHBLk6fc7rwq921l9ylrVCLYlDITiKmpFVl0BJ2ygi8RGElw6hsGUERa2jyKdxUesKgZK2lWI9r3EAckkL+baI33Lmkvj64a3sRLC2B76qLoQWJ5BZ34fMut7kWKvsgKeiHRmky2roT+p57q/pFr4a3zqISxCycVZDHyKcScsKFMRXIL95WCBY0yMMldJWYRcggvDSYRSSTQFlHyYbJk4jdMeWC0NfdTe02DJ4GVWdIjOF1p18RSGpZ9ohJFfF0Ai8php2yQz9RKYWN9Mnhk58nD7PJc1wUiA2Mgk5iK+qM+ksQH1zGXYpJXcgUJuAq7AB8qpnIK/+JdyF9XCRPpWQe8zguSvaBld5O1w1vfMJ3bTgp1656Bonr/gp5JU/I8IGckgn5FIFIWdYPwxnwwjsG/YKYtapsyV3ILi4V8/QJCyom0foq+4SgZ1FTXA8thNK5ybYN+6Hk+3SCCkCl+zmDB/5OZRVO6D2Pw1X0yq46HypKT1kQjcR2jcdgJp4EvaJF+CmjRFBdUJu6jKxyy46oP7Ox6G1rYV/8Cn4mkbhFAdWPzaasXkcJDi4Dd7mMfgGtokKnVF9pyVnjCaxdqgGvJRtLn0CcugTw8eJyxGlmyB7tgtVdyKvaQgZNXTjjS5PrklybgXSUQk5r1JIW3aMEF0Yi8qhhqsI1Wn+825fNrqa+fw+aB4PvJoHfp8XAZp7NQ0azX10fWMEAwFxhVv4wmmCL54kfR4XvD4//OSkEVGApN/vh8/nEzIYykAoFILsWPDubQ70K67i1uDOLfree6DDIsHtct4vQ+O+vGQYym9eR2jfO5C2HRG3ez1zS7qkI6b96i8I7vobpMTEHELTKCsCy2+JqH09pBA9K37yJ2jbXxYtEAFNu7xySLvfhdT3JKQ6+kLd8z7c9ANmtixJaCtcDGnxEEJOO3IDGopjFTj16VVk8StK3Pz1XtnpvNnoPaNRyRaa946vx+t0ZbHOZqkT2jMj8MfHYeEnBs2f2bED0+c/Sdkw3c6SXwuFXlsOqz7fs2snJk+fSu8hbz/voEof/P1Hj2Hq7GlcvDSNR9es1Un4cUMZckbuQAYyO9cj2rcOf37tNUxfvoxHxlYn3y/zzuHY6nE8++yzqKysFHNZ1l+mFgOqwnMbFneP4ujRo2hra9N3nY/QvHN4H7ijDQg0D+rPWIP4AfbpCn7E8APGYjzHpDW/hmPPu/DsfAPSL07AllWYbAO3yny23ZdwdvtJNq+CtPcDWHJK9ZI2H4Q08Ur6mfy+DFMJrT1bIPVsRUiWkO1zIxirx/AfT9JTVk37dH0/oQGLLwda82oo/kzaHBl/PXECb7/5hh7svhmaT/1UUGQr9VGjbxWtuh3FK7bhX/85j/dPnkR5ZbV+jLh3XMk83wdkaL6fPR4vlrcshWJJ1y+MgiqkIZ8QNkFnMb8aUk4Ukp92l79Aec76sGFbkCIZ0oGzSOL5s7Ad/Aj+I1PQXjoHz2ETU/Ac+Zh0U/Aaepb2Qx8JnzQOad+HSIVl/4cIvfQRfC+eFcigsTkPHNbH/sNnESRpe/405vqnExKZ+4UzdPZo/NwpXe41ZTocBxYgE4T7aWG/vug8dAbh359D9suTUA6eMTI21gkWw47Xiv8wJeyllHUBPTMjGkX2U1mRV6coAyPTlIBJSfBSC3JemdRJ96asmYZeo2fco6wjk6JfrEsSGQ5cKgflHnIlDNWoZjZDgkwZ8YKdHLjZPGZdWjlkZyUpG2tsZ8pZwtSSCK5DZ/Uy0jZrfslcwSLKTgTdN7dkE9SLIB2JolfP6bu70C7u1WUOkXEP9VOQYisOJsF6gM7akXMIEMKvfgwfHVyrcdhToR2eFGt+sst6ZQp+Y2x+MCSJfzp3/kPAsfufkHe/A4W+UNU978FKY/5pTYX8O17TwXbO596Dk6T4Cd5FUOnWFKynp0LDADIahxBsGISDblO20mWQScply3VJcNDYPgdsx9JZ3ikgqfl1yKvtRCw+hLLmAZQSihp7UVjfg/y6bhQ29Ajk13UJWVDfjQLS8xqPI0sSyK3pELdfV0EDEUYasaimE0VLiaipH9H4MKJtKxBtHUEpjSvaVyKvPoFssslZ3C2QXdsl5lmERTTOqKI7dqQJLrrZSiqxZjaNINY1jowlQ3BU0POCoqmFjQaWQGGQHUMmOCkJf6xVwBel22w53b/L4kIv8X8eul6EquhBQ9JJ12KO9CDwHdtb2gKttBkavWd47OY/uRLX/wGfBPl07skoOwAAAABJRU5ErkJggg=='); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"social-login-infographic\"\n        title=\"social-login-infographic\"\n        src=\"/static/e060422f711bb6532f0737ddc86029bb/e5715/social-login-infographic.png\"\n        srcset=\"/static/e060422f711bb6532f0737ddc86029bb/a6d36/social-login-infographic.png 650w,\n/static/e060422f711bb6532f0737ddc86029bb/e5715/social-login-infographic.png 768w,\n/static/e060422f711bb6532f0737ddc86029bb/4fa52/social-login-infographic.png 1241w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAGCAYAAADDl76dAAAACXBIWXMAAAsSAAALEgHS3X78AAABdElEQVQY002RO0/CUBzFG6PtbZWHCAmRmBB5P8vDII9SSC0omog4oAEGjZMO6OKEuLjoJ2Fx0cSBwUQnXZxcHPwux38LJA7nNvfec8+5v1tOCCiwpbbhye2BxbYgBMtgIRVioDRRsARGXxZUzLlEHmehBaesQ4rrEMPViYf2DR9nDGKkChbVICVqsMt1WJI1sHCFwhUsUIFohJH49TxECvRUjhDW2mAbB5iP6hB8hUkhiRPN5KIZYJdrsEYrcCSpmQqMm6/m9ylUhSulY7N5ivROB3L9GOlGF3Ktbc4zuz341UPw/uIk0ESbBjoSGlYIx8BfzjSwVmyCEYEUUmCPa3Bnd+hwC75yC95S05SxbolU/iEbOCFCpDexEfIioTNCNd6Tp6IlMnNuGeeDe3z//OLx5RWj5zFGT2O8fXxh/P4Ja6w6vSEFCnTIlW2YiDzhzX7ATFKojDlvjpBPcDF4QPdyiG5/iE7/BmfXd+hd3VKpCoG8fzxWw2+c+yTpAAAAAElFTkSuQmCC'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"LoginRadius Book a Demo\"\n        title=\"LoginRadius Book a Demo\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"February 24, 2021","updated_date":null,"description":"Social login simplifies registration and login for consumers. For this primary reason, social login is gaining popularity among ecommerce brands and retailers looking to turn visitors into buying customers.","title":"Why Do Consumers Prefer Social Login [Infographic]","tags":["ciam","social login","cx"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.3333333333333333,"src":"/static/baed9f5b86cca0f315ea6cc2d120aff3/14b42/social-login.jpg","srcSet":"/static/baed9f5b86cca0f315ea6cc2d120aff3/f836f/social-login.jpg 200w,\n/static/baed9f5b86cca0f315ea6cc2d120aff3/2244e/social-login.jpg 400w,\n/static/baed9f5b86cca0f315ea6cc2d120aff3/14b42/social-login.jpg 800w,\n/static/baed9f5b86cca0f315ea6cc2d120aff3/16310/social-login.jpg 1024w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},{"node":{"excerpt":"Today, data breaches have become a significant threat to businesses across the globe.  Therefore, considering the long list of resultant…","fields":{"slug":"/identity/best-practices-business-resilience/"},"html":"<p>Today, data breaches have become a significant threat to businesses across the globe.  Therefore, considering the long list of resultant consequences to be faced as an aftermath, it is crucial for companies to come out the other side of a breach intact.</p>\n<p>The Annual Cybercrime Report  2019 by <a href=\"https://www.herjavecgroup.com/the-2019-official-annual-cybercrime-report/#:~:text=Cybersecurity%20Ventures%20has%20reaffirmed%20their,associated%20with%20cybercrime%20are%20vast.\">Cybersecurity Ventures</a> says that these data breaches can cost global businesses around $6 trillion in 2021!</p>\n<p>According to experts, implementing business resilience best practices can help companies overcome issues that come with a data breach.</p>\n<p>So, what is business resiliency? Why is it important for companies? How to implement business resiliency practices during a data breach?</p>\n<p>Read on!</p>\n<h2 id=\"what-are-the-business-impacts-of-a-data-breach\" style=\"position:relative;\"><a href=\"#what-are-the-business-impacts-of-a-data-breach\" aria-label=\"what are the business impacts of a data breach permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What are the Business Impacts of a Data Breach</h2>\n<p>During a data breach, companies’ confidential data are accessed by attackers without permission.  It is not only about sensitive information going out to the wrong hands. These cyber attackers can also hack your database and conduct malicious activities, costing you both money and reputation. </p>\n<p>As per <a href=\"https://www.ibm.com/security/digital-assets/cost-data-breach-report/#/\">Cost of a Data Breach Report 2020</a> by IBM, the global average total cost of a data breach in 2020 was $3.86M. If this situation continues, by 2021, a business is expected to fall victim to a <a href=\"https://www.herjavecgroup.com/wp-content/uploads/2018/12/CV-HG-2019-Official-Annual-Cybercrime-Report.pdf\">ransomware attack every 11 seconds</a>. </p>\n<p>Now let’s consider some of the negative impacts of data breaches that make companies susceptible to financial and credibility loss.</p>\n<ul>\n<li>\n<p><strong>Finance and revenue loss</strong></p>\n<p>If your company is operating in regions with data protection legislation, you have to pay implied legal fees, regulatory fines, security expenses in case of a data breach.  It can cost you a lot if it is a non-compliant company. All these expenses come in addition to the financial damage you have faced because of revenue loss. </p>\n</li>\n<li>\n<p><strong>Brand’s reputation</strong></p>\n<p>According to 71% of CMOs, the most consequential cost of a company’s security data breach incident is the loss of its brand value. This could in turn affect the company’s reliability, thus having to struggle to find the best candidates, investors, and customers.</p>\n</li>\n<li>\n<p><strong>Consumer trust, retention and turnover</strong></p>\n<p><a href=\"https://www6.thalesgroup.com/2016-data-breaches-customer-loyalty-report-pr\">Seven out of ten consumers</a> believe <a href=\"https://www6.thalesgroup.com/2016-data-breaches-customer-loyalty-report-pr\">it is a company’s responsibility to secure their personal information</a>. So, when there is a data breach, and the consumer’s personal data is hacked, they will quickly lose trust in the business. This can result in losing the most loyal customers, even affecting customer turnover. It could worsen if the company is not ready to accept the responsibility for data breaches.</p>\n</li>\n</ul>\n<p>That’s why today, businesses are more focused on building a better security culture. According to Gartner forecasts, global spending on cybersecurity is expected to reach <a href=\"https://www.gartner.com/en/newsroom/press-releases/2018-08-15-gartner-forecasts-worldwide-information-security-spending-to-exceed-124-billion-in-2019\">$133.7 billion by 2022</a>. </p>\n<p>But, how effectively companies can deal with data breaches, especially in a hyper-connected world?</p>\n<p>To handle a data breach incident and the resulting loss of revenue and trust, every company should have an incident response plan with effective threat modeling. That’s where the idea of business reliance comes into the picture.</p>\n<h2 id=\"what-is-business-resiliency\" style=\"position:relative;\"><a href=\"#what-is-business-resiliency\" aria-label=\"what is business resiliency permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is Business Resiliency</h2>\n<p>Business resilience can be defined as a business’ ability to quickly adapt and respond to impending risks or disruptions. More like a combination of crisis management and business continuity strategies post-disaster. </p>\n<h2 id=\"why-is-business-resiliency-important-for-an-organization\" style=\"position:relative;\"><a href=\"#why-is-business-resiliency-important-for-an-organization\" aria-label=\"why is business resiliency important for an organization permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Why is Business Resiliency Important for an Organization</h2>\n<p>Business resilience has become an essential part of the business. Why? Because it saves businesses with its potential for higher recovery. </p>\n<p>Consider the unforeseen disasters, shifting market demands, and changing regulatory terms in today’s business world. In addition to these, there will be IT disruptions, sudden competitive movements, security threats like data breaches, etc. too. In order to survive all these unpredictable disruptions, businesses should achieve resilience at all means. </p>\n<p>For example, take a look at how businesses worldwide were affected by the COVID-19 pandemic. Only those organizations with <a href=\"https://www.mckinsey.com/business-functions/organization/our-insights/an-operating-model-for-the-next-normal-lessons-from-agile-organizations-in-the-crisis\">agile business resilience</a> planning were able to adapt and survive the COVID-19 challenges successfully. By adapting quickly to shifting business priorities, they are ready for the ‘new normal’ in the business battlefield.</p>\n<p>On the other side, business resilience best practices will assure that all your business activities comply with the latest industry standards and regulations. This will, in turn, improve your reliability, brand value, and reputation, especially in front of your stakeholders and customers. The resilience plans will also act as a blueprint of all your operations, giving you a head start. </p>\n<p>This can even cultivate a resilient organizational culture. It makes the whole business, including employees, quickly adapt to unforeseen challenges whenever the business operations or processes go awry. Or under threat like a data breach.</p>\n<p><a href=\"https://www.loginradius.com/resource/pii-data-breach-report/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"protecting-pii-against-data-breaches\"\n        title=\"protecting-pii-against-data-breaches\"\n        src=\"/static/3183d14f6c9662008b848dc5d81d718f/e5715/protecting-pii-against-data-breaches.png\"\n        srcset=\"/static/3183d14f6c9662008b848dc5d81d718f/a6d36/protecting-pii-against-data-breaches.png 650w,\n/static/3183d14f6c9662008b848dc5d81d718f/e5715/protecting-pii-against-data-breaches.png 768w,\n/static/3183d14f6c9662008b848dc5d81d718f/2bef9/protecting-pii-against-data-breaches.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<h2 id=\"5-best-practices-of-implementing-business-resiliency-during-a-data-breach\" style=\"position:relative;\"><a href=\"#5-best-practices-of-implementing-business-resiliency-during-a-data-breach\" aria-label=\"5 best practices of implementing business resiliency during a data breach permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>5 Best Practices of Implementing Business Resiliency during a Data Breach</h2>\n<p>So, to overcome the after-effects of a data breach in your business, it is important to implement a business resiliency. </p>\n<p>How? We are going to see the best practices of implementing business resilience under a data breach occurrence:</p>\n<p><strong>1. Design a strong business resilience plan</strong></p>\n<p>Develop a reliable, self-healing, resilience easy to manage architecture. It should be designed in such a way that the business can access all its components during a data breach. </p>\n<p>A native high-availability clustering is needed. Because no matter how well you have come up with a crisis management and continuity plan, it will be of no use if it’s not available on demand.  </p>\n<p>So, it should be able to deploy quickly, with <a href=\"https://www.loginradius.com/scalability/\">high scalability and flexibility</a>.</p>\n<p><strong>2. Virtual Desktop Infrastructure (VDI)</strong></p>\n<p>Business resilience usually includes detailed planning and solutions to be implemented whenever an unexpected situation occurs, like a data breach. For this, companies use data centers, backups, and server virtualization. An example of this is the VDI. </p>\n<p>VDI makes sure that all the data is stored and accessed in the data center, not on the user’s device. This will eliminate the chances of <a href=\"https://www.loginradius.com/blog/identity/2019/01/how-do-i-know-if-my-email-has-been-leaked-in-a-data-breach/\">data being leaked</a> in case the device is stolen.</p>\n<p><strong>3. Ransomware protection</strong></p>\n<p>According to <a href=\"https://purplesec.us/resources/cyber-security-statistics/ransomware/\">Purplesec</a> 85% of security service providers, ransomware is one of the most common threats for small businesses. </p>\n<p>So, for ransomware protection and recovery as a part of business resilience during a data breach, you can make use of the following practices:</p>\n<ul>\n<li>Use a multi-faceted security solution</li>\n<li>Employ effective backup strategies like keeping a copy of the data </li>\n<li>Implement endpoint protection best practices and train the workforce to handle it </li>\n</ul>\n<p><strong>4. Personnel, training, and expertise</strong></p>\n<p>In the event of a data breach, the employees must have the required expertise for successfully executing the business resilience plans on time. </p>\n<p>To achieve this, there is a need for cross-training sections to be conducted. Some companies often choose to outsource all their IT operations to third-party service providers or consultants.</p>\n<p>But it is also important to have a good plan for survival, in case experts and trained personnel too are affected by the data breach disaster. </p>\n<p><strong>5. Creating a Disaster Recovery (DR) plan</strong></p>\n<p>During data breaches, businesses should come up with a plan to put the affected critical business systems back online as quickly as possible. This is important to avoid further damages. </p>\n<p>One of the best practices is to launch a secondary site as a stand-in for the primary data center.</p>\n<p>This Disaster Recovery (DR) site should have the following attributes:</p>\n<ul>\n<li>It should be geographically distant from the primary site</li>\n<li>Must have sufficient computing resources for handling\ncritical workload</li>\n<li>It should be easily manageable by the hosting provider. </li>\n</ul>\n<p>When a DR site is launched, the networking connectivity must be restored with the aid of IP address redirects or gateways. This way, the users can reconnect without changing their default settings. And it will be easier in the future to redirect them back to the primary data center when it is recovered.</p>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>A standard business resilience plan in the need of the hour. A recent study shows that the number of data breaches in 2020 almost doubled compared to that in 2019. The <a href=\"https://www.capita.com/sites/g/files/nginej146/files/2020-08/Ponemon-Global-Cost-of-Data-Breach-Study-2020.pdf\">average total cost of data breaches </a>in 2020 was $3.86 million. And it is expected to increase in the coming future too.</p>\n<p>So, it is important to implement fail-proof business resilience practices in your business to survive unexpected data breaches.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"LoginRadius Book a Demo\"\n        title=\"LoginRadius Book a Demo\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"February 18, 2021","updated_date":null,"description":"Business resilience can be defined as a business’ ability to quickly adapt and respond to impending risks or disruptions. More like a combination of crisis management and business continuity strategies post-disaster.","title":"5 Best Practices of Implementing Business Resilience during a Data Breach","tags":["data security","resiliency","cx"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.6666666666666667,"src":"/static/f8f90d1304e6635ec63f053831227e9f/14b42/business-resilience.jpg","srcSet":"/static/f8f90d1304e6635ec63f053831227e9f/f836f/business-resilience.jpg 200w,\n/static/f8f90d1304e6635ec63f053831227e9f/2244e/business-resilience.jpg 400w,\n/static/f8f90d1304e6635ec63f053831227e9f/14b42/business-resilience.jpg 800w,\n/static/f8f90d1304e6635ec63f053831227e9f/16310/business-resilience.jpg 1024w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},{"node":{"excerpt":"Introduction No matter what online platforms or applications you use, you are never fully protected against cyberattacks. Statistics provide…","fields":{"slug":"/identity/what-is-broken-authentication/"},"html":"<h2 id=\"introduction\" style=\"position:relative;\"><a href=\"#introduction\" aria-label=\"introduction permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Introduction</h2>\n<p>No matter what online platforms or applications you use, you are never fully protected against cyberattacks.</p>\n<p>Statistics provide testimony to this fact as the number of <a href=\"https://www.theweek.in/news/biz-tech/2020/11/17/india-sees-37-increase-in-data-breaches-cyber-attacks-this-year.html#:~:text=Data%20breaches%20have%20shown%20a,of%202020%20compared%20to%202019.&#x26;text=%E2%80%9CIn%20India%2C%20data%20breaches%20have,breaches%20are%20invariably%20not%20reported.\">data breaches rose by 37% in 2020 </a>compared to 2019, and the trend is only increasing. </p>\n<p>The first step to protect your organization against such attacks is to have a comprehensive understanding of the issue.</p>\n<p>Let us begin by figuring out what is broken authentication.</p>\n<p>Very simply put, when the hacker gains access into the system admin's account by using the online platform's vulnerabilities, particularly in two areas: credential management and session management, it's referred to as broken authentication.</p>\n<p>Authentication protects a consumer's identity by allowing only a verified user to enter into the system. But there are numerous ways through which the hacker impersonates the consumer and enters inside the system. </p>\n<p>The weaknesses inherent in the system, as mentioned above, can be divided into two different groups, namely poor credential management and poor session management.  </p>\n<h2 id=\"what-is-broken-authentication-and-session-management\" style=\"position:relative;\"><a href=\"#what-is-broken-authentication-and-session-management\" aria-label=\"what is broken authentication and session management permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is Broken Authentication and Session Management?</h2>\n<p>Broken Authentication and Session Management is a security vulnerability that occurs when the authentication and session management mechanisms of a web application are flawed or improperly implemented.</p>\n<p>Authentication refers to the process of verifying the identity of users, typically through usernames and passwords, while session management involves maintaining and controlling the user's session after authentication. </p>\n<p>When these mechanisms are compromised or misconfigured, attackers can exploit the vulnerabilities to gain unauthorized access to user accounts, impersonate other users, or hijack sessions. This can lead to severe security breaches and expose sensitive user information.</p>\n<h2 id=\"what-are-the-risks-of-broken-authentication\" style=\"position:relative;\"><a href=\"#what-are-the-risks-of-broken-authentication\" aria-label=\"what are the risks of broken authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What are the Risks of Broken Authentication?</h2>\n<p>The risks associated with broken authentication are profound and can have detrimental effects on individuals and organizations:</p>\n<h3 id=\"unauthorized-access-to-sensitive-information\" style=\"position:relative;\"><a href=\"#unauthorized-access-to-sensitive-information\" aria-label=\"unauthorized access to sensitive information permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Unauthorized Access to Sensitive Information</h3>\n<p>When attackers exploit broken authentication vulnerabilities, they can gain access to sensitive data such as personal information, financial details, or intellectual property. This unauthorized access can lead to data breaches and privacy violations.</p>\n<h3 id=\"manipulation-or-deletion-of-user-data\" style=\"position:relative;\"><a href=\"#manipulation-or-deletion-of-user-data\" aria-label=\"manipulation or deletion of user data permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Manipulation or Deletion of User Data</h3>\n<p>Once inside the system, attackers can manipulate or delete user data, causing disruptions to services, loss of important information, and potential legal ramifications.</p>\n<h3 id=\"impersonation-of-legitimate-users\" style=\"position:relative;\"><a href=\"#impersonation-of-legitimate-users\" aria-label=\"impersonation of legitimate users permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Impersonation of Legitimate Users</h3>\n<p>By hijacking user sessions or impersonating legitimate users, attackers can carry out fraudulent activities on behalf of the compromised accounts. This could include fraudulent transactions, spreading misinformation, or performing actions that tarnish the reputation of the affected individuals or organizations.</p>\n<h3 id=\"escalation-of-privileges\" style=\"position:relative;\"><a href=\"#escalation-of-privileges\" aria-label=\"escalation of privileges permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Escalation of Privileges</h3>\n<p>If the compromised account belongs to an administrator or privileged user, attackers can escalate their privileges within the application. This can lead to complete system compromise and greater control over critical functions.</p>\n<h3 id=\"financial-losses-and-legal-consequences\" style=\"position:relative;\"><a href=\"#financial-losses-and-legal-consequences\" aria-label=\"financial losses and legal consequences permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Financial Losses and Legal Consequences</h3>\n<p>The aftermath of a broken authentication attack can result in financial losses for businesses, especially if customer trust is compromised. Moreover, organizations may face legal consequences for failing to protect user data adequately.</p>\n<h2 id=\"how-to-prevent-broken-authentication\" style=\"position:relative;\"><a href=\"#how-to-prevent-broken-authentication\" aria-label=\"how to prevent broken authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How to Prevent Broken Authentication?</h2>\n<p>Preventing broken authentication requires a multifaceted approach that addresses vulnerabilities at various stages of the authentication and session management processes. Here are some effective strategies:</p>\n<h3 id=\"1-implement-multi-factor-authentication-mfa\" style=\"position:relative;\"><a href=\"#1-implement-multi-factor-authentication-mfa\" aria-label=\"1 implement multi factor authentication mfa permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. Implement Multi-Factor Authentication (MFA)</h3>\n<ul>\n<li>MFA adds an extra layer of security by requiring users to provide two or more forms of verification. This could include a one-time password (OTP) sent via email or SMS, a biometric scan, or a hardware token.</li>\n<li>MFA mitigates the risks of brute-force attacks, credential stuffing, and stolen credential reuse.</li>\n</ul>\n<h3 id=\"2-enforce-strong-password-policies\" style=\"position:relative;\"><a href=\"#2-enforce-strong-password-policies\" aria-label=\"2 enforce strong password policies permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. Enforce Strong Password Policies</h3>\n<ul>\n<li>Require users to create strong passwords that include a mix of lowercase and uppercase letters, numbers, and special characters.</li>\n<li>Follow industry standards such as NIST 800-63 B's guidelines for memorized secrets.</li>\n<li>Regularly educate users on the importance of creating unique and robust passwords.</li>\n</ul>\n<h3 id=\"3-limit-failed-login-attempts\" style=\"position:relative;\"><a href=\"#3-limit-failed-login-attempts\" aria-label=\"3 limit failed login attempts permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3. Limit Failed Login Attempts</h3>\n<ul>\n<li>Implement a system that locks out user accounts after a specified number of failed login attempts (e.g., 3 or 5).</li>\n<li>Notify system administrators of potential brute-force attacks or suspicious login activity.</li>\n</ul>\n<h3 id=\"4-secure-session-management\" style=\"position:relative;\"><a href=\"#4-secure-session-management\" aria-label=\"4 secure session management permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>4. Secure Session Management</h3>\n<ul>\n<li>Generate new, random session IDs with high entropy after each login.</li>\n<li>Ensure that session IDs are not exposed in URLs and are invalidated after users log out.</li>\n<li>Implement proper session expiration policies to prevent sessions from remaining active indefinitely.</li>\n</ul>\n<h3 id=\"5-secure-credential-management\" style=\"position:relative;\"><a href=\"#5-secure-credential-management\" aria-label=\"5 secure credential management permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>5. Secure Credential Management</h3>\n<ul>\n<li>Store user credentials securely using strong hashing algorithms such as bcrypt or Argon2.</li>\n<li>Avoid storing passwords in plain text or using weak encryption methods like base64.</li>\n<li>Implement salted hashing to make password cracking more challenging, even if multiple users have the same password.</li>\n</ul>\n<h3 id=\"6-regular-security-audits-and-updates\" style=\"position:relative;\"><a href=\"#6-regular-security-audits-and-updates\" aria-label=\"6 regular security audits and updates permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>6. Regular Security Audits and Updates</h3>\n<ul>\n<li>Conduct regular security audits to identify and address vulnerabilities in the authentication process.</li>\n<li>Stay up-to-date with security patches and updates for the web application and underlying frameworks.</li>\n</ul>\n<h2 id=\"what-are-some-examples-of-broken-authentication-vulnerability\" style=\"position:relative;\"><a href=\"#what-are-some-examples-of-broken-authentication-vulnerability\" aria-label=\"what are some examples of broken authentication vulnerability permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What are Some Examples of Broken Authentication Vulnerability?</h2>\n<p>There are several examples of broken authentication vulnerability that highlight the potential risks. One common example is weak or easily guessable passwords, such as \"123456\" or \"password,\" which can be exploited by attackers.</p>\n<p>Another example is the lack of proper session expiration, where user sessions remain active even after a user logs out, allowing an attacker to reuse the session and gain unauthorized access. </p>\n<p>Additionally, if an application does not implement measures to prevent brute-force attacks, attackers can repeatedly guess usernames and passwords until they find a valid combination. Inadequate protection against account lockouts, session hijacking, or session fixation are also examples of broken authentication vulnerabilities.</p>\n<h2 id=\"what-scenarios-can-cause-broken-authentication\" style=\"position:relative;\"><a href=\"#what-scenarios-can-cause-broken-authentication\" aria-label=\"what scenarios can cause broken authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What Scenarios Can Cause Broken Authentication?</h2>\n<p>As mentioned earlier, the primary reasons for broken authentication. Let’s understand them one by one.</p>\n<h3 id=\"1-poor-credential-management\" style=\"position:relative;\"><a href=\"#1-poor-credential-management\" aria-label=\"1 poor credential management permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. Poor credential management</h3>\n<p>Consumer credentials can be hijacked to gain access to the system. There are various ways that the hacker can steal critical information, such as the following:</p>\n<ul>\n<li><strong>Weak passwords</strong>: The consumer creates a weak password like '12345' or 'pass123'. The hacker can use various password cracking techniques like rainbow tables and dictionaries to gain access to the system.</li>\n<li><strong>Weak cryptography</strong>: Using weak encryption techniques like base64 and weak hashing algorithms like SHA1 and MD5 make credentials vulnerable. Which is why they must be stored using strong hashing algorithms that make password cracking challenging. </li>\n</ul>\n<h3 id=\"2-poor-session-management\" style=\"position:relative;\"><a href=\"#2-poor-session-management\" aria-label=\"2 poor session management permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. Poor session management</h3>\n<p>Let’s assume you like playing online games. You log in to the application and make several interactions with the network. </p>\n<p>The application issues a session ID whenever you log in and records all your interactions. It is through this ID that the application communicates with you and responds to all your requests. </p>\n<p>The <a href=\"https://owasp.org/www-project-top-ten/2017/A2_2017-Broken_Authentication\">OWASP broken authentication</a> recommendations state that this session ID is equivalent to your original login credentials. If hackers steal your session ID, they can sign in by impersonating your identity. This is known as session hijacking.  </p>\n<p>The following points list the scenarios that can cause broken authentication.</p>\n<ul>\n<li>Weak usernames and passwords.</li>\n<li>Session fixation attacks.</li>\n<li>URL rewriting.</li>\n<li>Consumer identity details aren't protected when stored.</li>\n<li>Consumer identity details are transferred over unencrypted connections.</li>\n</ul>\n<h2 id=\"what-is-the-impact-of-broken-authentication-and-session-management\" style=\"position:relative;\"><a href=\"#what-is-the-impact-of-broken-authentication-and-session-management\" aria-label=\"what is the impact of broken authentication and session management permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is the Impact of Broken Authentication and Session Management?</h2>\n<p>If a hacker successfully logs in by stealing your credentials using any of the above mentioned broken authentication techniques, they can misuse your privileges and impact your company's sustainability. </p>\n<p>Cybercriminals can have various intentions of <a href=\"https://www.loginradius.com/blog/identity/2021/01/7-web-app-sec-threats/\">hijacking your web application</a>, such as:</p>\n<ul>\n<li>Stealing critical business data</li>\n<li>Identity theft</li>\n<li>Sending fraud calls or emails.</li>\n<li>Creating malicious software programs for disrupting networks.</li>\n<li>Cyber terrorism</li>\n<li>Cyberstalking</li>\n<li>Selling illegal items on the dark web</li>\n<li>Sharing fake news on social media</li>\n</ul>\n<p>In short, hackers can use broken authentication attacks and session hijacking to gain access to the system by forging session data, such as cookies, and stealing login credentials. </p>\n<p>Thus, it would be best if you never compromised with your web applications' security. </p>\n<h3 id=\"a-few-examples-of-broken-authentication\" style=\"position:relative;\"><a href=\"#a-few-examples-of-broken-authentication\" aria-label=\"a few examples of broken authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>A Few Examples of Broken Authentication</h3>\n<p>Here are a few examples of broken authentication.</p>\n<h4 id=\"example-1-credential-stuffing\" style=\"position:relative;\"><a href=\"#example-1-credential-stuffing\" aria-label=\"example 1 credential stuffing permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Example 1: Credential Stuffing</h4>\n<p>Suppose you run a departmental store and sell groceries. To grow your business rapidly, you implement a CRM system that stores critical customer data, such as name, phone number, username, and password. </p>\n<p>Hackers make their way inside the CRM system and steal all the data. They then use the same credentials — usernames and passwords — to hack into the central bank's database. </p>\n<p>In this case, hackers are trying to successfully log in to the central bank's database by hoping that a handful of consumers must be using the same credentials at both places. Such kinds of broken authentication attacks are called <a href=\"https://www.loginradius.com/blog/identity/2019/09/prevent-credential-stuffing-attacks/\">credential stuffing</a>.</p>\n<h4 id=\"example-2-application-session-timeouts-arent-set-properly\" style=\"position:relative;\"><a href=\"#example-2-application-session-timeouts-arent-set-properly\" aria-label=\"example 2 application session timeouts arent set properly permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Example 2: Application session timeouts aren't set properly.</h4>\n<p>Suppose you go to a cyber cafe and login your Gmail account. After sending the email, you close the browser tab and return home. </p>\n<p>Sometime later, the hacker opens your Gmail account and gains access to your crucial information. It happens because your credentials — username and password — haven't been invalidated adequately during logout. </p>\n<p>Thus, if the application session timeouts aren't set properly, hackers can execute a broken authentication attack.</p>\n<p><a href=\"https://www.loginradius.com/resource/ebook/buyers-guide-to-multi-factor-authentication/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"buyer-guide-to-multi-factor-authentication-ebook\"\n        title=\"buyer-guide-to-multi-factor-authentication-ebook\"\n        src=\"/static/dce0b5caab393383c0c906c5653faa64/e5715/buyer-guide-to-multi-factor-authentication-ebook.png\"\n        srcset=\"/static/dce0b5caab393383c0c906c5653faa64/a6d36/buyer-guide-to-multi-factor-authentication-ebook.png 650w,\n/static/dce0b5caab393383c0c906c5653faa64/e5715/buyer-guide-to-multi-factor-authentication-ebook.png 768w,\n/static/dce0b5caab393383c0c906c5653faa64/63ff0/buyer-guide-to-multi-factor-authentication-ebook.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<h4 id=\"example-3-passwords-are-not-properly-hashed-and-salted\" style=\"position:relative;\"><a href=\"#example-3-passwords-are-not-properly-hashed-and-salted\" aria-label=\"example 3 passwords are not properly hashed and salted permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Example 3: Passwords are not properly hashed and salted.</h4>\n<p>Look at the names and their hashes in the following table:</p>\n<table>\n  <tr>\n   <td>Alice\n   </td>\n   <td>4420d1918bbcf7686defdf9560bb5087d20076de5f77b7cb4c3b40bf46ec428b\n   </td>\n  </tr>\n  <tr>\n   <td>Bob\n   </td>\n   <td>4420d1918bbcf7686defdf9560bb5087d20076de5f77b7cb4c3b40bf46ec428b\n   </td>\n  </tr>\n  <tr>\n   <td>Mike\n   </td>\n   <td>77b177de23f81d37b5b4495046b227befa4546db63cfe6fe541fc4c3cd216eb9\n   </td>\n  </tr>\n</table>\n<p>The hash function stores passwords in the form of a hash instead of plain text, which humans can easily read. But if two different users enter the same password, then their hashes will be exactly the same. </p>\n<p>Hackers can perform a dictionary attack and if they crack one password, they can use the same password for gaining access to other accounts that use the same hash. </p>\n<p>To prevent this from happening, you must salt the passwords. A salt is a random value that is either appended or prepended to the password and makes it unique. So even if two different users use the same password, their hashes will not be the same. </p>\n<h2 id=\"how-to-prevent-broken-authentication-1\" style=\"position:relative;\"><a href=\"#how-to-prevent-broken-authentication-1\" aria-label=\"how to prevent broken authentication 1 permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How to Prevent Broken Authentication?</h2>\n<p>The following are the ways of preventing broken authentication attacks:</p>\n<ol>\n<li>Implement <a href=\"https://www.loginradius.com/blog/identity/2019/06/what-is-multi-factor-authentication/\">multi-factor authentication (MFA) </a>to verify the consumer's identity. Examples include One-Time Password (OTP) messaged or emailed to the user. This step will prevent brute force attacks, credential stuffing, and stolen credential reuse attacks.</li>\n<li>Use weak-password checks by forcing users to include a mix of small letters, capital letters, alphanumeric symbols, and special characters while creating passwords. It would be best to follow <a href=\"https://pages.nist.gov/800-63-3/sp800-63b.html\">NIST 800-63 B's guidelines</a> in section 5.1.1 for memorized secrets.</li>\n<li>Place a limit on failed login attempts to 3 or a maximum of 5. Alert the system admin if you detect an attack — brute force, credential stuffing, or any other attack.</li>\n<li>Ensure that credential recovery, registration, and API pathways are not vulnerable to account enumeration attacks by using the same message for each outcome. </li>\n<li>Generating new random session IDs with high entropy after <a href=\"https://www.loginradius.com/blog/identity/2020/12/login-security/\">login protects against hackers</a>. Remember, those session IDs should not be present in the URL and invalidated after logout.</li>\n</ol>\n<h2 id=\"impact-of-broken-authentication\" style=\"position:relative;\"><a href=\"#impact-of-broken-authentication\" aria-label=\"impact of broken authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Impact of Broken Authentication</h2>\n<p>The impact of broken authentication can be severe and far-reaching. When attackers successfully exploit these vulnerabilities, they can gain unauthorized access to user accounts, leading to various consequences. </p>\n<p>This may include unauthorized access to sensitive information, such as personal data, financial details, or intellectual property. Attackers can also manipulate or delete user data, impersonate legitimate users, perform fraudulent transactions, or even escalate their privileges within the application.</p>\n<p>Furthermore, if the compromised account belongs to an administrator or privileged user, the impact can be even more significant, potentially compromising the entire system or network. Broken authentication vulnerabilities can tarnish an organization's reputation, result in financial losses, and expose users to identity theft and other cybercrimes.</p>\n<h2 id=\"how-loginradius-protects-against-broken-authentication\" style=\"position:relative;\"><a href=\"#how-loginradius-protects-against-broken-authentication\" aria-label=\"how loginradius protects against broken authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How LoginRadius Protects Against Broken Authentication?</h2>\n<p>LoginRadius has been at the forefront of offering a multilevel security web app environment. Here is how LoginRadius applications protect against broken authentication:</p>\n<ul>\n<li>End-to-end SSL encryption for data in transit and ensures protection against unauthorized access. </li>\n<li>Multi-factor authentication to eliminate the risk of being exposed to attacks.</li>\n<li>One-way hashing of passwords considerably improves consumer security.</li>\n<li>Single sign-on (SSO) solution allows users to use the same profile to log in everywhere.</li>\n</ul>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>Apart from the steps mentioned in this article, it's essential to train and educate your employees about broken authentication attacks. It would be best if you also employed <a href=\"https://www.loginradius.com/blog/identity/2019/10/cybersecurity-best-practices-for-enterprises/\">top-notch cybersecurity measures</a> to protect your company's database from session hijacking, credential stuffing, and other broken authentication attacks. </p>\n<h2 id=\"faqs\" style=\"position:relative;\"><a href=\"#faqs\" aria-label=\"faqs permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>FAQs</h2>\n<p><strong>1. What are the solutions for broken authentication?</strong></p>\n<p> Solutions include implementing Multi-Factor Authentication (MFA), enforcing strong password policies, limiting failed login attempts, securing session management, and regular security audits.</p>\n<p><strong>2.  What is broken access authentication?</strong></p>\n<p> Broken access authentication refers to vulnerabilities in the authentication process that allow unauthorized access to user accounts, often due to flawed or improperly implemented authentication mechanisms.</p>\n<p><strong>3. What can prevent authentication failures?</strong></p>\n<p>Preventative measures include MFA implementation, enforcing strong password policies, limiting failed login attempts, securing session management, and using secure hashing algorithms.</p>\n<p><strong>4. What is a broken authentication guessable password?</strong></p>\n<p>It refers to weak or easily guessed passwords like \"123456\" or \"password,\" which are vulnerable to exploitation by attackers, leading to compromised accounts.</p>\n<p><strong>5. What are the risks of broken authentication?</strong></p>\n<p>Risks include unauthorized access to sensitive data, manipulation or deletion of user data, impersonation of legitimate users, escalation of privileges, financial losses, and legal consequences.</p>\n<p><strong>6. What are the effects of broken authentication attacks?</strong></p>\n<p>Effects include data breaches, privacy violations, fraudulent activities on compromised accounts, tarnished reputation for individuals or organizations, financial losses, and potential legal ramifications.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"LoginRadius Book a Demo\"\n        title=\"LoginRadius Book a Demo\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"February 17, 2021","updated_date":null,"description":"If a hacker successfully logs with stolen credentials, they can misuse your privileges and impact your company's sustainability. Authentication protects a consumer's identity by allowing only a verified user to enter into the system. But there are numerous ways through which a hacker can impersonate consumers and enter inside the system.","title":"What is Broken Authentication Vulnerability and How to Prevent It?","tags":["broken authentication","mfa","data security"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5037593984962405,"src":"/static/0005ff61c9196311b738904dc2cef6f2/33aa5/broken-auth.jpg","srcSet":"/static/0005ff61c9196311b738904dc2cef6f2/f836f/broken-auth.jpg 200w,\n/static/0005ff61c9196311b738904dc2cef6f2/2244e/broken-auth.jpg 400w,\n/static/0005ff61c9196311b738904dc2cef6f2/33aa5/broken-auth.jpg 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},{"node":{"excerpt":"No matter what your application is for, it is a must to have ease of use, frictionless authentication, and guaranteed security (against…","fields":{"slug":"/identity/biometric-authentication-mobile-apps/"},"html":"<p>No matter what your application is for, it is a must to have ease of use, frictionless authentication, and guaranteed security (against fraud protection and password-related attacks). These variables help you to build both a spectacular first impression and long-lasting confidence.</p>\n<p>When <a href=\"https://www.loginradius.com/blog/identity/2020/11/authentication-sso-native-mobile-apps/\">using mobile apps</a>, consumers prefer to open it and quickly start using it. It can be a frustrating experience for them if you keep asking for the account password every time they open the app. But then, it is also a business necessity to ensure safe access to the app.</p>\n<p>So, how do you offer a great experience and security at the same time? </p>\n<p>The LoginRadius Mobile Biometric Authentication can help. The feature is dedicated to mobile apps and allows consumers to use their mobile devices' FaceID and TouchID for authentication. </p>\n<h2 id=\"intend-behind-the-launch\" style=\"position:relative;\"><a href=\"#intend-behind-the-launch\" aria-label=\"intend behind the launch permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Intend Behind the Launch</h2>\n<p>With Mobile Biometric Authentication, consumers can use their existing FaceID or TouchID for authentication without any additional effort.</p>\n<p>Also, consumers' biometric data remains stored on their phone rather than the server, making it even more secure. </p>\n<p>Let's underline some of the major benefits of Mobile Biometric Authentication.</p>\n<ul>\n<li>Since biometric data cannot be hacked or duplicated, the feature protects consumers against <a href=\"https://www.loginradius.com/blog/identity/2020/04/corporate-account-takeover-attacks/\">account takeover attacks</a>. </li>\n<li>It ranks high on the usability quotient as consumers need not remember or enter a new password or PIN. Also, consumers don’t need to worry about resetting their credentials since there is no use case of forgetting one’s biometric credentials like fingerprint or face. </li>\n<li>Consumers have already been authenticating themselves using Face ID and Touch ID on their Android and iOS devices.  Thus, they are already familiar with the method. </li>\n<li>For biometric authentication, physical proximity is required if hackers want to bypass the login process. Cybercriminals coming into the physical proximity of the actual consumer is rare. </li>\n</ul>\n<p><a href=\"https://www.loginradius.com/resource/mobile-biometric-authentication-datasheet\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"biometric-authentication-mobile-apps-datasheet\"\n        title=\"biometric-authentication-mobile-apps-datasheet\"\n        src=\"/static/d1f32469ba553b6ae755ec4d290551ad/e5715/biometric-authentication-mobile-apps-datasheet.png\"\n        srcset=\"/static/d1f32469ba553b6ae755ec4d290551ad/a6d36/biometric-authentication-mobile-apps-datasheet.png 650w,\n/static/d1f32469ba553b6ae755ec4d290551ad/e5715/biometric-authentication-mobile-apps-datasheet.png 768w,\n/static/d1f32469ba553b6ae755ec4d290551ad/63ff0/biometric-authentication-mobile-apps-datasheet.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<h2 id=\"key-features-offered-by-loginradius\" style=\"position:relative;\"><a href=\"#key-features-offered-by-loginradius\" aria-label=\"key features offered by loginradius permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Key Features Offered by LoginRadius</h2>\n<p>LoginRadius offers local authentication with Touch ID and Face ID for Android and iOS devices—provided the consumers' mobile devices also support these features.</p>\n<ul>\n<li><strong>Touch ID:</strong> This feature lets you authenticate consumers using their Fingerprint. Consumers can use fingerprints that are the same as already set for their Android or iOS mobile devices without having to go through the entire setup process on your app. </li>\n<li><strong>Face ID:</strong> This feature lets you authenticate consumers using their Face. Similar to Touch ID, the Face ID remains the same as already set for the consumer's Android or iOS mobile device. They need not go through the Face ID setup process on your app as well. </li>\n</ul>\n<p>You can configure both authentication options for your app and later, ask the consumer to choose according to their preference or the option available with their device. </p>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>The Mobile Biometric Authentication by LoginRadius is a local authentication concept and consumers' biometric data don't even leave their mobile devices. Hence, as a business, you don't need to worry about storing, processing, and securing your consumer's biometric data. </p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"LoginRadius Book a Demo\"\n        title=\"LoginRadius Book a Demo\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"February 16, 2021","updated_date":null,"description":"The LoginRadius Mobile Biometric Authentication feature is dedicated to mobile applications and enables users to use the FaceID and TouchID of their mobile devices for authentication purposes.","title":"Announcement - LoginRadius Introduces Convenient and Secure Biometric Authentication for Mobile Apps","tags":["biometric authentication","cx","ciam solution"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.408450704225352,"src":"/static/90e4c9c37fb9a00a11e09a359f1b77dd/6051d/biometric-authentication-mobile-apps.png","srcSet":"/static/90e4c9c37fb9a00a11e09a359f1b77dd/69585/biometric-authentication-mobile-apps.png 200w,\n/static/90e4c9c37fb9a00a11e09a359f1b77dd/497c6/biometric-authentication-mobile-apps.png 400w,\n/static/90e4c9c37fb9a00a11e09a359f1b77dd/6051d/biometric-authentication-mobile-apps.png 769w","sizes":"(max-width: 769px) 100vw, 769px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},{"node":{"excerpt":"Cloud security consists of controls, processes, technologies, and policies combined to protect the cloud-based systems, infrastructure, and…","fields":{"slug":"/identity/strategies-secure-cloud-operations/"},"html":"<p>Cloud security consists of controls, processes, technologies, and policies combined to protect the cloud-based systems, infrastructure, and data. Cloud Security is called a subdomain of computer security and, more predominantly, information security. </p>\n<p>All strategies are implemented to protect data, adhere to regulatory compliances, and protect consumers' privacy. The aim is to protect businesses from financial, legal, and reputational hassles of data loss and data breaches.</p>\n<p>In this article, we'll discuss a few strategies needed to secure your cloud operations from cyber threats.</p>\n<h2 id=\"what-is-cloud-security\" style=\"position:relative;\"><a href=\"#what-is-cloud-security\" aria-label=\"what is cloud security permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is Cloud Security</h2>\n<p>Cloud security is one of the best practices by IT experts designed to prevent unauthorized access to applications and keep data secure in the cloud. It deals with the technology and procedures that secure your cloud operations against internal and external cybersecurity threats. </p>\n<p>According to<a href=\"https://www.grandviewresearch.com/industry-analysis/cyber-security-market\"> Grand View Research</a>, the global cybersecurity market size was valued at US$156.5 billion in 2019 and is expected to increase at a CAGR (compound annual growth rate) of 10.0% from 2020 through 2027.</p>\n<h2 id=\"how-to-improve-cloud-security\" style=\"position:relative;\"><a href=\"#how-to-improve-cloud-security\" aria-label=\"how to improve cloud security permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How to Improve Cloud Security</h2>\n<p>One of the most important steps for successful cloud operations is to keep your cloud environment safe and secure. Generally, businesses are eager to adopt cloud solutions, but the primary factor that keeps enterprises on their toes is their security issues. </p>\n<p>Every business has a huge amount of sensitive data on the cloud. We have listed a few strategies on how you can improve and secure your cloud operations using the best policies and tools: </p>\n<h3 id=\"1-real-time-monitoring\" style=\"position:relative;\"><a href=\"#1-real-time-monitoring\" aria-label=\"1 real time monitoring permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. Real-time monitoring</h3>\n<p>Real-time monitoring permits IT admins to monitor any suspicious threats that may arise on the site in real-time. According to IBM, the global average <a href=\"https://www.ibm.com/security/digital-assets/cost-data-breach-report/#/\">total cost of a data breach</a> in 2020 was $3.45M. </p>\n<p>Considering the magnitude of these losses, you must secure your network from cyber-attacks using real-time monitoring in the cloud. It gives you total visibility into your network systems and helps you understand your security better.</p>\n<h3 id=\"2-multi-factor-authentication-mfa\" style=\"position:relative;\"><a href=\"#2-multi-factor-authentication-mfa\" aria-label=\"2 multi factor authentication mfa permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. Multi-Factor Authentication (MFA)</h3>\n<p>Using a traditional username and a password is not sufficient for protecting consumer accounts from hackers. One of the main ways hackers get access to your online business data and applications is through the stolen credentials.</p>\n<p>The most effective security method to keep the hackers at bay and prevent them from accessing your cloud application is through MFA (Multi-Factor Authentication). Hackers can hardly move past the second layer of security. This can prevent <a href=\"https://www.microsoft.com/security/blog/2019/08/20/one-simple-action-you-can-take-to-prevent-99-9-percent-of-account-attacks/#:~:text=By%20providing%20an%20extra%20barrier,be%20enough%20to%20gain%20access.\">99.9% of account compromise attacks</a> and avoid a data breach.</p>\n<h3 id=\"3-identity-and-access-management\" style=\"position:relative;\"><a href=\"#3-identity-and-access-management\" aria-label=\"3 identity and access management permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3. Identity and Access Management</h3>\n<p>Data that is not stored in the private server or unprotected data can be prone to large-scale data breaches and may lead to financial losses, reputation damage, and expose sensitive client information. </p>\n<p>You need to set proper levels of authorization by using an IAM (identity and access management). Assigning access control not only prevents an employee from accidentally editing information that they are not authorized to access, but also protects the businesses from hackers.</p>\n<h3 id=\"4-cloud-to-cloud-backup-solutions\" style=\"position:relative;\"><a href=\"#4-cloud-to-cloud-backup-solutions\" aria-label=\"4 cloud to cloud backup solutions permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>4. Cloud-to-cloud backup solutions</h3>\n<p>You could lose data because of the cloud provider's mistake. Therefore, having a cloud-to-cloud backup solution always helps. Backup solutions are a must for organizations that depend on software-as-a-service (SaaS) applications such as Box, Microsoft Office 365, and Zendesk. </p>\n<p>Organizations using SaaS applications as well as a cloud-to-cloud backup are on the rise. This technology offers advanced data protection above the basics provided by SaaS applications.</p>\n<h3 id=\"5-create-a-systematic-off-boarding-process\" style=\"position:relative;\"><a href=\"#5-create-a-systematic-off-boarding-process\" aria-label=\"5 create a systematic off boarding process permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>5. Create a systematic off-boarding process</h3>\n<p>According to a <a href=\"https://arstechnica.com/information-technology/2008/09/the-bofh-lives-88-of-it-workers-would-steal-data-if-fired/\">survey conducted by Cyberark,</a> \"88% of IT workers would take sensitive data with them or abscond with company passwords if they were fired\". In <a href=\"https://www.darkreading.com/vulnerabilities---threats/50--of-ex-employees-can-still-access-corporate-apps/d/d-id/1329672\">another survey</a>, it was found that \"50% of ex-employees can still access corporate apps.\"  </p>\n<p>Make sure you deprovision your employees when they leave the company. Make sure that they can no longer access your systems, data, cloud storage, intellectual properties, and consumer information. </p>\n<p>You need to have a systematic off-boarding process and make sure all the departing employee's access rights are revoked immediately.</p>\n<h3 id=\"6-offering-anti-phishing-training\" style=\"position:relative;\"><a href=\"#6-offering-anti-phishing-training\" aria-label=\"6 offering anti phishing training permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>6. Offering anti-phishing training</h3>\n<p>Verizon's <a href=\"https://enterprise.verizon.com/resources/reports/dbir/\">2019 Data Breach Investigations Report</a> shows that 32% of the data breaches in 2018 involved phishing activities. Further, \"phishing was present in 78% of Cyber-Espionage incidents and the installation and use of backdoors.\" </p>\n<p>Hackers can gain access to securing information by stealing the employee's login credentials or by using social engineering techniques like fake websites, phishing, and duplicate social media accounts. </p>\n<p>Offering anti-phishing training can prevent employees from falling victim to these scams without compromising your company's sensitive data.</p>\n<h2 id=\"how-secure-is-cloud-computing\" style=\"position:relative;\"><a href=\"#how-secure-is-cloud-computing\" aria-label=\"how secure is cloud computing permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How Secure is Cloud Computing</h2>\n<p>Security breaches are not caused by weak cloud data security; instead, they are caused by human errors. </p>\n<p>Accidental deletions, stolen login credentials, dissatisfied employees, unsecured Wi-Fi connections, and employee mishaps are some of the reasons that your cloud data might be at risk. </p>\n<p>Mass adoption of cloud technology with ever-increasing sophistication and volume can pave the way for cyber threats that drive the need to implement cybersecurity. </p>\n<p><a href=\"https://www.loginradius.com/resource/cloud-security-system-sase-whitepaper\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"Future-proof-your-security\"\n        title=\"Future-proof-your-security\"\n        src=\"/static/a164480ea3177cb0422ee6104202f8b3/e5715/Future-proof-your-security.png\"\n        srcset=\"/static/a164480ea3177cb0422ee6104202f8b3/a6d36/Future-proof-your-security.png 650w,\n/static/a164480ea3177cb0422ee6104202f8b3/e5715/Future-proof-your-security.png 768w,\n/static/a164480ea3177cb0422ee6104202f8b3/63ff0/Future-proof-your-security.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<p>Here a few tips about how you can improvise on the security of data on the cloud –</p>\n<ol>\n<li>Enforcing reliable passwords</li>\n<li>Using encryption</li>\n<li>Testing your security continuously</li>\n<li>Ensuring local backup</li>\n<li>Additional security measures</li>\n<li>Avoiding storage of sensitive data</li>\n</ol>\n<h2 id=\"why-is-cloud-security-important\" style=\"position:relative;\"><a href=\"#why-is-cloud-security-important\" aria-label=\"why is cloud security important permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Why is Cloud Security Important</h2>\n<p>Organizations migrate their sensitive data and applications to the cloud to protect highly sensitive business data from hackers. </p>\n<p>Here are a few more reasons that elaborate on the fundamentals of cloud security: </p>\n<h3 id=\"control-access\" style=\"position:relative;\"><a href=\"#control-access\" aria-label=\"control access permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Control access</h3>\n<p>Access control in cloud security enables an organization to monitor and regulate access or permissions of the company's data. It is done by formulating policies that the organization chooses. </p>\n<p>Similarly, access control in cloud security helps organizations gain macro-level visibility into their user behavior and data. Cloud management and configuration tools offer end users strong role-based access, flexibility, and autonomy. </p>\n<h3 id=\"encrypting-sensitive-data\" style=\"position:relative;\"><a href=\"#encrypting-sensitive-data\" aria-label=\"encrypting sensitive data permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Encrypting sensitive data</h3>\n<p>Data spillage and data breaches are inevitable; you can protect the data through techniques using encryption. </p>\n<p>You can use multiple keys to minimize the impact of compromised keys. These keys should regularly rotate with a strong access and control policy.</p>\n<h3 id=\"using-automation\" style=\"position:relative;\"><a href=\"#using-automation\" aria-label=\"using automation permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Using automation</h3>\n<p>You can use automation to minimize human errors and misconfiguration. According to<a href=\"https://www.gartner.com/smarterwithgartner/is-the-cloud-secure/\"> Gartner's research</a>, \"Through 2025, 99% of cloud security failures will be the customer's fault\". </p>\n<p>Using automation with audited and pretested configurations makes sure that the infrastructure is configured and deployed the right way. </p>\n<p>Several IT organizations use cloud automation tools that run along with the virtualized environment. It is used to streamline repetitive tasks like defining everyday configuration items, provisioning virtual resources, and establishing infrastructure as code.</p>\n<h3 id=\"extend-vulnerability-management-tools\" style=\"position:relative;\"><a href=\"#extend-vulnerability-management-tools\" aria-label=\"extend vulnerability management tools permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Extend vulnerability management tools</h3>\n<p>Vulnerability management tools are security applications that scan the organization's networks to identify threats or weaknesses that intruders can exploit. These tools are designed for managing attacks on the network. </p>\n<p>When a scan identifies a threat on the network, this software suggests remedies, action, thereby minimizing the prospect of network attack. </p>\n<p>Compared with conventional firewalls, anti-spy software or antivirus, intrusion detection systems, vulnerability management tools search for potential threats and fix them to mitigate future attacks.</p>\n<h3 id=\"implementing-enhancements\" style=\"position:relative;\"><a href=\"#implementing-enhancements\" aria-label=\"implementing enhancements permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Implementing enhancements</h3>\n<p>According to <a href=\"https://www.mcafee.com/enterprise/en-us/assets/reports/restricted/rp-cloud-adoption-risk.pdf\">McAfee's Cloud Adoption and Risk Report 2019</a>, \"among all the files hosted on the cloud, 21% have sensitive data included in them\". You can implement enhancements throughout the entire operations life cycle. </p>\n<p>In the beginning, only initial implementation takes place. When the apps are introduced to the public, the team should make continual enhancements throughout the journey to safeguard against threats.</p>\n<h3 id=\"deploying-multi-factor-authentication-mfa\" style=\"position:relative;\"><a href=\"#deploying-multi-factor-authentication-mfa\" aria-label=\"deploying multi factor authentication mfa permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Deploying multi-factor authentication (MFA)</h3>\n<p>MFA (Multi-factor Authentication) has rapidly gained adoption to increase the security and authentication for enterprise web and mobile applications. </p>\n<p>As per recent statistics, 63% of data breaches are connected with reused or weak passwords due to ineffective strategies used by several organizations. </p>\n<p>Deploying MFA (Multi-factor Authentication) is considered the cheapest and the most effective security control to protect your business from hackers trying to access your cloud applications. </p>\n<p>By protecting your cloud users with multi-factor authentication, only authorized personnel will be given permission to access cloud apps and your sensitive business data.</p>\n<h2 id=\"why-should-businesses-rely-completely-on-the-loginradius-cloud-iam-solution\" style=\"position:relative;\"><a href=\"#why-should-businesses-rely-completely-on-the-loginradius-cloud-iam-solution\" aria-label=\"why should businesses rely completely on the loginradius cloud iam solution permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Why Should Businesses Rely Completely on the LoginRadius Cloud IAM Solution</h2>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 60.61538461538461%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAMCAYAAABiDJ37AAAACXBIWXMAAAsSAAALEgHS3X78AAABxUlEQVQoz3VTXW/aQBD0S+w7mqJSlKjJW9UQvgymTSMUUgiG4GBUNYrU//9XpjN7YOEkfTidb/dudnZmHbnOPTyXG64RD9ZIBiu40Qau9xDi17+qdTjbznw81H0u7v56DmFFAewRbpCjleb40JsjvmIs3YNezQzgGCxh/DTb4svPEhdczRFBed8zH3lVYpWzjGuysQutdAnfnYdCzKuY01mAXCf9ld3rLF7w9f6Z31vEXRZndwGwn+Pi5onsFmikj2hPnwm4qJg75g/sVEgEPg2X6OZ/0fyxQ5wWEI5ki8RAGnxkq+1JgSQrcTIuA4i0sXZndf1YqNF/QHu0QmNSIhlvqXvBbhYE7AS9ElJ23+6sku8vgzHjpzdg0tTRgCTbmZbOTCxs95UpclEmkJETmFoVQwMuTD8Bh1hgbuyV13k/EQZYVdYDVaz0moWYzFAHBJboDYJIFkeNX0+AM5ePDhWwzgJXjI+S3hLNCcfkdofz6R+cfS9s/g6Ax++jd4dWrIxpaDUmYCvb4LPcv32x+RPjIFFeex/5/Wz5Gst6VbnnOE7nNyUup79xSsM0Gaa72v8fYM3NV3+HDEoOv9pgfZSf1+79A0+UWu0/+cICAAAAAElFTkSuQmCC'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"how-to-secure-cloud-operations\"\n        title=\"how-to-secure-cloud-operations\"\n        src=\"/static/3e5ccdcd6cdd979324e9d5e15b87b49b/e5715/how-to-secure-cloud-operations.png\"\n        srcset=\"/static/3e5ccdcd6cdd979324e9d5e15b87b49b/a6d36/how-to-secure-cloud-operations.png 650w,\n/static/3e5ccdcd6cdd979324e9d5e15b87b49b/e5715/how-to-secure-cloud-operations.png 768w,\n/static/3e5ccdcd6cdd979324e9d5e15b87b49b/2bef9/how-to-secure-cloud-operations.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>If you intend to build a Cloud IAM solution either in-house or through a third-party service on your servers, then you should be aware of its limitations too.  There is a time-consuming factor in hardware, software, security, and privacy. </p>\n<p>In comparison, LoginRadius takes care of upgrades, maintenance, data management, infrastructure management, compliance, security, and privacy. </p>\n<p>With the LoginRadius cloud infrastructure, you can automatically scale to accommodate the changing data storage requirements, peak loads, consumer authentication, account creation, the addition of new applications, and more. </p>\n<h2 id=\"final-words\" style=\"position:relative;\"><a href=\"#final-words\" aria-label=\"final words permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Final Words</h2>\n<p>There is no doubt that cloud computing is the future. And it would be best if you secure your cloud operations now! </p>\n<p>You need to think more carefully regarding the cloud security controls to ensure total security. Using the best industry practices and managing your cloud services will help you secure your cloud operations, thereby protecting sensitive data. </p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-free-demo-loginradius\"\n        title=\"book-a-free-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"February 12, 2021","updated_date":null,"description":"One of the most important steps for successful cloud operations is to keep your cloud environment safe and secure. Generally, businesses are eager to adopt cloud solutions, but the primary factor that keeps enterprises on their toes is their security issues. In this article, we'll discuss a few strategies needed to secure your cloud operations from cyber threats.","title":"6 Strategies to Secure Your Cloud Operations Against Today's Cyber Threats","tags":["cloud security","cybersecurity","cx"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5267175572519085,"src":"/static/4469466137709e994573ad258b698484/14b42/secure-cloud.jpg","srcSet":"/static/4469466137709e994573ad258b698484/f836f/secure-cloud.jpg 200w,\n/static/4469466137709e994573ad258b698484/2244e/secure-cloud.jpg 400w,\n/static/4469466137709e994573ad258b698484/14b42/secure-cloud.jpg 800w,\n/static/4469466137709e994573ad258b698484/16310/secure-cloud.jpg 1024w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}}]},"markdownRemark":{"excerpt":"Identity is evolving, and developers are at the forefront of this transformation. Every day brings a new learning—adapting to new standards…","fields":{"slug":"/identity/developer-first-identity-provider-loginradius/"},"html":"<p>Identity is evolving, and developers are at the forefront of this transformation. Every day brings a new learning—adapting to new standards and refining approaches to building secure, seamless experiences.</p>\n<p>We’re here to support developers on that journey. We know how important simplicity, efficiency, and well-structured documentation are when working with identity and access management solutions. That’s why we’ve redesigned the <a href=\"https://www.loginradius.com/\">LoginRadius website</a>—to be faster, more intuitive, and developer-first in every way.</p>\n<p>The goal? Having them spend less time searching and more time building.</p>\n<h2 id=\"whats-new-and-improved-on-the-loginradius-website\" style=\"position:relative;\"><a href=\"#whats-new-and-improved-on-the-loginradius-website\" aria-label=\"whats new and improved on the loginradius website permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What’s New and Improved on the LoginRadius Website?</h2>\n<p>LoginRadius’ vision is to give developers a product that simplifies identity management so they can focus on building, deploying, and scaling their applications. To enhance this experience, we’ve spent the last few months redesigning our interface— making navigation more intuitive and reassuring that essential resources are easily accessible.</p>\n<p>Here’s a closer look at what’s new and why it’s important:</p>\n<h3 id=\"a-developer-friendly-dark-theme\" style=\"position:relative;\"><a href=\"#a-developer-friendly-dark-theme\" aria-label=\"a developer friendly dark theme permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>A Developer-Friendly Dark Theme</h3>\n<p><img src=\"/f46881583c7518a93bb24e94c32320de/a-developer-friendly-dark-theme.webp\" alt=\"This image shows how LoginRadius offers several authentication methods like traditional login, social login, passwordless login, passkeys and more in a dark mode.\">    </p>\n<p>Developers spend long hours working in dark-themed IDEs and terminals, so we’ve designed the LoginRadius experience to be developer-friendly and align with that preference.</p>\n<p>The new dark mode reduces eye strain, enhances readability, and provides a seamless transition between a coding environment and our platform. Our new design features a clean, modern aesthetic with a consistent color scheme and Barlow typography, ensuring better readability. High-quality graphics and icons are thoughtfully placed to enhance the content without adding visual clutter.</p>\n<p>So, whether you’re navigating our API docs or configuring authentication into your system, our improved interface will make those extended development hours more comfortable and efficient.</p>\n<h3 id=\"clear-categorization-for-loginradius-capabilities\" style=\"position:relative;\"><a href=\"#clear-categorization-for-loginradius-capabilities\" aria-label=\"clear categorization for loginradius capabilities permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Clear Categorization for LoginRadius Capabilities</h3>\n<p><img src=\"/e5358b82be414940f3fb146013845933/capabilities.webp\" alt=\"This image shows a breakdown of all the LoginRadius CIAM capabilities, including authentication, security, UX, scalability and multi-brand management.\"></p>\n<p>We’ve restructured our website to provide a straightforward breakdown of our customer identity and access management platform capabilities, helping you quickly find what you need:</p>\n<ul>\n<li>Authentication: Easily understand <a href=\"https://www.loginradius.com/blog/identity/authentication-option-for-your-product/\">how to choose the right login method</a>, from traditional passwords and OTPs to social login, federated SSO, and passkeys with few lines of code.</li>\n<li>Security: Implement no-code security features like bot detection, IP throttling, breached password alerts, DDoS protection, and adaptive MFA to safeguard user accounts.</li>\n<li>User Experience: Leverage AI builder, hosted pages, and drag-and-drop workflows to create smooth, branded sign-up and login experiences.</li>\n<li>High Performance &#x26; Scalability: Confidently scale with sub-100ms API response times, 100% uptime, 240K+ RPS, and 28+ global data center regions.</li>\n<li>Multi-Brand Management: Efficiently manage multiple identity apps, choosing isolated or shared data stores based on your brand’s unique needs.</li>\n</ul>\n<p>This structured layout ensures you can quickly understand each capability and how it integrates into your identity ecosystem.</p>\n<h3 id=\"developer-first-navigation\" style=\"position:relative;\"><a href=\"#developer-first-navigation\" aria-label=\"developer first navigation permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Developer-First Navigation</h3>\n<p><img src=\"/a8c155c2b6faf3d5f4b4de4e2b14d763/developers-menu.webp\" alt=\"This image shows the LoginRadius menu bar, highlighting the developer dropdown.\">   </p>\n<p>We’ve been analyzing developer workflows to identify how you access key resources. That’s why we redesigned our navigation with one goal in mind: to reduce clicks and make essential resources readily available.</p>\n<p>The new LoginRadius structure puts APIs, SDKs, and integration guides right at the menu bar under the Developers dropdown so you can get started faster. Our Products, Solutions, and Customer Services are also clearly categorized, helping development teams quickly find the right tools and make informed decisions.</p>\n<h3 id=\"quick-understanding-of-integration-benefits\" style=\"position:relative;\"><a href=\"#quick-understanding-of-integration-benefits\" aria-label=\"quick understanding of integration benefits permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Quick Understanding of Integration Benefits</h3>\n<p><img src=\"/b2f9a964a2da0ea83e2f8596b833bba7/we-support-your-tech-stack.webp\" alt=\"This image shows a list of popular programming languages and frameworks offered by LoginRadius.\"></p>\n<p>Developers now have a clear view of the tech stack available with LoginRadius, designed to support diverse business needs.</p>\n<p>Our platform offers pre-built SDKs for Node.js, Python, Java, and more, making CIAM integration seamless across popular programming languages and frameworks.</p>\n<h2 id=\"over-to-you-now\" style=\"position:relative;\"><a href=\"#over-to-you-now\" aria-label=\"over to you now permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Over to You Now!</h2>\n<p>Check out our <a href=\"https://www.loginradius.com/\">revamped LoginRadius website</a> and see how the improved experience makes it easier to build, scale, and secure your applications.</p>\n<p>Do not forget to explore the improved navigation and API documentation, and get started with our free trial today. We’re excited to see what you’ll build with LoginRadius!</p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"February 21, 2025","updated_date":null,"description":"LoginRadius’ vision is to give developers a product that simplifies identity management so they can focus on building, deploying, and scaling their applications. To enhance this experience, we’ve redesigned our website interface, making navigation more intuitive and reassuring that essential resources are easily accessible.","title":"Revamped & Ready: Introducing the New Developer-First LoginRadius Website","tags":["Developer tools","API","Identity Management","User Authentication"],"pinned":true,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.7857142857142858,"src":"/static/80b4e4fbe176a10a327d273504607f32/58556/hero-section.webp","srcSet":"/static/80b4e4fbe176a10a327d273504607f32/61e93/hero-section.webp 200w,\n/static/80b4e4fbe176a10a327d273504607f32/1f5c5/hero-section.webp 400w,\n/static/80b4e4fbe176a10a327d273504607f32/58556/hero-section.webp 800w,\n/static/80b4e4fbe176a10a327d273504607f32/99238/hero-section.webp 1200w,\n/static/80b4e4fbe176a10a327d273504607f32/7c22d/hero-section.webp 1600w,\n/static/80b4e4fbe176a10a327d273504607f32/1258b/hero-section.webp 2732w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},"pageContext":{"limit":6,"skip":300,"currentPage":51,"type":"//identity//","numPages":70,"pinned":"ee8a4479-3471-53b1-bf62-d0d8dc3faaeb"}},"staticQueryHashes":["1171199041","1384082988","2100481360","23180105","528864852"]}