{"componentChunkName":"component---src-templates-blog-list-template-js","path":"/identity/53","result":{"data":{"allMarkdownRemark":{"edges":[{"node":{"excerpt":"An Identity Broker is an intermediary service that connects multiple service providers (SP) with different identity providers (IdP). It is…","fields":{"slug":"/identity/loginradius-identity-brokering/"},"html":"<p>An Identity Broker is an intermediary service that connects multiple service providers (SP) with different identity providers (IdP). It is responsible for developing trustworthy relationships with external IdPs and utilizing their respective identities to gain access to the service providers' internal services. </p>\n<p>Businesses can link an existing account with one or more identities from various IdPs, or even create new identities based on the information obtained from them. </p>\n<p>Using LoginRadius' Identity Brokering, businesses do not require consumers to provide their credentials to authenticate. Instead, LoginRadius acts as an identity broker service between the Identity and Service Providers and enables the authentication process between the two using the <a href=\"https://www.loginradius.com/protocols/\">industry-standard protocols</a>.</p>\n<h2 id=\"intend-behind-the-launch\" style=\"position:relative;\"><a href=\"#intend-behind-the-launch\" aria-label=\"intend behind the launch permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Intend Behind the Launch</h2>\n<p>With LoginRadius Identity Brokering service, businesses can enjoy a seamless authentication experience and delegate all single sign-on requirements to a click of a button. A few other  benefits include:</p>\n<ul>\n<li><strong>Better flexibility</strong>: Businesses can easily configure IdPs of their choice, including Google, Facebook, Linked In, and even custom ones. </li>\n<li><strong>Eliminate complexity</strong>: Businesses can delegate their <a href=\"https://www.loginradius.com/single-sign-on/\">SSO requirements to LoginRadius</a>, thereby eliminating the need to understand and implement complex SSO protocols like SAML, OpenID, JWT, and OAuth. </li>\n<li><strong>Verified digital identity</strong>: Businesses need not worry about verifying the consumers who authenticate themselves using configured IdPs. Such identities are already verified with respective IdPs.</li>\n</ul>\n<p><a href=\"https://www.loginradius.com/resource/identity-brokering-datasheet\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAGCAIAAABM9SnKAAAACXBIWXMAAAsSAAALEgHS3X78AAABRElEQVQY02PgUrPhVLPhUrfl1rDj0bTj1gAxgIgTJs6pas2l7SRiESCs58Kp48Kh4QCRAiIGLrAKMUM3IT0XHg07Pn13YTNfUSN3AR0nDlVrTjVbTjVrbl1XOadILZdwLrMgDl03LpA4WDOEkrXw1nAMVbENEDfzZtV0Ztf34td1Bmu2ETV0kzbzlDH1lDbzkjPzlLPwBjKAbuSAa1ayCdBzjwQibadQKTMfKfdkYUN3TrBmoLvEjT1kLXzkLf3kLP2kzbwFdSGOAjpb3YZFyWLZxp2vXr+9eefe3QeP7j96+urNO6fITGYFcwZp46zqzkvX76zeunfJ+u3LNuzcf+zM9gPHgZ5iV7ECarYFat5+4Nj////fv3//+dOn79++AdkecXkMciasSpYW/olZNV0x+XXR+bVAlFzWEltQz6NpD7QcAE0FZ8VUc7ANAAAAAElFTkSuQmCC'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"identity-brokering\"\n        title=\"identity-brokering\"\n        src=\"/static/e7cdf22e3802f3103c0b0bc9a55a67bf/e5715/identity-brokering.png\"\n        srcset=\"/static/e7cdf22e3802f3103c0b0bc9a55a67bf/a6d36/identity-brokering.png 650w,\n/static/e7cdf22e3802f3103c0b0bc9a55a67bf/e5715/identity-brokering.png 768w,\n/static/e7cdf22e3802f3103c0b0bc9a55a67bf/63ff0/identity-brokering.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<h2 id=\"key-features-offered-by-loginradius\" style=\"position:relative;\"><a href=\"#key-features-offered-by-loginradius\" aria-label=\"key features offered by loginradius permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Key Features Offered by LoginRadius</h2>\n<ul>\n<li><strong>Configurable IdP and SP</strong>: Businesses can choose from the list of pre-configured IdPs or configure a custom IdP by choosing the supported protocol and providing the required details in the LoginRadius Admin Console. </li>\n<li><strong>Multiple protocol support</strong>: LoginRadius supports multiple SSO protocols like SAML, JWT, OAuth for identity brokering. Businesses can choose and configure their apps with LoginRadius for any of these protocols.</li>\n<li><strong>SP and IdP Initiated SSO</strong>: LoginRadius supports both SP and IdP initiated SSO flows with the SAML protocol. SP initiated is where the consumer lands on the service provider and redirects the identity provider for authentication. From IdP, the consumer is redirected back to the SP with an authentication response. IdP initiated is where the consumer lands on the identity provider and then redirects to the service provider with an authentication response.</li>\n</ul>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>With Identity Brokering, businesses can skip the use of complex protocols and enjoy the luxury of simply calling an HTTPS endpoint—a much easier option to implement than understanding standards SSO protocols.</p>\n<p>Moreover, businesses acquire flexibility and verified digital identities, whereas consumers gain a <a href=\"https://www.loginradius.com/authentication/\">seamless authentication experience</a>. A win-win for both parties! </p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-loginradius\"\n        title=\"book-a-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"January 27, 2021","updated_date":null,"description":"Using Identity Brokering, businesses do not require consumers to provide their credentials to authenticate. Instead, LoginRadius acts as an identity broker service between the Identity and Service Providers and enables the authentication process between the two.","title":"Announcement - LoginRadius Announces Identity Brokering To Establish Trust Between Identity and Service Providers","tags":["identity management","authentication","sso","cx"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.408450704225352,"src":"/static/dc179b4ebabd66c4d394331e1d812be9/6051d/loginradius-identity-brokering.png","srcSet":"/static/dc179b4ebabd66c4d394331e1d812be9/69585/loginradius-identity-brokering.png 200w,\n/static/dc179b4ebabd66c4d394331e1d812be9/497c6/loginradius-identity-brokering.png 400w,\n/static/dc179b4ebabd66c4d394331e1d812be9/6051d/loginradius-identity-brokering.png 769w","sizes":"(max-width: 769px) 100vw, 769px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},{"node":{"excerpt":"Onboarding is the process of helping new users understand and experience how your product is intending to help them in achieving their goals…","fields":{"slug":"/identity/user-onboarding-revamp-application/"},"html":"<p>Onboarding is the process of helping new users understand and experience how your product is intending to help them in achieving their goals. In general, you confirm to your consumers that your product is the best solution to their problem, which inspired them to find your product.</p>\n<p>Meanwhile, the onboarding process is your user's first impression about your application and, if correctly designed, it can be successfully adopted. </p>\n<p>When the user launches your app for the first time, the onboarding process reinforces your application's value and offers instructions that focus on potential features and benefits. </p>\n<h2 id=\"5-ways-how-user-onboarding-can-upgrade-your-application\" style=\"position:relative;\"><a href=\"#5-ways-how-user-onboarding-can-upgrade-your-application\" aria-label=\"5 ways how user onboarding can upgrade your application permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>5 Ways How User Onboarding Can Upgrade Your Application</h2>\n<ol>\n<li>All consumers are different; if you are analyzing your consumer through the same script, you might be missing some information about their needs, which might lead to missed opportunities throughout or after the onboarding process.</li>\n<li>The onboarding process cannot be explained in one minute. It should be clear and precise. If you cannot explain the process within a minute, then you cannot expect your consumer to follow the whole process.</li>\n<li>If you do not have an internal transition process, you cannot ask your consumer to trust the process to onboard correctly and manage them efficiently. The consumer should know that whatever is discussed and agreed upon during the sales process is documented. The consumer success team has already been briefed and should pick up and start the onboarding process.</li>\n<li>Onboarding involves people, products, and processes. It is more likely that any one of these components will evolve within the year. They might evolve simultaneously or independently. However, the main criteria is they might change if you do not upgrade your onboarding process according to their convenience. It's time you start incorporating these developments according to the changes.</li>\n<li>You need to know the time frame that it takes to onboard your consumer. So, if you don't know it yet, consider it as a warning sign. If you have a clear number, it is easy to measure whether your process is working or not and gauge where you need to make alterations.</li>\n</ol>\n<h2 id=\"what-are-the-primary-elements-of-an-ideal-user-onboarding-process\" style=\"position:relative;\"><a href=\"#what-are-the-primary-elements-of-an-ideal-user-onboarding-process\" aria-label=\"what are the primary elements of an ideal user onboarding process permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What Are the Primary Elements of an Ideal User Onboarding Process</h2>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 60.61538461538461%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"ideal-user-onboarding-process\"\n        title=\"ideal-user-onboarding-process\"\n        src=\"/static/6801bfc7e5220009cf813c3d92914973/e5715/ideal-user-onboarding-process.png\"\n        srcset=\"/static/6801bfc7e5220009cf813c3d92914973/a6d36/ideal-user-onboarding-process.png 650w,\n/static/6801bfc7e5220009cf813c3d92914973/e5715/ideal-user-onboarding-process.png 768w,\n/static/6801bfc7e5220009cf813c3d92914973/2bef9/ideal-user-onboarding-process.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>The onboarding process should be a mix of inspiration, education, timely and actionable insights. Each product is unique, and how you are going to handle the onboarding will help you to know about your users, their needs, and how your product is going to stay with them.</p>\n<p>So, here are the different <a href=\"https://www.loginradius.com/blog/fuel/2021/01/user-onboarding-tools/\">user onboarding tools</a> and resources that you can use to revamp your application. </p>\n<ul>\n<li>Personalized welcome.</li>\n</ul>\n<p>A greeting is one of the best ways to interact with new users during offline engagements; the same applies to online ones. Welcome your consumer by offering bonus materials such as additional integration, e-books, which will help them get started. </p>\n<p>Also, you can personalize the welcome message by using the consumer's name or their company. It can act as a lovely gesture and will show users that you value their business. </p>\n<ul>\n<li>Demonstrate the product.</li>\n</ul>\n<p>You can demonstrate key functions and explain to users how they can accomplish a particular task. If you do not highlight your product's purpose, then the user might fail to see the benefit of your product. </p>\n<p>Besides, consumers' success depends on using the product correctly; if they find it difficult, they might be frustrated with your product.</p>\n<ul>\n<li>Set specific goals.</li>\n</ul>\n<p>One of the major steps is setting specific goals for active users. Once you send your goals, create logical steps to reach the desired outcome of your product. </p>\n<p>Also, adding a checklist within the app can help your consumers stay on track and motivated.</p>\n<ul>\n<li>Offer consumer service.</li>\n</ul>\n<p>You should know that offering <a href=\"https://www.loginradius.com/customer-experience-solutions/\">exceptional consumer service</a> is imperative for a business to succeed. If your consumer service is good, your consumer will come back to you for more. You can also add a live chat feature or add phone assistance and email assistance to your application. </p>\n<ul>\n<li>Produce quality content.</li>\n</ul>\n<p>Add more value to your application by producing quality content that will help consumers solve their problems. When you provide advice that greatly benefits them, you can become your client’s trusted advisor. And with added trust comes the prospect of earning more sales.</p>\n<ul>\n<li>The Aha! moment.</li>\n</ul>\n<p>This happens when your customer truly appreciates the value of your software. Complex <a href=\"/blog/growth/sign-up-tips-conversion-rate/\">sign-up forms</a> and painful login processes can create a tough barrier between the new user and the ‘Aha Moment.’ </p>\n<p>The main goal of onboarding is to show new users the key features and guide users towards the ‘Aha Moment,’ which is called the moment of delight, where the value of the product becomes instantly clear.</p>\n<p><a href=\"https://www.loginradius.com/resource/ciam-101/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"ciam-101\"\n        title=\"ciam-101\"\n        src=\"/static/07ffa60c01ac470ddc137679ce2cc238/e5715/ciam-101.png\"\n        srcset=\"/static/07ffa60c01ac470ddc137679ce2cc238/a6d36/ciam-101.png 650w,\n/static/07ffa60c01ac470ddc137679ce2cc238/e5715/ciam-101.png 768w,\n/static/07ffa60c01ac470ddc137679ce2cc238/63ff0/ciam-101.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<ul>\n<li>In-app messaging and ‘empty states’.</li>\n</ul>\n<p>One of the most powerful tools for engaging users completely is by using the in-app message function. These touchpoints are highly effective when introducing new updates and features or conveying some important information to your users. </p>\n<p>Empty space is how your product or app looks when you first use it before it is filled with useful content. The empty state design should prompt the user to fill content or add sample content illustrating the app’s value, thereby helping the user feel more confident to take the next step.</p>\n<ul>\n<li>Set up automated alerts.</li>\n</ul>\n<p>If you are looking for people who have not completed the onboarding process, you can use alerts to remind them to finish it. You can also set up automated alerts that will push people to complete it.</p>\n<ul>\n<li>Onboard your current users to new features.</li>\n</ul>\n<p>The onboarding process is not just for new users but for current users to receive updates and on new features.</p>\n<ul>\n<li>Offer multiple channels of communication.</li>\n</ul>\n<p>To increase user interaction and retention, use multiple channels for communication. You can also use outside channels like text messages, live chat, and automated email sequences to aid the onboarding process along with in-app messaging.</p>\n<h2 id=\"how-loginradius-helps-businesses-to-enhance-a-great-user-onboarding-experience\" style=\"position:relative;\"><a href=\"#how-loginradius-helps-businesses-to-enhance-a-great-user-onboarding-experience\" aria-label=\"how loginradius helps businesses to enhance a great user onboarding experience permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How LoginRadius Helps Businesses to Enhance a Great User Onboarding Experience</h2>\n<p>Data breaches can cost companies loss of revenue and fines. To earn your consumers' trust and protect your brand, you need to take up advanced data security measures to keep the threats at bay. </p>\n<p>LoginRadius protects the identity of customers through multi-level security systems with <a href=\"https://www.loginradius.com/press/loginradius-is-the-only-identity-platform-to-deliver-100-system-availability-in-2018/\">99.99% availability</a>. To help businesses deliver a dedicated consumer experience and win customer trust, the platform offers the following: </p>\n<ul>\n<li><strong>Design an ideal consumer journey</strong>. From the first step of onboarding to the thousandth login, the <a href=\"https://www.loginradius.com/blog/identity/2019/06/customer-identity-and-access-management/\">CIAM platform</a> creates a welcoming and intelligent process.</li>\n<li><strong>Offer localization</strong>. Businesses can customize their forms, email messages, and texts for the worldwide market according to the local language. </li>\n<li><strong>Tailor-make interfaces</strong>. Businesses can choose their custom fields and design their own registration, login, and forgotten password forms. </li>\n<li><strong>Use an email workflow that actually works</strong>. LoginRadius provides customizable templates and sequences to get into the consumers' inbox and manage the login process. </li>\n<li><strong>Unify the login process with single sign-on</strong>. Businesses can connect their websites, mobile apps, and third-party dependencies so consumers can interact with <a href=\"https://www.loginradius.com/blog/identity/2019/05/what-is-single-sign-on/\">a single identity</a>.</li>\n</ul>\n<p>LoginRadius's identity platform can streamline the login process and also protect customer accounts by complying with global data privacy regulations during the onboarding process.</p>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>You know by now how user onboarding software can revamp your application. But, onboarding is not an easy process or just about offering new users a warm welcome. There's more to it. And that includes helping <a href=\"https://www.loginradius.com/blog/fuel/2019/11/improve-customer-experience-ecommerce/\">new users experience the value of your product</a> and retaining current users. </p>\n<p>It takes time to build an onboarding process and a lot of work to update it. You cannot change everything immediately, but you can make small changes over a period of time to smoothen the onboarding process.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-loginradius\"\n        title=\"book-a-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"January 27, 2021","updated_date":null,"description":"The onboarding process should be a mix of inspiration, education, timely and actionable insights. Each product is unique, and how you are going to handle the onboarding will help you to know about your users, their needs, and how your product is going to stay with them.","title":"5 Ways User Onboarding Software Can Revamp Your Application","tags":["customer-experience"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.408450704225352,"src":"/static/7692e12cb51f6149a100dde9964f6227/9a31d/user-onboarding-application.jpg","srcSet":"/static/7692e12cb51f6149a100dde9964f6227/f836f/user-onboarding-application.jpg 200w,\n/static/7692e12cb51f6149a100dde9964f6227/2244e/user-onboarding-application.jpg 400w,\n/static/7692e12cb51f6149a100dde9964f6227/9a31d/user-onboarding-application.jpg 767w","sizes":"(max-width: 767px) 100vw, 767px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},{"node":{"excerpt":"The present-day internet is a hotbed of spammers and hackers, and you need to secure your email address. Hackers often scan websites and web…","fields":{"slug":"/identity/secure-email-address-website/"},"html":"<p>The present-day internet is a hotbed of spammers and hackers, and you need to secure your email address. Hackers often scan websites and web pages to extract genuine email addresses and exploit them to attack users with spam messages. </p>\n<p>This should really concern you because many of these spam emails carry potential malware. When you open your mail or click on a link that contains it, the malware gets naturally downloaded to your system.</p>\n<p>For example, let's assume you have entered your email address on a website's contact page, then there's a big chance the email harvesting bots have found it. Thereafter, they start flooding your mail-box with spam emails. </p>\n<p>Luckily, there are a few ways to hide your email address from such spammers and hackers who constantly mine for the same. One way is through <a href=\"https://www.loginradius.com/blog/identity/2020/12/what-to-do-when-email-hacked/\">email harvesting</a>.  </p>\n<p>Let's talk about what it is and then explore the various ways to secure your email address.</p>\n<h2 id=\"what-is-email-harvesting\" style=\"position:relative;\"><a href=\"#what-is-email-harvesting\" aria-label=\"what is email harvesting permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is Email Harvesting</h2>\n<p>Email harvesting is the process of collecting lists of email addresses via different methods. Generally, it is used for bulk emails or spam. Hackers use \"harvesting bots,\" which crawl multiple sites, chat rooms, web forms, etc., in a few seconds to extract a list of email addresses. </p>\n<p>Other techniques include:</p>\n<ul>\n<li>Posting into UseNet with email addresses.</li>\n<li>Gathering data from white and yellow pages.</li>\n<li>Accessing the same computer used by valid users.</li>\n<li>Accessing emails and address books on another user's computer.</li>\n<li>Spamming through social engineering. </li>\n<li>Buying lists from other spammers.</li>\n<li>Hacking websites.</li>\n<li>Using the method of guessing and cleaning.</li>\n<li>Hacking mailing lists, webpages, web browsers, Internet relay chats, domain contact points, etc. </li>\n</ul>\n<p>These methods allow spammers to gather email addresses and use them to send unsolicited bulk messages to the recipient's inbox. </p>\n<h2 id=\"6-tips-to-secure-your-email-address-on-a-website\" style=\"position:relative;\"><a href=\"#6-tips-to-secure-your-email-address-on-a-website\" aria-label=\"6 tips to secure your email address on a website permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>6 Tips to Secure Your Email Address on a Website</h2>\n<h3 id=\"1-hide-your-email-address-while-logging-in\" style=\"position:relative;\"><a href=\"#1-hide-your-email-address-while-logging-in\" aria-label=\"1 hide your email address while logging in permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. Hide your email address while logging in.</h3>\n<p>One of the major mistakes committed by beginners is that they display their email address. If you are tensed and stressed about online hackers and threats, there is one solution you can always opt for. </p>\n<p>You can always avoid listing your email address on various vague websites. Instead, you can use contact information through which genuine users can contact you.</p>\n<h3 id=\"2-obfuscate-your-email-address\" style=\"position:relative;\"><a href=\"#2-obfuscate-your-email-address\" aria-label=\"2 obfuscate your email address permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. Obfuscate your email address.</h3>\n<p>Add an obfuscate plugin puzzle to your email address so hackers cannot identify it. With the help of such plugins, you can replace your email address with codes. These plugins secure your email address from hackers and do not affect the user's usability.  </p>\n<h3 id=\"3-use-a-password-manager\" style=\"position:relative;\"><a href=\"#3-use-a-password-manager\" aria-label=\"3 use a password manager permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3. Use a password manager.</h3>\n<p>Use a reliable password manager to change and replace all your passwords with solid, unique ones. We cannot sufficiently stress the importance of using strong passwords to secure your email address.</p>\n<p>Hackers use <a href=\"https://www.loginradius.com/blog/identity/2019/09/prevent-credential-stuffing-attacks/\">credential stuffing</a> where they literally jam previously stolen usernames and passwords to break into accounts on various services. </p>\n<p>This is possible because a huge proportion of online users still use the same username and passwords across multiple accounts.</p>\n<p><a href=\"https://www.loginradius.com/resource/ebook/buyers-guide-to-multi-factor-authentication/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"buyer-guide-to-multi-factor-authentication-ebook\"\n        title=\"buyer-guide-to-multi-factor-authentication-ebook\"\n        src=\"/static/dce0b5caab393383c0c906c5653faa64/e5715/buyer-guide-to-multi-factor-authentication-ebook.png\"\n        srcset=\"/static/dce0b5caab393383c0c906c5653faa64/a6d36/buyer-guide-to-multi-factor-authentication-ebook.png 650w,\n/static/dce0b5caab393383c0c906c5653faa64/e5715/buyer-guide-to-multi-factor-authentication-ebook.png 768w,\n/static/dce0b5caab393383c0c906c5653faa64/63ff0/buyer-guide-to-multi-factor-authentication-ebook.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<h3 id=\"4-use-two-factor-authentication-or-mfa-wherever-possible\" style=\"position:relative;\"><a href=\"#4-use-two-factor-authentication-or-mfa-wherever-possible\" aria-label=\"4 use two factor authentication or mfa wherever possible permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>4. Use two-factor authentication or MFA, wherever possible.</h3>\n<p>When you set up your account passwords, look out for <a href=\"https://www.loginradius.com/blog/identity/2021/01/how-to-setup-2fa-in-online-accounts/\">two-factor authentication (2FA)</a>/ MFA as well. They are additional security layers that you can apply to prevent resets of unauthorized passwords significantly. </p>\n<p>Whenever a hacker attempts to break into your email, you are notified and control the authority to accept or reject such attempts. </p>\n<h3 id=\"5-replace-your-email-address\" style=\"position:relative;\"><a href=\"#5-replace-your-email-address\" aria-label=\"5 replace your email address permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>5. Replace your email address.</h3>\n<p>If you are not satisfied with any of the above solutions to secure your email address, you can always replace it with \"\". This would take the user directly to your contact page when they click on the email. This not only prevents tons of spam but also protects you from hackers. </p>\n<h3 id=\"6-prevent-email-harvesting\" style=\"position:relative;\"><a href=\"#6-prevent-email-harvesting\" aria-label=\"6 prevent email harvesting permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>6. Prevent email harvesting.</h3>\n<p>The following techniques can be used to prevent email harvesting:</p>\n<ul>\n<li>Convert your email address into an image. </li>\n<li>Merge your email address by changing the \"@\" sign to \"at\" and the \".\" sign to \"dot.\"</li>\n<li>Use the email contact form wherever possible.</li>\n<li>Use email obfuscation in JavaScript. The email address will appear scrambled, encoded, or obfuscated in the source code. </li>\n<li>Use HTML for email address obfuscation. </li>\n<li>Prompt users to enter the correct CAPTCHA before revealing the email address. </li>\n<li>Using a spider trap to combat email harvesting spiders.</li>\n<li>Conduct mail server monitoring. This approach can be applied to the email server of the recipient. It dismisses all email addresses from any sender that specifies more than one invalid recipient address as invalid.</li>\n</ul>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p><a href=\"https://www.loginradius.com/blog/identity/2020/12/bot-attacks/\">Harvesting bots</a> are here to stay; thus, you must take appropriate measures to secure your email address. You can implement the above methods so that you don't become a victim of spammers and hackers in the long run. </p>\n<p>Although it may take a while to get the hang of them, the results are worth spending time on. </p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-loginradius\"\n        title=\"book-a-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"January 22, 2021","updated_date":null,"description":"Harvesting bots are here to stay. Luckily, there are a few ways to hide your email address from spammers and hackers who constantly mine for the same. One way is through email harvesting. Let's talk about what it is and then explore the various ways to secure your email address.","title":"How to secure an email address on your website","tags":["all, Security"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.7857142857142858,"src":"/static/b6b491c10267c056d5f47298092a1c5b/14b42/secure-email-address-website.jpg","srcSet":"/static/b6b491c10267c056d5f47298092a1c5b/f836f/secure-email-address-website.jpg 200w,\n/static/b6b491c10267c056d5f47298092a1c5b/2244e/secure-email-address-website.jpg 400w,\n/static/b6b491c10267c056d5f47298092a1c5b/14b42/secure-email-address-website.jpg 800w,\n/static/b6b491c10267c056d5f47298092a1c5b/47498/secure-email-address-website.jpg 1200w,\n/static/b6b491c10267c056d5f47298092a1c5b/ec6c5/secure-email-address-website.jpg 1280w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},{"node":{"excerpt":"There has been a significant surge in formjacking attacks recently. It has been affecting organizations that mostly accept online payment…","fields":{"slug":"/identity/what-is-formjacking/"},"html":"<p>There has been a significant surge in formjacking attacks recently. It has been affecting organizations that mostly accept online payment from consumers.</p>\n<p>In recent times, cryptocurrencies have progressed in both popularity and technical improvements. However, the radical decrease in the value of cryptocurrencies like Bitcoin and Monero has led to cybercriminals looking elsewhere for fraudulent profits. </p>\n<p>That being said, what better place to steal your financial information than a product order form on online shopping websites before you even hit the submit button—that's formjacking!</p>\n<p>To understand what other threats formjacking pose, let's get to the basics by exploring this unique kind of <a href=\"https://www.loginradius.com/blog/identity/2019/10/cybersecurity-attacks-business/\">cyberattack</a>.</p>\n<h2 id=\"what-is-a-formjacking-attack\" style=\"position:relative;\"><a href=\"#what-is-a-formjacking-attack\" aria-label=\"what is a formjacking attack permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What Is a Formjacking Attack</h2>\n<p>Formjacking is a type of cyber attack in which hackers insert malicious JavaScript code into the target website, most often to a payment page form. </p>\n<p>Once the malicious code is in operation, when a consumer enters their payment card information and hits submit, the compromised code sends the payment card number and other sensitive information like the consumer's name, address, and phone number to the hacker. </p>\n<p>Hackers send this stolen information to a server for reuse or even sell the personal details on the dark web. While all this happens, the victim is blissfully unaware of their payment details being compromised.</p>\n<p>According to the authenticated <a href=\"https://www.broadcom.com/support/security-center?om_ext_cid=biz_vnty_istr-24_multi_v10195\">Symantec Internet Security Threat Report 2019,</a> formjackers hacked 4,818 unique websites each month in 2018. Symantec blocked more than 3.7 million Formjacking attack attempts in that year alone.</p>\n<h2 id=\"who-is-behind-formjacking-attacks\" style=\"position:relative;\"><a href=\"#who-is-behind-formjacking-attacks\" aria-label=\"who is behind formjacking attacks permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Who Is Behind Formjacking Attacks</h2>\n<p>It is quite complicated for security researchers to pinpoint a single attacker or attack style considering so many unique sites are being attacked simultaneously. However, the majority of formjacking attacks are known to originate from Magecart groups. </p>\n<p>Magecart is a club of hacker groups that have been behind the attacks on various websites. Attacks on Ticketmaster, Feedify, British Airways, and Newegg are only some of the Formjacking examples done by this consortium. </p>\n<p>The group injects web-based card skimmers onto eCommerce sites to <a href=\"https://www.loginradius.com/blog/identity/2020/04/corporate-account-takeover-attacks/\">steal payment card data or credit card information</a> and other sensitive information right from online payment forms.</p>\n<p>Magecart group started hacking into Magneto online stores; however, they have now altered their strategies and are increasingly using formjacking attacks to steal payment card details. </p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 148%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"who-is-behind-formjacking-attacks\"\n        title=\"who-is-behind-formjacking-attacks\"\n        src=\"/static/536a62a1e643be82873d5537f2fcee6c/e5715/who-is-behind-formjacking-attacks.png\"\n        srcset=\"/static/536a62a1e643be82873d5537f2fcee6c/a6d36/who-is-behind-formjacking-attacks.png 650w,\n/static/536a62a1e643be82873d5537f2fcee6c/e5715/who-is-behind-formjacking-attacks.png 768w,\n/static/536a62a1e643be82873d5537f2fcee6c/2bef9/who-is-behind-formjacking-attacks.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<h2 id=\"how-big-is-this-formjacking-campaign\" style=\"position:relative;\"><a href=\"#how-big-is-this-formjacking-campaign\" aria-label=\"how big is this formjacking campaign permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How Big Is This Formjacking Campaign</h2>\n<p>The latest Formjacking campaign conveys that attackers are constantly changing and enhancing their malicious formjacking code and discovering innovative delivery mechanisms to infect users. By the time people even understand formjacking, hackers flee with the information. </p>\n<p>For example, Symantec has been digging into telemetry and examining the technical aspects of formjacking attacks to find that 248,000 formjacking attempts were blocked in 2019. But the worrying thing is that such activities are increasing continually as over one-third of those blocks were encountered between September 13 and 20.</p>\n<h2 id=\"what-categories-of-businesses-are-these-attacks-targeting\" style=\"position:relative;\"><a href=\"#what-categories-of-businesses-are-these-attacks-targeting\" aria-label=\"what categories of businesses are these attacks targeting permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What Categories of Businesses Are These Attacks Targeting</h2>\n<p>Magecart has been targeting eCommerce giants such as Ticketmaster, Newegg, and British Airways to gain larger profits. </p>\n<p>Symantec's data showcases that the impacted websites are mostly online retail sites, including small niche sites, to more extensive retail business operations. Websites impacted ranged from a fitness retailer to a supplier of outdoor accessories.</p>\n<p>Other online retailers affected included suppliers of parts for vehicles and portals selling gifts or kitchen accessories. </p>\n<p>Therefore, it is safe to assume that any company that processes payments on the internet is a probable victim of formjacking attacks.</p>\n<h2 id=\"how-can-formjacking-attacks-affect-you\" style=\"position:relative;\"><a href=\"#how-can-formjacking-attacks-affect-you\" aria-label=\"how can formjacking attacks affect you permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How Can Formjacking Attacks Affect You</h2>\n<p>How formjacking attacks can impact your business depends on the type of information the identity thief captures. \"There is some data that can ruin your current day; however, there is some confidential information that can even ruin your complete life,\" says <a href=\"https://www.linkedin.com/in/alex-hamerstone-364b4520\">Alex Hamerstone</a>, Practice Lead: Governance, Risk and Compliance at TrustedSec.</p>\n<p>You must monitor your bank and credit card statements and keep an eye on your credit scores. Unfortunately, it is almost impossible for victims to identify formjacking attacks, considering most still do not understand what is formjacking, let alone knowing how to detect it. </p>\n<p>So, it is solely upon the IT professionals to keep a constant check on their systems to detect and eliminate it, if such a specific threat were to occur.</p>\n<h2 id=\"how-can-businesses-protect-your-credit-card-and-other-information-from-formjacking\" style=\"position:relative;\"><a href=\"#how-can-businesses-protect-your-credit-card-and-other-information-from-formjacking\" aria-label=\"how can businesses protect your credit card and other information from formjacking permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How Can Businesses Protect Your Credit Card and Other Information From Formjacking</h2>\n<p>You may not be able to stop Formjacking before it attacks your system, but you can take steps to protect your personal details. </p>\n<p>Use credit cards instead of debit cards while shopping online to reduce <a href=\"https://www.loginradius.com/blog/identity/2020/11/ecommerce-security/\">financial risks</a>. The reason behind this is simple. </p>\n<p>If someone uses your credit card information deceptively or indulges in card fraud, they will be exhausting the funds of the credit card companies. In the case of debit cards, the funds are directly tied to your checking account balance.</p>\n<p><a href=\"https://www.loginradius.com/resource/pii-data-breach-report/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"protecting-pii-against-data-breaches\"\n        title=\"protecting-pii-against-data-breaches\"\n        src=\"/static/8ae28768fa7a47b91a86b0e9441f9c50/e5715/protecting-pii-against-data-breaches.png\"\n        srcset=\"/static/8ae28768fa7a47b91a86b0e9441f9c50/a6d36/protecting-pii-against-data-breaches.png 650w,\n/static/8ae28768fa7a47b91a86b0e9441f9c50/e5715/protecting-pii-against-data-breaches.png 768w,\n/static/8ae28768fa7a47b91a86b0e9441f9c50/63ff0/protecting-pii-against-data-breaches.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<h2 id=\"how-to-prevent-formjacking-attacks\" style=\"position:relative;\"><a href=\"#how-to-prevent-formjacking-attacks\" aria-label=\"how to prevent formjacking attacks permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How to Prevent Formjacking Attacks</h2>\n<ul>\n<li>Make sure that your IT professionals are well-versed with what is formjacking. </li>\n<li>Use the latest antivirus software; one with a reputable status can <a href=\"https://www.loginradius.com/blog/identity/2019/10/cybersecurity-best-practices-for-enterprises/\">safeguard your system</a> from some if not all formjacking attacks. </li>\n<li>Run scans and tests to check for vulnerabilities in your systems and fix them before a cybercriminal can find them. </li>\n<li>Every time your software gets a new update, run a test to look for discrepancies before launching it on the web. </li>\n<li>Don't forget to monitor your systems' behavioral patterns so that you can detect suspicious patterns and block the apps that may cause damage to your system.</li>\n</ul>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>Victims don't realize that they have fallen prey to formjacking attacks easily as websites prolong to operate as usual, and Magecart formjacking attackers take steps to stop their detection. </p>\n<p>Even with all preventive measures in place, it can still be exceedingly difficult to spot formjacking attacks. However, as an online business, you must have all the protocols in place to quickly alert consumers in the case of such attacks.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-loginradius\"\n        title=\"book-a-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"January 15, 2021","updated_date":null,"description":"Formjacking attacks are designed and executed by cybercriminals to steal financial and banking details from payment forms that can be captured directly on the checkout pages from eCommerce websites. Find out more about how this practice can affect your business and how to prevent it.","title":"What is Formjacking","tags":["all, Security"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.408450704225352,"src":"/static/fdccc143a05e8d7762360472dedb082a/9a31d/what-is-formjacking.jpg","srcSet":"/static/fdccc143a05e8d7762360472dedb082a/f836f/what-is-formjacking.jpg 200w,\n/static/fdccc143a05e8d7762360472dedb082a/2244e/what-is-formjacking.jpg 400w,\n/static/fdccc143a05e8d7762360472dedb082a/9a31d/what-is-formjacking.jpg 767w","sizes":"(max-width: 767px) 100vw, 767px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},{"node":{"excerpt":"What is DNS Cache Poisoning DNS cache poisoning, also known as DNS spoofing, is a cyber-attack that exploits the weaknesses in the Domain…","fields":{"slug":"/identity/dns-cache-poisoning/"},"html":"<h2 id=\"what-is-dns-cache-poisoning\" style=\"position:relative;\"><a href=\"#what-is-dns-cache-poisoning\" aria-label=\"what is dns cache poisoning permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is DNS Cache Poisoning</h2>\n<p>DNS cache poisoning, also known as DNS spoofing, is a cyber-attack that exploits the weaknesses in the Domain Name System (DNS) servers. It enables the attacker to poison the data in DNS servers, including your company server, by providing false information to your internet traffic and diverting it to fake servers. This is done by redirecting the data in DNS to their IP address. </p>\n<p>DNS cache poisoning utilizes the vulnerabilities in the DNS protocols' security to divert internet traffic away from legitimate servers to the wrong address. </p>\n<p>DNS cache poisoning is effectively used for phishing attacks, often referred to as Pharming, for spreading malware. In the background, the malware runs and connects with the legitimate servers to steal sensitive information.</p>\n<p>When the DNS server is attacked, users may be requested to login into their accounts, and the attacker finds its way to steal the sensitive and financial credentials. </p>\n<p>Moreover, <a href=\"https://www.loginradius.com/blog/identity/phishing-for-identity/\">phishing attacks</a> also install viruses on the client's computer to exploit the stored data for long term access. </p>\n<h2 id=\"how-does-dns-cache-poisoning-works\" style=\"position:relative;\"><a href=\"#how-does-dns-cache-poisoning-works\" aria-label=\"how does dns cache poisoning works permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How Does DNS Cache Poisoning Works</h2>\n<p>DNS spoofing is a threat that copies the legitimate server destinations to divert the domain's traffic. Ignorant of these attacks, the users are redirected to malicious websites, which results in insensitive and personal data being leaked. </p>\n<p>It is a method of attack where your DNS server is tricked into saving a fake DNS entry. This will make the DNS server recall a fake site for you, thereby posing a threat to vital information stored on your server or computer. </p>\n<p>The cache poisoning codes are often found in URLs sent through spam emails. These emails are sent to prompt users to click on the URL, which infects their computer. </p>\n<p>When the computer is poisoned, it will divert you to a fake IP address that looks like a real thing. This way, the threats are injected into your systems as well.</p>\n<h2 id=\"what-are-the-different-stages-of-attack-of-dns-cache-poisoning\" style=\"position:relative;\"><a href=\"#what-are-the-different-stages-of-attack-of-dns-cache-poisoning\" aria-label=\"what are the different stages of attack of dns cache poisoning permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What Are the Different Stages of Attack of DNS Cache Poisoning</h2>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 60.61538461538461%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"stages-of-attack-of-DNS-cache-poisoning\"\n        title=\"stages-of-attack-of-DNS-cache-poisoning\"\n        src=\"/static/d8e06d6ae3159c7277906eada8fe5a8b/e5715/stages-of-attack-of-DNS-cache-poisoning.png\"\n        srcset=\"/static/d8e06d6ae3159c7277906eada8fe5a8b/a6d36/stages-of-attack-of-DNS-cache-poisoning.png 650w,\n/static/d8e06d6ae3159c7277906eada8fe5a8b/e5715/stages-of-attack-of-DNS-cache-poisoning.png 768w,\n/static/d8e06d6ae3159c7277906eada8fe5a8b/2bef9/stages-of-attack-of-DNS-cache-poisoning.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<ul>\n<li>First Stage</li>\n</ul>\n<p>The attacker proceeds to send DNS queries to the DNS resolver, which forwards the Root/TLD authoritative DNS server request and awaits an answer. </p>\n<ul>\n<li>Second Stage</li>\n</ul>\n<p>The attacker overloads the DNS with poisoned responses that contain several IP addresses of the malicious website. </p>\n<p>To be accepted by the DNS resolver, the attacker's response should match a port number and the query ID field before the DNS response. </p>\n<p>Also, the attackers can force its response to increasing their chance of success.</p>\n<ul>\n<li>Third Stage</li>\n</ul>\n<p>If you are a legitimate user who queries this DNS resolver, you will get a poisoned response from the cache, and you will be automatically redirected to the malicious website.</p>\n<h2 id=\"how-to-detect-dns-cache-poisoning\" style=\"position:relative;\"><a href=\"#how-to-detect-dns-cache-poisoning\" aria-label=\"how to detect dns cache poisoning permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How to Detect DNS Cache Poisoning</h2>\n<p>Now that we know what is DNS cache poisoning let's understand how to detect it. </p>\n<p>One way is to monitor the DNS server for any change in behavior patterns. Also, you can apply data security to DNS monitoring.  </p>\n<p>Another way is to look for a potential birthday attack. This occurs when there is a sudden increase in DNS activity from a single source in a single domain. When there is an increase in the DNS activity from a single source, querying your DNS server for multiple domain names without recurring shows that the attacker is looking for a DNS entry for poisoning. </p>\n<p>Monitor the file system behavior and active directory events for any abnormal activities. You can use analytics for correlating activities among three vectors to add important information to your <a href=\"https://www.loginradius.com/blog/identity/2019/10/cybersecurity-best-practices-for-enterprises/\">cybersecurity strategy</a>. </p>\n<h2 id=\"why-is-dns-cache-poisoning-dangerous-for-your-business\" style=\"position:relative;\"><a href=\"#why-is-dns-cache-poisoning-dangerous-for-your-business\" aria-label=\"why is dns cache poisoning dangerous for your business permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Why Is DNS Cache Poisoning Dangerous for Your Business</h2>\n<p>When the DNS server is poisoned, it will start spreading towards other DNS servers and home routers. Computers that lookup DNS entries will get the wrong response by causing more users to end up as victims of DNS poisoning. </p>\n<p>This issue will be resolved only when the poisoned DNS cache is cleared on each affected DNS server; you are at risk of losing your precious information until then. </p>\n<p>One of the major reasons DNS cache poisoning is highly dangerous is that it can spread from one DNS server to another. </p>\n<p><strong>Here are a few DNS poisoning attack examples-</strong></p>\n<p>A <a href=\"https://www.computerworld.com/article/2516831/china-s-great-firewall-spreads-overseas.html\">DNS poisoning event</a> had resulted in the Great Firewall of China's temporary escape from China's national borders by censoring the internet in the USA till the problem was resolved. </p>\n<p>Recently, <a href=\"https://searchsecurity.techtarget.com/answer/How-did-OurMine-hackers-use-DNS-poisoning-to-attack-WikiLeaks\">attackers</a> targeted WikiLeaks, who used a DNS Cache poisoning attack for hijacking traffic to their WikiLeaks like version. This intentional attack was created to divert the traffic away from WikiLeaks and was implemented successfully.</p>\n<h2 id=\"how-to-protect-against-dns-cache-poisoning\" style=\"position:relative;\"><a href=\"#how-to-protect-against-dns-cache-poisoning\" aria-label=\"how to protect against dns cache poisoning permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How To Protect Against DNS Cache Poisoning</h2>\n<h3 id=\"for-dns-server-providers-and-website-owners\" style=\"position:relative;\"><a href=\"#for-dns-server-providers-and-website-owners\" aria-label=\"for dns server providers and website owners permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>For DNS server providers and website owners</h3>\n<p>If you are a DNS service provider or a website owner, you have a huge responsibility for safeguarding your users by using various tools and protocols to manage the threats. </p>\n<p>Some of the resources we have specified will help you in this regard.</p>\n<ul>\n<li>Just like endpoint user security products, you can proactively use DNS spoofing detection tools to scan before you send or receive the data.</li>\n<li>Using DNSSEC (Domain Name System Security Extensions) helps to keep DNS lookup fool-proof and authentic.</li>\n<li>You can use end-to-end encryption to send DNS requests and replies. Hackers will not be able to duplicate the unique security certificate that is present on the legitimate website. </li>\n</ul>\n<p><a href=\"https://www.loginradius.com/resource/ebook/buyers-guide-to-multi-factor-authentication/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"buyer-guide-to-multi-factor-authentication-ebook\"\n        title=\"buyer-guide-to-multi-factor-authentication-ebook\"\n        src=\"/static/dce0b5caab393383c0c906c5653faa64/e5715/buyer-guide-to-multi-factor-authentication-ebook.png\"\n        srcset=\"/static/dce0b5caab393383c0c906c5653faa64/a6d36/buyer-guide-to-multi-factor-authentication-ebook.png 650w,\n/static/dce0b5caab393383c0c906c5653faa64/e5715/buyer-guide-to-multi-factor-authentication-ebook.png 768w,\n/static/dce0b5caab393383c0c906c5653faa64/63ff0/buyer-guide-to-multi-factor-authentication-ebook.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<h3 id=\"for-endpoint-users\" style=\"position:relative;\"><a href=\"#for-endpoint-users\" aria-label=\"for endpoint users permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>For endpoint users</h3>\n<p>To avoid making your users vulnerable to a DNS poisoning attack, you can use the specified tips.</p>\n<ul>\n<li>Do not click on the links that you don't recognize; these include text messages, emails, or social media links. To be safe, you can opt for entering the URL manually in the address bar.</li>\n<li>Regularly scan your computer for any malware. Your security software will help and remove any secondary infections. As the poisoned sites deliver malicious programs, you need to scan for spyware, viruses, or any other hidden issues.</li>\n<li>Flush your DNS cache to solve the problem of poisoning. Nevertheless, cache poisoning remains in your system for a long time until you clean the infected area.</li>\n<li>Use the <a href=\"https://www.loginradius.com/blog/engineering/learn-about-vdn-for-cybersecurity/\">virtual private network (VPN)</a>, a service that offers an encrypted tunnel for your web traffic. You can use a private DNS service exclusively for end-to-end encrypted requests; as a result, your servers are tougher against DNS spoofing. </li>\n</ul>\n<h2 id=\"final-thoughts\" style=\"position:relative;\"><a href=\"#final-thoughts\" aria-label=\"final thoughts permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Final Thoughts</h2>\n<p>DNS cache poisoning can be summarised as an attacker controlling the DNS server to send fake DNS responses. As a result, when the user visits the counterfeit domains, they will be directed to a new IP address selected by the hacker. </p>\n<p>This new IP address might be from a malicious phishing website, where the users are prompted to download malware, or they might be asked to provide their financial or login details. </p>\n<p>Hence, understanding what is DNS cache poisoning, how to detect it, and ways to prevent it is crucial so you can <a href=\"https://www.loginradius.com/blog/identity/2020/06/consumer-data-privacy-security/\">protect your business</a> against it. </p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-loginradius\"\n        title=\"book-a-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"January 13, 2021","updated_date":null,"description":"DNS cache poisoning is an attack that uses changed DNS records to redirect online traffic to a website that is fake and resembles its intended destination.","title":"DNS Cache Poisoning: Why Is It Dangerous for Your Business","tags":["security"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.408450704225352,"src":"/static/f31909dafa2f358eea05d48bd9c92886/9a31d/dns-cache-poisoning-is-dangerous-for-your-business.jpg","srcSet":"/static/f31909dafa2f358eea05d48bd9c92886/f836f/dns-cache-poisoning-is-dangerous-for-your-business.jpg 200w,\n/static/f31909dafa2f358eea05d48bd9c92886/2244e/dns-cache-poisoning-is-dangerous-for-your-business.jpg 400w,\n/static/f31909dafa2f358eea05d48bd9c92886/9a31d/dns-cache-poisoning-is-dangerous-for-your-business.jpg 767w","sizes":"(max-width: 767px) 100vw, 767px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},{"node":{"excerpt":"Introduction How to set up 2FA on your accounts? And why is it important in the first place? As social media is becoming increasingly…","fields":{"slug":"/identity/how-to-setup-2fa-in-online-accounts/"},"html":"<h2 id=\"introduction\" style=\"position:relative;\"><a href=\"#introduction\" aria-label=\"introduction permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Introduction</h2>\n<p>How to set up 2FA on your accounts? And why is it important in the first place? As social media is becoming increasingly popular, security is becoming something of supreme importance. </p>\n<p>Even though choosing a <a href=\"https://www.loginradius.com/blog/identity/2021/01/how-to-choose-a-secure-password/\">strong password</a> helps you in certain ways, by adopting 2FA, you can improve and enhance security further. So, let's know more about this extra layer of protection and how to set up 2FA on your accounts. </p>\n<p>First stop. </p>\n<h2 id=\"what-is-two-factor-authentication\" style=\"position:relative;\"><a href=\"#what-is-two-factor-authentication\" aria-label=\"what is two factor authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>What is Two-Factor Authentication?</strong></h2>\n<p>2FA is one of the best security methods that use two layers to verify a consumer's identity. This means, rather than simply entering the password to log into an account, two-factor authentication requires a code to be sent via text message to the consumer's phone number or generated through an app.</p>\n<p>This type of verification code helps and ensures that only the authorized consumer can access their account. Similarly, <a href=\"https://www.loginradius.com/blog/identity/2019/06/what-is-multi-factor-authentication/\">multi-factor authentication (MFA)</a> offers two or more authentication layers to approve account access for consumers. </p>\n<h2 id=\"types-of-2fa-methods\" style=\"position:relative;\"><a href=\"#types-of-2fa-methods\" aria-label=\"types of 2fa methods permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Types of 2FA Methods</h2>\n<p>SMS Verification is one of the most common forms of 2FA. It involves sending a one-time code via text message to the user's registered phone number. While widely accessible and requiring no internet connection, it is vulnerable to SIM swapping attacks and relies on the reliability of the cellular network.</p>\n<p>Authenticator Apps, such as Google Authenticator, Microsoft Authenticator, and Authy, generate time-based codes for authentication. These apps provide offline functionality, making them useful in areas with no network coverage. They are also less susceptible to phishing attacks compared to SMS. However, they require installation and setup on a smartphone, and there is a risk of losing access if the device is lost or reset.</p>\n<p>Hardware Tokens, like YubiKey or RSA SecurID, are physical devices that generate codes for authentication. They offer a high level of security since they are not connected to the internet, providing protection against phishing attacks. However, they can be costly to implement for individuals, and there is a risk of losing the hardware token.</p>\n<p>Biometric Authentication uses features like fingerprint, face, or iris scans for verification. It offers convenience and a high level of security. However, it requires compatible devices and there is a risk of compromising biometric data.</p>\n<p>Backup Codes are pre-generated codes used as a backup when the primary 2FA method is unavailable. They provide access in emergencies but are limited in use and must be securely stored to prevent unauthorized access.</p>\n<h2 id=\"what-are-authenticator-apps\" style=\"position:relative;\"><a href=\"#what-are-authenticator-apps\" aria-label=\"what are authenticator apps permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>What are Authenticator Apps?</strong></h2>\n<p>Authenticator apps are meant to be installed on your smartphones to obtain passcodes to sign in to your accounts. They are intended to be more secure than texting; they provide<a href=\"https://www.loginradius.com/blog/identity/2018/12/use-multi-factor-authentication-dont-cell-phone-access/\"> flexibility if you are traveling to a place where there is no mobile service</a>.</p>\n<p>Some of the options include <a href=\"https://support.google.com/accounts/answer/1066447\">Google Authenticator</a>, <a href=\"https://authy.com/guides/microsoft/\">Microsoft Authenticator Authy</a>, or HDE OTP. </p>\n<p>All these apps follow the same procedure - when you are adding a new user account, you need to scan a QR code associated with the account, and it is saved in the app. </p>\n<p>The next time you sign in to your app or service, it will ask for a numerical code. You need to open up the authenticator app and check the randomly generated authentication code to access your account securely.</p>\n<h2 id=\"how-to-set-up-2fa-on-your-social-media-accounts\" style=\"position:relative;\"><a href=\"#how-to-set-up-2fa-on-your-social-media-accounts\" aria-label=\"how to set up 2fa on your social media accounts permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>How to Set up 2FA on Your Social Media Accounts?</strong></h2>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 60.61538461538461%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"how-to-set-up-2fa-on-your-social-media-accounts\"\n        title=\"how-to-set-up-2fa-on-your-social-media-accounts\"\n        src=\"/static/273ab25be8c7050b176fa9b264da745a/e5715/how-to-set-up-2fa-on-your-social-media-accounts.png\"\n        srcset=\"/static/273ab25be8c7050b176fa9b264da745a/a6d36/how-to-set-up-2fa-on-your-social-media-accounts.png 650w,\n/static/273ab25be8c7050b176fa9b264da745a/e5715/how-to-set-up-2fa-on-your-social-media-accounts.png 768w,\n/static/273ab25be8c7050b176fa9b264da745a/2bef9/how-to-set-up-2fa-on-your-social-media-accounts.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>A lot of applications offer 2FA currently, especially if you are storing important and sensitive data, financial information, emails, social media, files, contact details, etc. </p>\n<p>2FA needs more than one factor to login. This might include parameters like \"something you are,\" for example, biometrics in the form of iris scan or fingerprints, \"something you know,\" a password, and \"something you have,\" like a smartphone or hardware key. </p>\n<p>Find out how to set up 2FA on your accounts: </p>\n<h3 id=\"1-google\" style=\"position:relative;\"><a href=\"#1-google\" aria-label=\"1 google permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. Google</h3>\n<p>If you want to set up an authenticator on the Google account, first you need to download the Google Authenticator app available on the Play Store. Once downloaded, do the following:</p>\n<ul>\n<li>Go to Gmail and click the profile icon.</li>\n<li>Choose My account and click on Sign-in &#x26; Security. </li>\n</ul>\n<p>You can add the two-<strong>step verification</strong> process here.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 640px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 62.5%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"how-to-setup-2fa-in-google\"\n        title=\"how-to-setup-2fa-in-google\"\n        src=\"/static/c0bacbd3e54b16138246bdaa360c4e57/6af66/how-to-setup-2fa-in-google.png\"\n        srcset=\"/static/c0bacbd3e54b16138246bdaa360c4e57/6af66/how-to-setup-2fa-in-google.png 640w\"\n        sizes=\"(max-width: 640px) 100vw, 640px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>Source: Google</p>\n<h3 id=\"2-snapchat\" style=\"position:relative;\"><a href=\"#2-snapchat\" aria-label=\"2 snapchat permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. Snapchat</h3>\n<p>To set up 2FA on your Snapchat account, you will need to:</p>\n<ul>\n<li>Go to the app’s main camera screen and tap on the profile icon. </li>\n<li>Find the gear icon to access Settings.</li>\n<li>Tap on Two-Factor Authentication and choose whether to obtain verification via a text message or an authenticator app. </li>\n</ul>\n<p>You can add trusted devices or request a recovery code for when you intend to be somewhere without cellular coverage once 2FA has been activated on your Snapchat account. Safety key logins do not currently appear to be supported by Snapchat.</p>\n<h3 id=\"3-whatsapp\" style=\"position:relative;\"><a href=\"#3-whatsapp\" aria-label=\"3 whatsapp permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3. Whatsapp</h3>\n<p>To set up 2FA on your WhatsApp account, you will need to:</p>\n<ul>\n<li>Open WhatsApp on your device. </li>\n<li>Under the upper-right hamburger icon, find the Settings menu.</li>\n<li>Go to Look under Account > Two-step verification > Allow.</li>\n<li>You will be prompted to end a six-digit PIN to verify your account. If you forget your PIN, you can optionally add an email address.  </li>\n</ul>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 512px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 71.2890625%; position: relative; bottom: 0; left: 0; background-image: url('data:image/jpeg;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"how-to-set-up-2fa-in-whatsapp\"\n        title=\"how-to-set-up-2fa-in-whatsapp\"\n        src=\"/static/fc235cf472e72141128d2d15ca80f1f6/36dd4/how-to-set-up-2fa-in-whatsapp.jpg\"\n        srcset=\"/static/fc235cf472e72141128d2d15ca80f1f6/36dd4/how-to-set-up-2fa-in-whatsapp.jpg 512w\"\n        sizes=\"(max-width: 512px) 100vw, 512px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>Source: lifewire</p>\n<p>It is important to have an associated email with your WhatsApp account as the service will not allow you to reverify yourself if you have used WhatsApp and forgotten your PIN within the last seven days. </p>\n<h3 id=\"4-outlook\" style=\"position:relative;\"><a href=\"#4-outlook\" aria-label=\"4 outlook permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>4. Outlook</h3>\n<p>To set up 2FA on your Outlook account, you will need to:</p>\n<ul>\n<li>Sign in to your Outlook account.</li>\n<li>Click on your name and then click View Account. </li>\n<li>Under the Basic Options, click on the link that says Explore more security options.</li>\n</ul>\n<p>If you have not set up 2FA yet, you can click on the link and proceed with that. You can switch to Microsoft Authenticator by clicking the Set up identity verification app if you already have it.</p>\n<h3 id=\"5-facebook\" style=\"position:relative;\"><a href=\"#5-facebook\" aria-label=\"5 facebook permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>5. Facebook</h3>\n<p>To set up 2FA on your Facebook account, you will need to:</p>\n<ul>\n<li>Sign in to your Facebook account.</li>\n<li>Click on Settings and choose Security and Login.</li>\n<li>Check for the use of two-factor authentication in the Setting Up Extra Security section. </li>\n<li>Enable the code generator.</li>\n</ul>\n<p>You can also use the Facebook mobile app for approving sign-ins on the web or set up a third-party authentication app for generating codes.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 512px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 66.6015625%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"how-to-set-up-2fa-in-facebook\"\n        title=\"image_tooltip\"\n        src=\"/static/da495ad00f525f0905f9a856f515fa59/01e7c/how-to-set-up-2fa-in-facebook.png\"\n        srcset=\"/static/da495ad00f525f0905f9a856f515fa59/01e7c/how-to-set-up-2fa-in-facebook.png 512w\"\n        sizes=\"(max-width: 512px) 100vw, 512px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>Source: Facebook</p>\n<h3 id=\"6-twitter\" style=\"position:relative;\"><a href=\"#6-twitter\" aria-label=\"6 twitter permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>6. Twitter</h3>\n<p>To set up 2FA on your Twitter account, you will need to:</p>\n<ul>\n<li>Sign in to your Twitter account.</li>\n<li>Click on your Profile Icon and then click Settings and Privacy.</li>\n<li>Click the checkbox next to Verify login requests, under the Security heading.</li>\n<li>Verify your mobile number and then click Set up a code generator app. </li>\n<li>Scan the QR code with the third-party authenticator app. </li>\n</ul>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 53.07692307692308%; position: relative; bottom: 0; left: 0; background-image: url('data:image/jpeg;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"how-to-set-up-2fa-in-twitter\"\n        title=\"how-to-set-up-2fa-in-twitter\"\n        src=\"/static/0b4ba884ab0cedb6ce56d12f2efdf4d4/212bf/how-to-set-up-2fa-in-twitter.jpg\"\n        srcset=\"/static/0b4ba884ab0cedb6ce56d12f2efdf4d4/6aca1/how-to-set-up-2fa-in-twitter.jpg 650w,\n/static/0b4ba884ab0cedb6ce56d12f2efdf4d4/212bf/how-to-set-up-2fa-in-twitter.jpg 768w,\n/static/0b4ba884ab0cedb6ce56d12f2efdf4d4/6c74b/how-to-set-up-2fa-in-twitter.jpg 915w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<h3 id=\"7-apple-icloud\" style=\"position:relative;\"><a href=\"#7-apple-icloud\" aria-label=\"7 apple icloud permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>7. Apple iCloud</h3>\n<ul>\n<li>You can log in to your account at <a href=\"https://appleid.apple.com/\">appleid</a>, then search for Two-Factor Authentication under Security.</li>\n<li>The next step would be to verify your location, and it will send a code to your other Apple devices.</li>\n<li><strong>iOS</strong></li>\n</ul>\n<p>To set up 2FA on your iOS account, the steps will be a bit different. Majorly, it will depend on how you have updated your iOS software. </p>\n<ul>\n<li>For users using iOS 10.3 or later versions, click on Settings > your Name > Password &#x26; Security. </li>\n<li>You can turn on 2FA to receive a text message with a code every time you log in. </li>\n</ul>\n<p>For users using iOS 10.2 or earlier versions, go to Settings under iCloud > Apple ID > Password &#x26; Security.</p>\n<ul>\n<li><strong>macOS</strong></li>\n</ul>\n<p>Similar to iOS, a few of the steps may vary depending on the version of macOS.</p>\n<ul>\n<li>If you are using Catalina, click the Apple icon, then click System Preferences > Apple ID. </li>\n<li>The next step would be to click on Password &#x26; Security under your name and finally click Turn On Two-Factor Authentication.</li>\n</ul>\n<h3 id=\"8-instagram\" style=\"position:relative;\"><a href=\"#8-instagram\" aria-label=\"8 instagram permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>8. Instagram</h3>\n<p>In 2017, two-factor authentication was added by Instagram to the mobile app, which can be activated via the web. If you want to activate 2FA on your mobile device, you need to go to Profile and click on the menu and look for Settings &#x26; Security. There you will find two-factor authentication. </p>\n<p>With Instagram, you also get to choose between SMS-based verification and a code sent to the authentication app. </p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 60%; position: relative; bottom: 0; left: 0; background-image: url('data:image/jpeg;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"how-to-set-up-2fa-in-instagram\"\n        title=\"image_tooltip\"\n        src=\"/static/5933cb3ce0455c2d21e3264192832e1c/212bf/how-to-set-up-2fa-in-instagram.jpg\"\n        srcset=\"/static/5933cb3ce0455c2d21e3264192832e1c/6aca1/how-to-set-up-2fa-in-instagram.jpg 650w,\n/static/5933cb3ce0455c2d21e3264192832e1c/212bf/how-to-set-up-2fa-in-instagram.jpg 768w,\n/static/5933cb3ce0455c2d21e3264192832e1c/00cd3/how-to-set-up-2fa-in-instagram.jpg 1460w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>Source: Kaspersky</p>\n<h2 id=\"why-is-2fa-important\" style=\"position:relative;\"><a href=\"#why-is-2fa-important\" aria-label=\"why is 2fa important permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>Why is 2FA important?</strong></h2>\n<p>As cybercriminals are getting smarter, 2FA has become more mandatory than ever. Without it, you might end up leaving your <a href=\"https://www.loginradius.com/blog/identity/2020/12/login-security/\">accounts vulnerable to hackers</a> for sealing your personal information, hacking your online credit card details, and accessing your bank account. By adding the additional step to your account, you get the edge to prevent hackers from accessing your account. </p>\n<h2 id=\"common-2fa-mistakes-to-avoid\" style=\"position:relative;\"><a href=\"#common-2fa-mistakes-to-avoid\" aria-label=\"common 2fa mistakes to avoid permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Common 2FA Mistakes to Avoid</h2>\n<p>Using SMS as the Sole Method is a common mistake, as SMS codes are vulnerable to interception through SIM swapping attacks. It is advised to use authenticator apps or hardware tokens for added security.</p>\n<p>Not Storing Backup Codes Securely renders them useless if lost or compromised. It is crucial to store backup codes in a secure location, such as a password manager or a locked safe.</p>\n<p>Using Predictable Codes is another mistake, as codes generated by apps can be predictable if not set up correctly. It is important to ensure apps are configured for random, time-based codes rather than sequential ones.</p>\n<p>Ignoring Biometric 2FA Options is a missed opportunity for added security. Biometric methods offer high security but may not be utilized if available on devices.</p>\n<p>Sharing 2FA Codes undermines the purpose of 2FA. Users should be educated not to share codes with anyone, including family and friends, to maintain security.</p>\n<h2 id=\"comparison-of-popular-authenticator-apps\" style=\"position:relative;\"><a href=\"#comparison-of-popular-authenticator-apps\" aria-label=\"comparison of popular authenticator apps permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Comparison of Popular Authenticator Apps</h2>\n<p>Google Authenticator is known for its simple setup with QR codes and offline functionality. However, it lacks backup or sync options and does not support multi-device use.</p>\n<p>Microsoft Authenticator supports both Microsoft accounts and third-party apps. It offers cloud backup for easy recovery. However, it requires a Microsoft account and may not be as straightforward for non-Microsoft services.</p>\n<p>Authy provides multi-device support and offers cloud backup and sync for easy recovery. However, it requires an account for backup, and some users prefer fully offline solutions.</p>\n<p>HDE OTP (One-Time Password) is secure and easy-to-use, working offline for added convenience. However, it is less widely adopted than other options and offers limited additional features.</p>\n<p>YubiKey, a Hardware Token, boasts high-security standards and does not rely on mobile devices. However, it can be costly for individual users and poses a risk of being lost or damaged.</p>\n<p>Users can consider these factors when choosing the most suitable authenticator app based on their needs for security, convenience, and compatibility with various services.</p>\n<h2 id=\"setting-up-2fa-login-with-loginradius-adaptive-2fa-mfa-solution\" style=\"position:relative;\"><a href=\"#setting-up-2fa-login-with-loginradius-adaptive-2fa-mfa-solution\" aria-label=\"setting up 2fa login with loginradius adaptive 2fa mfa solution permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>Setting Up 2FA Login with LoginRadius Adaptive 2FA/ MFA solution</strong></h2>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 54.61538461538461%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"setting-up-2fa-with-loginradius\"\n        title=\"setting-up-2fa-with-loginradius\"\n        src=\"/static/64f8c8444cfce867e34a035922061380/e5715/setting-up-2fa-with-loginradius.png\"\n        srcset=\"/static/64f8c8444cfce867e34a035922061380/a6d36/setting-up-2fa-with-loginradius.png 650w,\n/static/64f8c8444cfce867e34a035922061380/e5715/setting-up-2fa-with-loginradius.png 768w,\n/static/64f8c8444cfce867e34a035922061380/d0143/setting-up-2fa-with-loginradius.png 1025w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>LoginRadius provides multi-factor authentication via SMS, email, automated phone calls, account <a href=\"https://www.loginradius.com/blog/identity/2019/01/best-practices-choosing-good-security-questions/\">security questions</a>, and authenticator apps to allow you a customized user experience.  </p>\n<p>Based on your business, you can choose to use LoginRadius's Identity Platform's Multi-factor authentication, which is an easy process. </p>\n<p>Currently, LoginRadius provides its support authentication methods via SMS workflow and Google Authenticator workflow.</p>\n<h3 id=\"for-sms-workflow\" style=\"position:relative;\"><a href=\"#for-sms-workflow\" aria-label=\"for sms workflow permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>For SMS Workflow</h3>\n<p>You can enable 2FA <a href=\"https://www.loginradius.com/docs/api/v2/customer-identity-api/multi-factor-authentication/sms-authenticator/mfa-validate-otp/\">SMS verification</a> from the LoginRadius admin console. There's also an option to choose your preferred SMS template and SMS provider.</p>\n<p>As the first step, you'll need to apply a first verification factor, like standard email and password login, username and password, automated phone call, or access token. The second factor can be a one-time password or code sent via SMS. </p>\n<p><a href=\"https://www.loginradius.com/resource/ebook/buyers-guide-to-multi-factor-authentication/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"buyer-guide-to-multi-factor-authentication-ebook\"\n        title=\"buyer-guide-to-multi-factor-authentication-ebook\"\n        src=\"/static/dce0b5caab393383c0c906c5653faa64/e5715/buyer-guide-to-multi-factor-authentication-ebook.png\"\n        srcset=\"/static/dce0b5caab393383c0c906c5653faa64/a6d36/buyer-guide-to-multi-factor-authentication-ebook.png 650w,\n/static/dce0b5caab393383c0c906c5653faa64/e5715/buyer-guide-to-multi-factor-authentication-ebook.png 768w,\n/static/dce0b5caab393383c0c906c5653faa64/63ff0/buyer-guide-to-multi-factor-authentication-ebook.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<h3 id=\"google-authenticator-workflow\" style=\"position:relative;\"><a href=\"#google-authenticator-workflow\" aria-label=\"google authenticator workflow permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Google Authenticator Workflow</h3>\n<p>For enabling Google Authenticator, the <a href=\"https://www.loginradius.com/integrations/google-authenticator/\">first step will be</a> to set up your ID in the admin console for Google to identify your website or application on the authenticator.</p>\n<p>Next, you will need to set up your QR code specifications or make MFA mandatory. </p>\n<p>Similar to the SMS workflow, you can select standard email and password login, username, password, automated phone call, or access token as the verification factor.</p>\n<h2 id=\"final-thoughts\" style=\"position:relative;\"><a href=\"#final-thoughts\" aria-label=\"final thoughts permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Final Thoughts</h2>\n<p>With <a href=\"https://www.loginradius.com/blog/identity/2019/10/cybersecurity-attacks-business/\">cybercrimes on the rise</a>, it is essential to make your online security measures more robust. Hence, to protect your account and the history, you need to learn how to set up 2fa login on your accounts for an additional safety cover. It not only protects your online social accounts but other accounts as well.</p>\n<h2 id=\"faqs\" style=\"position:relative;\"><a href=\"#faqs\" aria-label=\"faqs permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>FAQs</h2>\n<p><strong>1. How do I enable 2FA login?</strong></p>\n<p>2FA login can be enabled once you have a reliable identity management solution. In the system dashboard, under authentication, you can find 2FA and enable the same.</p>\n<p><strong>2. How do I activate my 2FA code?</strong></p>\n<p>Choose your method (SMS or authenticator app) during setup, then link the code to your account.</p>\n<p><strong>3. What is 2FA and how do you set it up?</strong></p>\n<p>2FA adds a second verification step (like a code from an app). Set it up by downloading an authenticator app, scanning a QR code, and entering the code generated.</p>\n<p><strong>4. Is 2FA easy to use?</strong></p>\n<p>Yes, 2FA is user-friendly. It involves entering a code or approving a notification on your phone during logins.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAGCAYAAADDl76dAAAACXBIWXMAAAsSAAALEgHS3X78AAABdElEQVQY002RO0/CUBzFG6PtbZWHCAmRmBB5P8vDII9SSC0omog4oAEGjZMO6OKEuLjoJ2Fx0cSBwUQnXZxcHPwux38LJA7nNvfec8+5v1tOCCiwpbbhye2BxbYgBMtgIRVioDRRsARGXxZUzLlEHmehBaesQ4rrEMPViYf2DR9nDGKkChbVICVqsMt1WJI1sHCFwhUsUIFohJH49TxECvRUjhDW2mAbB5iP6hB8hUkhiRPN5KIZYJdrsEYrcCSpmQqMm6/m9ylUhSulY7N5ivROB3L9GOlGF3Ktbc4zuz341UPw/uIk0ESbBjoSGlYIx8BfzjSwVmyCEYEUUmCPa3Bnd+hwC75yC95S05SxbolU/iEbOCFCpDexEfIioTNCNd6Tp6IlMnNuGeeDe3z//OLx5RWj5zFGT2O8fXxh/P4Ja6w6vSEFCnTIlW2YiDzhzX7ATFKojDlvjpBPcDF4QPdyiG5/iE7/BmfXd+hd3VKpCoG8fzxWw2+c+yTpAAAAAElFTkSuQmCC'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-loginradius\"\n        title=\"book-a-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"January 12, 2021","updated_date":null,"description":"2FA is one of the best security methods that use two layers to verify a consumer’s identity. This means, rather than simply entering the password to log into an account, two-factor authentication requires a code to be sent via text message to a consumer's phone number or generated through an app","title":"How to Set Up Two-factor Authentication on All Your Online Accounts?","tags":["2fa","mfa","cx"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.408450704225352,"src":"/static/77348c75b6cf25e28b8f7f2daf5442b2/9a31d/how-to-setup-2fa-online-accounts.jpg","srcSet":"/static/77348c75b6cf25e28b8f7f2daf5442b2/f836f/how-to-setup-2fa-online-accounts.jpg 200w,\n/static/77348c75b6cf25e28b8f7f2daf5442b2/2244e/how-to-setup-2fa-online-accounts.jpg 400w,\n/static/77348c75b6cf25e28b8f7f2daf5442b2/9a31d/how-to-setup-2fa-online-accounts.jpg 767w","sizes":"(max-width: 767px) 100vw, 767px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}}]},"markdownRemark":{"excerpt":"Identity is evolving, and developers are at the forefront of this transformation. Every day brings a new learning—adapting to new standards…","fields":{"slug":"/identity/developer-first-identity-provider-loginradius/"},"html":"<p>Identity is evolving, and developers are at the forefront of this transformation. Every day brings a new learning—adapting to new standards and refining approaches to building secure, seamless experiences.</p>\n<p>We’re here to support developers on that journey. We know how important simplicity, efficiency, and well-structured documentation are when working with identity and access management solutions. That’s why we’ve redesigned the <a href=\"https://www.loginradius.com/\">LoginRadius website</a>—to be faster, more intuitive, and developer-first in every way.</p>\n<p>The goal? Having them spend less time searching and more time building.</p>\n<h2 id=\"whats-new-and-improved-on-the-loginradius-website\" style=\"position:relative;\"><a href=\"#whats-new-and-improved-on-the-loginradius-website\" aria-label=\"whats new and improved on the loginradius website permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What’s New and Improved on the LoginRadius Website?</h2>\n<p>LoginRadius’ vision is to give developers a product that simplifies identity management so they can focus on building, deploying, and scaling their applications. To enhance this experience, we’ve spent the last few months redesigning our interface— making navigation more intuitive and reassuring that essential resources are easily accessible.</p>\n<p>Here’s a closer look at what’s new and why it’s important:</p>\n<h3 id=\"a-developer-friendly-dark-theme\" style=\"position:relative;\"><a href=\"#a-developer-friendly-dark-theme\" aria-label=\"a developer friendly dark theme permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>A Developer-Friendly Dark Theme</h3>\n<p><img src=\"/f46881583c7518a93bb24e94c32320de/a-developer-friendly-dark-theme.webp\" alt=\"This image shows how LoginRadius offers several authentication methods like traditional login, social login, passwordless login, passkeys and more in a dark mode.\">    </p>\n<p>Developers spend long hours working in dark-themed IDEs and terminals, so we’ve designed the LoginRadius experience to be developer-friendly and align with that preference.</p>\n<p>The new dark mode reduces eye strain, enhances readability, and provides a seamless transition between a coding environment and our platform. Our new design features a clean, modern aesthetic with a consistent color scheme and Barlow typography, ensuring better readability. High-quality graphics and icons are thoughtfully placed to enhance the content without adding visual clutter.</p>\n<p>So, whether you’re navigating our API docs or configuring authentication into your system, our improved interface will make those extended development hours more comfortable and efficient.</p>\n<h3 id=\"clear-categorization-for-loginradius-capabilities\" style=\"position:relative;\"><a href=\"#clear-categorization-for-loginradius-capabilities\" aria-label=\"clear categorization for loginradius capabilities permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Clear Categorization for LoginRadius Capabilities</h3>\n<p><img src=\"/e5358b82be414940f3fb146013845933/capabilities.webp\" alt=\"This image shows a breakdown of all the LoginRadius CIAM capabilities, including authentication, security, UX, scalability and multi-brand management.\"></p>\n<p>We’ve restructured our website to provide a straightforward breakdown of our customer identity and access management platform capabilities, helping you quickly find what you need:</p>\n<ul>\n<li>Authentication: Easily understand <a href=\"https://www.loginradius.com/blog/identity/authentication-option-for-your-product/\">how to choose the right login method</a>, from traditional passwords and OTPs to social login, federated SSO, and passkeys with few lines of code.</li>\n<li>Security: Implement no-code security features like bot detection, IP throttling, breached password alerts, DDoS protection, and adaptive MFA to safeguard user accounts.</li>\n<li>User Experience: Leverage AI builder, hosted pages, and drag-and-drop workflows to create smooth, branded sign-up and login experiences.</li>\n<li>High Performance &#x26; Scalability: Confidently scale with sub-100ms API response times, 100% uptime, 240K+ RPS, and 28+ global data center regions.</li>\n<li>Multi-Brand Management: Efficiently manage multiple identity apps, choosing isolated or shared data stores based on your brand’s unique needs.</li>\n</ul>\n<p>This structured layout ensures you can quickly understand each capability and how it integrates into your identity ecosystem.</p>\n<h3 id=\"developer-first-navigation\" style=\"position:relative;\"><a href=\"#developer-first-navigation\" aria-label=\"developer first navigation permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Developer-First Navigation</h3>\n<p><img src=\"/a8c155c2b6faf3d5f4b4de4e2b14d763/developers-menu.webp\" alt=\"This image shows the LoginRadius menu bar, highlighting the developer dropdown.\">   </p>\n<p>We’ve been analyzing developer workflows to identify how you access key resources. That’s why we redesigned our navigation with one goal in mind: to reduce clicks and make essential resources readily available.</p>\n<p>The new LoginRadius structure puts APIs, SDKs, and integration guides right at the menu bar under the Developers dropdown so you can get started faster. Our Products, Solutions, and Customer Services are also clearly categorized, helping development teams quickly find the right tools and make informed decisions.</p>\n<h3 id=\"quick-understanding-of-integration-benefits\" style=\"position:relative;\"><a href=\"#quick-understanding-of-integration-benefits\" aria-label=\"quick understanding of integration benefits permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Quick Understanding of Integration Benefits</h3>\n<p><img src=\"/b2f9a964a2da0ea83e2f8596b833bba7/we-support-your-tech-stack.webp\" alt=\"This image shows a list of popular programming languages and frameworks offered by LoginRadius.\"></p>\n<p>Developers now have a clear view of the tech stack available with LoginRadius, designed to support diverse business needs.</p>\n<p>Our platform offers pre-built SDKs for Node.js, Python, Java, and more, making CIAM integration seamless across popular programming languages and frameworks.</p>\n<h2 id=\"over-to-you-now\" style=\"position:relative;\"><a href=\"#over-to-you-now\" aria-label=\"over to you now permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Over to You Now!</h2>\n<p>Check out our <a href=\"https://www.loginradius.com/\">revamped LoginRadius website</a> and see how the improved experience makes it easier to build, scale, and secure your applications.</p>\n<p>Do not forget to explore the improved navigation and API documentation, and get started with our free trial today. We’re excited to see what you’ll build with LoginRadius!</p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"February 21, 2025","updated_date":null,"description":"LoginRadius’ vision is to give developers a product that simplifies identity management so they can focus on building, deploying, and scaling their applications. To enhance this experience, we’ve redesigned our website interface, making navigation more intuitive and reassuring that essential resources are easily accessible.","title":"Revamped & Ready: Introducing the New Developer-First LoginRadius Website","tags":["Developer tools","API","Identity Management","User Authentication"],"pinned":true,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.7857142857142858,"src":"/static/80b4e4fbe176a10a327d273504607f32/58556/hero-section.webp","srcSet":"/static/80b4e4fbe176a10a327d273504607f32/61e93/hero-section.webp 200w,\n/static/80b4e4fbe176a10a327d273504607f32/1f5c5/hero-section.webp 400w,\n/static/80b4e4fbe176a10a327d273504607f32/58556/hero-section.webp 800w,\n/static/80b4e4fbe176a10a327d273504607f32/99238/hero-section.webp 1200w,\n/static/80b4e4fbe176a10a327d273504607f32/7c22d/hero-section.webp 1600w,\n/static/80b4e4fbe176a10a327d273504607f32/1258b/hero-section.webp 2732w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},"pageContext":{"limit":6,"skip":312,"currentPage":53,"type":"//identity//","numPages":70,"pinned":"ee8a4479-3471-53b1-bf62-d0d8dc3faaeb"}},"staticQueryHashes":["1171199041","1384082988","2100481360","23180105","528864852"]}