{"componentChunkName":"component---src-templates-blog-list-template-js","path":"/identity/54","result":{"data":{"allMarkdownRemark":{"edges":[{"node":{"excerpt":"Fundamentally, digital transformation is the accumulation of modern tools and processes to solve market challenges and provides…","fields":{"slug":"/identity/what-is-digital-transformation/"},"html":"<p>Fundamentally, digital transformation is the accumulation of modern tools and processes to solve market challenges and provides possibilities for upbeat consumer intimacy.</p>\n<p>When it comes to businesses, every era brings its own <em>buzzword</em>. </p>\n<p>For example, for the '90s, it was the internet. Towards the beginning of this century, it was social media. And now, it's digital transformation. </p>\n<p>Companies need to gear up and leverage technologies to satisfy their employees and consumers today. </p>\n<p>We can further gauge the importance of organizations having to invest in new-age transformation, when former Executive Chairman of Cisco System, <a href=\"https://www.linkedin.com/in/johnchambersjc?challengeId=AQGj82b-dklBrwAAAXbhY6du4U1xpb-eEQscCsXGTjVf1-tgV8O429bPJ6qulSCN0WBxVHl9o5Yd8iLIunNKF65tAy_kvO9Jzg&#x26;submissionId=e49444cc-aa38-5816-7489-798dda357e18\">John Chambers</a> stated, \"At least 40% of all businesses will die by 2025, if they don't figure out how to change their entire company to accommodate new technologies.\" </p>\n<p>But despite such affirmatives, digital transformation has a long way to go. In this blog, we have summarized its importance for organizations, what has changed during the pandemic, and what to look forward to in 2021. </p>\n<p>Let's start with the definition.</p>\n<h2 id=\"what-is-digital-transformation\" style=\"position:relative;\"><a href=\"#what-is-digital-transformation\" aria-label=\"what is digital transformation permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is Digital Transformation</h2>\n<p>Digital transformation is the process of leveraging digital technology to develop new business processes and consumer experiences to meet the changing market dynamics or to alter the existing ones. </p>\n<p>Beyond that, it is also an aggregation of cultural change that expects companies to experiment often and not get demotivated when new practices and not accepted in public. </p>\n<p>However, note that every company reimagines transformation differently. It isn't easy to define a concept that applies to all. </p>\n<p>You can start by outlining your organization's problem statement, opportunities, and goals. In most cases, that revolves around:</p>\n<ul>\n<li>Utilizing digital technologies</li>\n<li>Reducing friction</li>\n<li>Increasing productivity</li>\n<li>Improving consumer experience </li>\n<li>Elevating the scope of profitability</li>\n</ul>\n<p>Digital transformation is interconnected. One innovation leads to another. So when process improvements happen, it leads to better product and service gains. When consumers grow accustomed to those changes, they demand more, and the cycle continues.</p>\n<p>All-in-all, you need to understand what digital transformation really means for your organization and what you should do to articulate it.</p>\n<h2 id=\"why-is-digital-transformation-crucial-for-enterprises\" style=\"position:relative;\"><a href=\"#why-is-digital-transformation-crucial-for-enterprises\" aria-label=\"why is digital transformation crucial for enterprises permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Why is Digital Transformation Crucial for Enterprises</h2>\n<p><a href=\"https://www.loginradius.com/blog/identity/2018/11/enterprise-needs-digital-business-transformation-strategy/\">Organizations may idealize</a> digital transformation for many reasons. But the most likely explanation has to be <em>survival</em>. </p>\n<p>Think of it this way. The more simplicity you bring for consumers, the more likely are your chances of survival. </p>\n<p>The <a href=\"https://info.themanufacturer.com/amr-2020\">Annual Manufacturing Report 2020</a> showcases that senior manufacturing executives are clearly prioritizing digital transformation. The finding shows: </p>\n<ul>\n<li>87% of companies prefer digital technologies for future prosperity.</li>\n<li>89% of companies acknowledge how digital technologies improve their inbound and outbound supply chain relationships.</li>\n<li>91% of companies agree that digitalization has made their employees more productive.</li>\n<li>87% of companies find that digital technology has further accelerated innovation. </li>\n<li>66% of companies are already considering cloud computing, and 63% are inclining towards automation. </li>\n<li>Almost one in two businesses are implementing some form of cybersecurity policies. </li>\n</ul>\n<p>The world of business is changing. Organizations are willing to experiment, adopt, and adapt to new technologies. </p>\n<p>So, where do you stand? Are you still going traditional? </p>\n<p>Are you developers migrating to the cloud environment? Are you already making technological decisions? Or are you still waiting for a wake-up call? </p>\n<p>Wherever you are... START! </p>\n<h2 id=\"has-digital-transformation-changed-with-the-covid-19-pandemic\" style=\"position:relative;\"><a href=\"#has-digital-transformation-changed-with-the-covid-19-pandemic\" aria-label=\"has digital transformation changed with the covid 19 pandemic permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Has Digital Transformation Changed With the COVID-19 Pandemic</h2>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 60.61538461538461%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAMCAYAAABiDJ37AAAACXBIWXMAAAsSAAALEgHS3X78AAAB2UlEQVQoz21SyU7rQBD0gcyMHyCCEHriwgElISEmUXgiAWdfyIKQAGUBXti58v/XohcnMYhD257pdnVVdXsuUwOHn67CZZtw+R5ccAF31IU7rOt9lF98r+obsFTP4Y46cuctk3Th8l34cfDjC3nHgbQ+lDt73Mcf+mc931bQXBve6ueBsmJ2uRb8w4aAy/knQ8q5wgCJTAN7pyNkO1MkUpQPegSYCmH/3cCc3cGE/2Ear7DlMXUfaKNsi5r1hb2AByyvLdZYOm8GHSQLPc2TSo8fpv6sgNVH+n6BJeCd6gzr5CGzZaAVu7p6S0QYmKUatotrKO/Z4qWyqsxgq3OsNd+Q7L4jd/uJ3VIfhmT55I36FqpcOruMDsznN9sTWaKAtUcJW57ClCfYrM+xP/zAdqELUxhGgDQEls/svg3o+/RVMrEztSeN83uKB5iT62hyKpmHkCySLJo8A4tkZhxbKwEUGUGf2E1oKHMBtZWpmO7LHobi0V7lCgftGfbD62gwtHfFkch1Ir2mHi72aulNtHfMwI8KmWm6OcbG2QQHrSm2SkMYbkjT/xVw5UX4yxKTd9Ro+2SEdGuMv+UraSC1qXAJtnh7cf0/gdyyUEETOfKbYjFhF7GKM/wCxPZfzi3IOnQAAAAASUVORK5CYII='); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"digital-transformation-changed-with-covid-19-pandemic\"\n        title=\"digital-transformation-changed-with-covid-19-pandemic\"\n        src=\"/static/1d52789e76a4c88d76c71caea01b9e1d/e5715/digital-transformation-changed-with-covid-19-pandemic.png\"\n        srcset=\"/static/1d52789e76a4c88d76c71caea01b9e1d/a6d36/digital-transformation-changed-with-covid-19-pandemic.png 650w,\n/static/1d52789e76a4c88d76c71caea01b9e1d/e5715/digital-transformation-changed-with-covid-19-pandemic.png 768w,\n/static/1d52789e76a4c88d76c71caea01b9e1d/2bef9/digital-transformation-changed-with-covid-19-pandemic.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>The answer is <em>yes</em>. The COVID-19 pandemic has pushed businesses over the \"technology\" edge forever. </p>\n<p>According to <a href=\"https://www.mckinsey.com/business-functions/strategy-and-corporate-finance/our-insights/how-covid-19-has-pushed-companies-over-the-technology-tipping-point-and-transformed-business-forever#\">McKinsey Global Survey</a>, the virus has accelerated the digitization of consumer and supply-chain interactions by three to four years. Also, the share of companies digitally-enabling product manufacture has accelerated by seven years.</p>\n<p>The survey also shows that the rates of digital adoption are three times likelier now than before the crisis.</p>\n<p><img src=\"/9eb2fc80034954d57222032429559347/covid-19-stats-digital-transformation.png\" alt=\"covid-19-stats-digital-transformation\"></p>\n<p>Source: Mckinsey</p>\n<p>Needless-to-say, the global pandemic has exposed the clear digital divide between companies across the globe. </p>\n<p>On one side, some businesses have invested in digital enablement as part of their <a href=\"https://www.loginradius.com/blog/identity/2020/03/loginradius-business-continuity-covid-19-outbreak/\">continuity plan</a> (and fared with almost zero setbacks). On the other side, there are those companies that are struggling to achieve the bare minimum. </p>\n<h2 id=\"what-will-the-structure-for-digital-transformation-look-like-in-2021\" style=\"position:relative;\"><a href=\"#what-will-the-structure-for-digital-transformation-look-like-in-2021\" aria-label=\"what will the structure for digital transformation look like in 2021 permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What Will the Structure for Digital Transformation Look Like in 2021</h2>\n<p>Looking ahead to 2021, digital transformation is set to <a href=\"/blog/growth/4-things-consider-starting-digital-transformation/\">become a crucial topic of discussion</a> in all boardrooms. </p>\n<p>Speaking of the positives, <a href=\"https://www.mckinsey.com/~/media/McKinsey/Industries/Retail/Our%20Insights/Perspectives%20on%20retail%20and%20consumer%20goods%20Number%208/Perspectives-on-Retail-and-Consumer-Goods_Issue-8.pdf\">63% of the McKinsey survey</a> respondents were affirmative that countries will pick up pace after the setback of 2020 and do better six months from now. </p>\n<p>Meanwhile, the global outlook has also bounced back. </p>\n<p>As businesses race to adjust to the new normal, we anticipate the following parameters to play out exceptionally on the global canvas. </p>\n<h3 id=\"digital-nationalism-will-be-the-buzzword\" style=\"position:relative;\"><a href=\"#digital-nationalism-will-be-the-buzzword\" aria-label=\"digital nationalism will be the buzzword permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Digital nationalism will be the buzzword.</h3>\n<p>Lately, new, emerging technologies are being responsible for a huge part of any country's economic value. This clearly means that businesses (no matter the size) are investing in big tech solutions to retain their edge in their respective industries. </p>\n<p>However, in these trying times, it is also crucial that countries invest in digital products and services that aid in national security and the economy at large. We should anticipate strengthened regulatory structures and increased scrutiny on activities related to merger and acquisition (M&#x26;A).</p>\n<p><a href=\"https://www.loginradius.com/resource/customer-identity-the-core-of-digital-transformation/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"customer-identity-the-core-of-digital-transformation\"\n        title=\"customer-identity-the-core-of-digital-transformation\"\n        src=\"/static/5585e9b7c984efdccda767c38763e342/e5715/customer-identity-the-core-of-digital-transformation.png\"\n        srcset=\"/static/5585e9b7c984efdccda767c38763e342/a6d36/customer-identity-the-core-of-digital-transformation.png 650w,\n/static/5585e9b7c984efdccda767c38763e342/e5715/customer-identity-the-core-of-digital-transformation.png 768w,\n/static/5585e9b7c984efdccda767c38763e342/63ff0/customer-identity-the-core-of-digital-transformation.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<h3 id=\"futuristic-workspaces-will-rule\" style=\"position:relative;\"><a href=\"#futuristic-workspaces-will-rule\" aria-label=\"futuristic workspaces will rule permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Futuristic workspaces will rule.</h3>\n<p>The COVID-19 pandemic seems to have hit the reset button on how people work. We are witnessing a changing approach of people towards jobs, mobility, and versatile work models. </p>\n<p>Nonetheless, we expect to see new work delivery models, along with a major transformation in employment constructs. Most of these latest models will be driven by digital realization platforms.</p>\n<h3 id=\"tech-debts-will-be-channelized\" style=\"position:relative;\"><a href=\"#tech-debts-will-be-channelized\" aria-label=\"tech debts will be channelized permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Tech debts will be channelized.</h3>\n<p>Technology debts is a common liability witnessed in large enterprises. This happens because businesses go through multiple cycles of tech acquisitions and implementations over time. </p>\n<p>The ongoing crisis may provide leaders with an opportunity to carefully assess their tech environment and recognize opportunities where such debts can be withdrawn. So, companies can leverage the cash flow for future digital investments when debts are taken care of. </p>\n<h3 id=\"digital-skills-will-take-the-lead\" style=\"position:relative;\"><a href=\"#digital-skills-will-take-the-lead\" aria-label=\"digital skills will take the lead permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Digital skills will take the lead.</h3>\n<p>Technologies will drive digital transformation, and they will also power a competitive edge for businesses. Only those with a triad of skills, viz. digital, professional, domain, and functional skills, will rule the future. </p>\n<p>For companies, this is an ideal time to focus on a digital talent pool and use the opportunity to create a universal foundation of digital skills.</p>\n<h3 id=\"digital-labour-will-witness-a-paradigm-shift\" style=\"position:relative;\"><a href=\"#digital-labour-will-witness-a-paradigm-shift\" aria-label=\"digital labour will witness a paradigm shift permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Digital labour will witness a paradigm shift.</h3>\n<p>The world was already onboarding digital labor and bots. But when COVID-19 happened, this shift towards automation further intensified. </p>\n<p>Now, companies will want to exploit digital channels that can stay unaffected in the event of a crisis and minimize dependency on workers.</p>\n<p>Moving on.</p>\n<p>Digital transformation will be a powerful lever in the response of companies to the current crisis. Therefore, it is expected of companies to formulate plans that will give them the ability to adapt their business models in accordance with the rapidly evolving business environment. </p>\n<ul>\n<li><strong>Understand your channel</strong>: Understand, in particular, which intermediary sites impact purchasing and how consumers toggle between channels.</li>\n<li><strong>Set targets</strong>: This includes monthly targets for direct sales, as well as indirect sales.</li>\n<li><strong>Identify target prospects and prioritize them</strong>: Targeting the right demographics or personas is important. And digital media makes micro-targeting possible for your business.</li>\n<li><strong>Leverage the use of channels</strong>: Articulate the advantages of using multiple digital platforms. </li>\n<li><strong>Highlight the differences, build suggestions</strong>: This involves the differences between online platforms and other channels. </li>\n<li><strong>Offer integration between channels</strong>: Seamlessly integrate different channels throughout the consumer journey.</li>\n<li><strong>Review competitors</strong>: Find out who your competitors are targeting and where do you lag.</li>\n<li><strong>Develop channel partners</strong>: Identify the leading players and influencers in your business ecosystem, and form strategic alliances.</li>\n</ul>\n<h2 id=\"what-drives-digital-transformation\" style=\"position:relative;\"><a href=\"#what-drives-digital-transformation\" aria-label=\"what drives digital transformation permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What Drives Digital Transformation</h2>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 54.769230769230774%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"what-drives-digital-transformation\"\n        title=\"what-drives-digital-transformation\"\n        src=\"/static/a94484bd83522808963b83f62b512b10/e5715/what-drives-digital-transformation.png\"\n        srcset=\"/static/a94484bd83522808963b83f62b512b10/a6d36/what-drives-digital-transformation.png 650w,\n/static/a94484bd83522808963b83f62b512b10/e5715/what-drives-digital-transformation.png 768w,\n/static/a94484bd83522808963b83f62b512b10/d0143/what-drives-digital-transformation.png 1025w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>As we speak of digital transformation or digital conversion, we are often focused on technology. With technology evolving so rapidly, it is tempting to believe it's the main force that has been driving digital transformation all along the way.</p>\n<p>But is it really so?</p>\n<p>Turns out, <em>no</em>, it isn't. </p>\n<p>According to <a href=\"https://www.pwc.com/us/en/library/digital-iq.html\">PwC's CFO Pulse survey</a>, nearly 50% of the organizations list consumer engagement and loyalty as their leading influencers when it comes to adopting digital transformation strategies in their company. </p>\n<p>This means companies that are undergoing digital transformation are also creating highly engaged consumers. According to <a href=\"https://www.prnewswire.com/news-releases/rosetta-consulting-study-shows-that-customer-engagement-increases-market-share-and-drives-revenue-growth-267184761.html\">Rosetta Consulting Study</a>, these consumers are:</p>\n<ul>\n<li>Six times more likely to experiment with new products and services launched by their favorite brand.</li>\n<li>Four times more likely to refer a brand to their friends and connections. </li>\n<li>Two times more likely to buy from their favorite brand, even when a competitor has a better product. </li>\n</ul>\n<p>There is one thing clear—_consumers _are running the show today. </p>\n<p>Businesses need to understand who these new kinds of digital customers are in order to offer better experiences and win big.</p>\n<p>You have to rethink new ways of interacting with your consumers. This means:</p>\n<ul>\n<li><strong>For B2B sales teams</strong>: Replace cold calling with social selling. You need to be always active where your consumers are. So, where else can you find them other than social media? Instead of waiting for them to contact you, take the first step, and reach out to them. Lure them to build a relationship with your brand.</li>\n<li><strong>For marketing teams</strong>: Cut off your expenses on offline marketing activities. No one uses billboards and direct mails anymore. Your consumers will benefit from highly personalized, data-driven marketing strategies instead.</li>\n<li><strong>For customer service teams</strong>: Your consumer's phone is not the only medium anymore. From social media, forums, and communities to review sites, there is a wide range of channels to seek support.</li>\n</ul>\n<h3 id=\"get-started-with-digital-transformation\" style=\"position:relative;\"><a href=\"#get-started-with-digital-transformation\" aria-label=\"get started with digital transformation permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Get Started with Digital Transformation</h3>\n<ul>\n<li><strong>Personalize your consumer experience.</strong></li>\n</ul>\n<p>Today's consumers want businesses to regard them as a distinctive individual and consider their personal preferences and purchasing background. </p>\n<p><a href=\"https://www.accenture.com/us-en/about/accenture-interactive-index\">According to Accenture</a>, 75% of consumers admit that they are more likely to purchase from an organization that:</p>\n<ul>\n<li>Identifies them by their name.</li>\n<li>Knows their purchase history.</li>\n<li>Recommends products based on their purchase history.</li>\n</ul>\n<p>Consumers today do mind companies using their data to make their lives easier. </p>\n<p>Moreso, as businesses, you should invest in a CRM system. They help you analyze data based on consumer's previous interactions. </p>\n<p>For example, you can get a clear understanding of your consumers by analyzing their product requests. This information can then be used to produce highly tailored messages, resulting in a more personalized experience.</p>\n<ul>\n<li><strong>Offer instant gratification.</strong></li>\n</ul>\n<p>Speed is more important than ever. Consumers expect responses from companies within seconds. They also anticipate the same response time on weekends as on weekdays—on-demand, 24 hours a day, 7 days per week.</p>\n<ul>\n<li><strong>Define your digital vision.</strong></li>\n</ul>\n<p>Identify why you are shifting and what you plan to accomplish. This is the basic component that will lead the rest of your journey.</p>\n<ul>\n<li><strong>Map your digital journey.</strong></li>\n</ul>\n<p>You must build a vision of how digitalization applies to your processes and where it can make a difference in achieving better consumer experiences. </p>\n<ul>\n<li><strong>Understand your digital maturity.</strong></li>\n</ul>\n<p>Perform a digital maturity assessment to find how much you have fared in leveraging digital transformation and the areas where you require improvement. </p>\n<h2 id=\"digital-transformation-trends-to-watch-out-in-2021\" style=\"position:relative;\"><a href=\"#digital-transformation-trends-to-watch-out-in-2021\" aria-label=\"digital transformation trends to watch out in 2021 permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Digital Transformation Trends to Watch Out in 2021</h2>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 60.61538461538461%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"digital-transformation-trends-to-watch-out-in-2021\"\n        title=\"digital-transformation-trends-to-watch-out-in-2021\"\n        src=\"/static/791f66f4f7e8410c3b9faeeba75f0499/e5715/digital-transformation-trends-to-watch-out-in-2021.png\"\n        srcset=\"/static/791f66f4f7e8410c3b9faeeba75f0499/a6d36/digital-transformation-trends-to-watch-out-in-2021.png 650w,\n/static/791f66f4f7e8410c3b9faeeba75f0499/e5715/digital-transformation-trends-to-watch-out-in-2021.png 768w,\n/static/791f66f4f7e8410c3b9faeeba75f0499/d0143/digital-transformation-trends-to-watch-out-in-2021.png 1025w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>2020 witnessed a massive undertaking of digital transformation across industries. Simultaneously, digital transformation fatigue became a regular appearance. </p>\n<p>Therefore, it is high time that you introspect your team and understand if they are getting tired or less engaged.</p>\n<p>2021 will also see the best of digital transformation in transit. Many have already stated the journey, and the rest is expected to follow soon. </p>\n<p>The uncertain way of global pandemic has introduced new patterns. Businesses and IT leaders should be aware of what's in the making. The following key digital transformation trends will take over the upcoming new normal in 2021.  </p>\n<h3 id=\"explosion-of-customer-data-platforms-cdp\" style=\"position:relative;\"><a href=\"#explosion-of-customer-data-platforms-cdp\" aria-label=\"explosion of customer data platforms cdp permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Explosion of Customer Data Platforms (CDP).</h3>\n<p>Data is growing exponentially, and it definitely won't stop anytime shortly. Data warehouse, analytics platforms, and visualization software will not lose significance. Still, at the same time, the world is about to witness a rapid adoption of customer data platforms (CDP) in 2021. </p>\n<p>So, what are these CDPs? A CDP is a packaged software that collects and organizes data from all available sources, tags it, and makes it accessible for anybody who wants to use it. </p>\n<p>Now that business processes have become much more decentralized, courtesy of the new work-from-home models and the ongoing growth of data collection, CDPs will become increasingly important in 2021. </p>\n<p>Companies such as Adobe, SAP, Oracle, and Microsoft are already invested heavily to bring new CDPs to the market.</p>\n<h3 id=\"automation-will-increase-financial-proficiency\" style=\"position:relative;\"><a href=\"#automation-will-increase-financial-proficiency\" aria-label=\"automation will increase financial proficiency permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Automation will increase financial proficiency.</h3>\n<p>As the world is trying to recover from the pandemic, financial institutions are particularly concerned about their shrinking revenue and loan losses. This has encouraged them to lean towards automation and robotics. </p>\n<p>While still in its earliest stages, Robotic Process Automation (RPA) can increase productivity by providing a cost-effective substitute to Human Resources. </p>\n<p>Other recorded advantages of RPA include improved consumer experiences, flexibility, upgraded precision, and proficiency in work. </p>\n<h3 id=\"utilization-of-ai\" style=\"position:relative;\"><a href=\"#utilization-of-ai\" aria-label=\"utilization of ai permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Utilization of AI.</h3>\n<p>When the pandemic hit, AI and data were suddenly liberalized and accelerated to a massive extent. It happened almost overnight that governments and organizations found themselves working together to establish a quicker way to avoid the spread of the virus.</p>\n<p>Everyone was turning their heads to AI, machine learning, and data. So, what began as an emergency in 2020 will continue to scale in 2021 and is likely to spread across a wide variety of opportunities. AI will be addressing global and business issues quicker, better, and on a broader scale.</p>\n<p>While many may still consider AI to be more of a future trend, it is already here and driving our everyday lives. For example, when you receive recommendations on Netflix or while shopping on Amazon, that's the work of an AI.  </p>\n<h3 id=\"quantum-computing-will-go-mainstream\" style=\"position:relative;\"><a href=\"#quantum-computing-will-go-mainstream\" aria-label=\"quantum computing will go mainstream permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Quantum computing will go mainstream.</h3>\n<p>2020 witnessed a number of achievements from various pioneers in the quantum industry, including IBM, Amazon, <a href=\"https://www.cnet.com/news/honeywell-fires-up-the-h1-its-second-generation-quantum-computer/\">Honeywell</a>, and Google.</p>\n<p>These companies have been favoring quantum advantage or supremacy by claiming that a quantum computer can calculate hundreds or thousands of times faster than a classical computer. Also, the technology in question is efficient enough to complete calculations that classical supercomputers can not do at all. </p>\n<p>Quantum computing was also at the forefront of digital transformation during the pandemic endeavors to stop the spread of infection, as well as the development of therapeutics and future vaccines. </p>\n<p>2021 will be no different. Quantum computing will continue to rise and bring more efficiencies to the table</p>\n<h3 id=\"work-from-home-will-outlast-the-pandemic\" style=\"position:relative;\"><a href=\"#work-from-home-will-outlast-the-pandemic\" aria-label=\"work from home will outlast the pandemic permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Work From Home will outlast the pandemic.</h3>\n<p>For quite a while, employees were pushing for greater job flexibility, and organizations opting to allow remote work were only a handful. In 2020, when the pandemic caught most companies off-guard, telecommuting seemed the only rational solution.</p>\n<p>Now, even when things are gradually getting back to normal, organizations are still allowing people to work from home—as a possible shield to protect from future outbreaks. Large tech organizations like <a href=\"https://www.indiatvnews.com/business/news-google-extends-work-from-home-policy-till-september-2021-671463\">Google</a> and Facebook have already extended their remote arrangements for parts of 2021. </p>\n<p>Now that companies know how remote setups work for them, also how they are more productive despite physical distance, work from home models may continue to exist for a few more years, and maybe beyond. </p>\n<h3 id=\"cybersecurity-will-gain-momentum\" style=\"position:relative;\"><a href=\"#cybersecurity-will-gain-momentum\" aria-label=\"cybersecurity will gain momentum permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Cybersecurity will gain momentum.</h3>\n<p>Between January and April 2020 alone, there was a <a href=\"https://www.mcafee.com/enterprise/en-us/assets/reports/rp-cloud-adoption-and-risk-report-work-from-home-edition.pdf\">630% rise in cyberattacks</a> on cloud accounts and a 238% rise in banks. Cybersecurity was the talk of the town throughout the pandemic. </p>\n<p>Because there were fewer employees onsite on the same network, it became crucial for companies to upgrade their cybersecurity strategies and extend them beyond their corporate network. </p>\n<p>Despite the attacks, 2021 may witness an accelerated workload migration to the cloud. A <a href=\"https://www.gartner.com/smarterwithgartner/the-cios-guide-to-distributed-cloud/\">Gartner analysis</a> finds \"distributed cloud\" may take over along with some profound security implications.  </p>\n<h2 id=\"the-role-of-culture-in-digital-transformation\" style=\"position:relative;\"><a href=\"#the-role-of-culture-in-digital-transformation\" aria-label=\"the role of culture in digital transformation permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>The Role of Culture in Digital Transformation</h2>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 54.769230769230774%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"the-role-of-culture-in-digital-transformation\"\n        title=\"the-role-of-culture-in-digital-transformation\"\n        src=\"/static/fc2697ed3b7bffa1d3c6a0060fe90505/e5715/the-role-of-culture-in-digital-transformation.png\"\n        srcset=\"/static/fc2697ed3b7bffa1d3c6a0060fe90505/a6d36/the-role-of-culture-in-digital-transformation.png 650w,\n/static/fc2697ed3b7bffa1d3c6a0060fe90505/e5715/the-role-of-culture-in-digital-transformation.png 768w,\n/static/fc2697ed3b7bffa1d3c6a0060fe90505/d0143/the-role-of-culture-in-digital-transformation.png 1025w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>Culture in digital transformation has no mysterious or unseen presence. Digital is about embedding culture into business operations to succeed, and not just update technology, redesign products, and improve client relationships. </p>\n<p>So, if you fail to align your business initiatives with employee values and expectations, you end up generating additional risks to your company's culture. The consequences include slow adoption of digital technologies, lost productivity, loss of market competitiveness, and an ultimate decrease in ROI. </p>\n<p>And that's not how digital transformation functions. You need a more systematic and collaborative attitude towards cultural change instead.  </p>\n<p>For organizations trying to shape their digital aspirations, what's lacking is transparent and realistic guidance on shaping their culture for the road ahead. </p>\n<p>Our best tip for any organization will be to invest in a sustained effort that allows teams to cultivate a more profound passion and empathy for their business.</p>\n<h2 id=\"how-do-you-measure-roi-on-digital-transformation\" style=\"position:relative;\"><a href=\"#how-do-you-measure-roi-on-digital-transformation\" aria-label=\"how do you measure roi on digital transformation permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How Do You Measure ROI on Digital Transformation</h2>\n<p>The ability to define and calculate the return on investment (ROI) of digital transformation can be very difficult for transformation leaders. </p>\n<p>After all, it is not possible to measure consumer experiences. Instead, you need to assess your business as a whole and consider the changes in your processes and workflows.</p>\n<p>How do you start? Simple. By creating a strong investment case. The following steps below will help you build a practical ROI model for your business. </p>\n<p><strong>Step 1: Narrow down your objectives for digital transformation</strong>: Do you want to digitize your data? Integrate touchpoints? Increase productivity in operations? Or repeat purchases? </p>\n<p>It can be one or a combination of many objectives. Jot down your roadmap to understand what KPIs you should measure. </p>\n<p><strong>Step 2: Define your cost centers</strong>: List out all your business areas where you have incorporated digital transformation. </p>\n<p>For example, it will include not just your IT department (which is an obvious choice for your technology upgrade). You should also consider the additional cost of training your employees to help them understand your new web portal.</p>\n<p><strong>Step 3: Allocate a figure to all consumer metrics</strong>: Make sure to include all potential impacts on sales from improvements in consumer experience like: </p>\n<ul>\n<li>Consumer churn</li>\n<li>Repeat purchases</li>\n<li>Referrals</li>\n<li>Satisfaction scores</li>\n<li>Operational costs (training, recruitment)</li>\n<li>Employee incentive schemes</li>\n</ul>\n<p><strong>Step 4: Set realistic timelines and milestones</strong>: When will you calculate the progress of each aspect of your digital transformation? The timeline is essential.</p>\n<p>For example, if you are launching a new self-serve application, your inbound call levels are bound to decrease in the first year. But your KPIs will gradually pick up as consumers enjoy the benefits of your product. Therefore, do not set your aspirations too high in the beginning. </p>\n<h2 id=\"meet-the-industry-experts\" style=\"position:relative;\"><a href=\"#meet-the-industry-experts\" aria-label=\"meet the industry experts permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Meet the Industry Experts</h2>\n<p>We have caught a few digital transformation leaders in action as they offer valuable perspective and guidance. </p>\n<ul>\n<li><strong><a href=\"https://www.linkedin.com/in/jimdswanson/\">Jim Swanson</a>, CIO at Johnson &#x26; Johnson</strong>: We talk about automating operations, people, and new business models. You could have all those things – but if leadership and culture aren't at heart, it fails.</li>\n<li><strong><a href=\"https://www.linkedin.com/in/dhinchcliffe\">Dion Hinchcliffe</a>, VP at Constellation Research</strong>: The top IT executives today must match the pace of change, fall behind, or lead the pack. That's the existential issue at stake, where bold action must be actively supported by out-of-the-box experimentation and pathfinding. </li>\n<li><strong><a href=\"https://www.linkedin.com/in/brysonkoehler\">Bryson Koehler</a>, CTO at Equifax</strong>: If you look at the vast majority of startups, they're not starting with giant, shrink-wrapped software packages as their company's base. If you're trying to create innovation inside a large enterprise, you shouldn't start with it either. You're not here to run the mainframe anymore. </li>\n<li><strong><a href=\"https://www.linkedin.com/in/svengerjets\">Sven Gerjets</a>, CTO at Mattel</strong>: If you don't have an organization that is supportive and entirely onboard with the transformation efforts, it's impossible to succeed. You need to have leaders that know what \"good\" looks like. </li>\n</ul>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>Digital transformation is an amalgamation of strategy, roadmap, goals, stakeholders, and all the parameters needed to succeed. </p>\n<p>Right now, businesses are rapidly including the creative use of data, be it via analytics, IoT, or machine learning etc. for their transformation activities. Clearly, in many ways, digital-led transitions are evolving and are here to stay. </p>\n<p>Only the adapters will survive!</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-loginradius\"\n        title=\"book-a-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"January 11, 2021","updated_date":null,"description":"Digital transformation is the process of leveraging digital technology to develop new business processes and consumer experiences to meet the changing market dynamics or to alter the existing ones. So, has the dynamics changed with the COVID-19 pandemic? You are about to find out.","title":"What is Digital Transformation","tags":["digital transformation","cybersecurity","cx"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.408450704225352,"src":"/static/1bde7f901817a3bbf2229ed97ea8977c/9a31d/what-is-digital-transformation.jpg","srcSet":"/static/1bde7f901817a3bbf2229ed97ea8977c/f836f/what-is-digital-transformation.jpg 200w,\n/static/1bde7f901817a3bbf2229ed97ea8977c/2244e/what-is-digital-transformation.jpg 400w,\n/static/1bde7f901817a3bbf2229ed97ea8977c/9a31d/what-is-digital-transformation.jpg 767w","sizes":"(max-width: 767px) 100vw, 767px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},{"node":{"excerpt":"No conversation on digital security is complete without a well-rounded discussion on how to choose a strong password.  Passwords are the…","fields":{"slug":"/identity/how-to-choose-a-secure-password/"},"html":"<p>No conversation on digital security is complete without a well-rounded discussion on how to choose a strong password. </p>\n<p>Passwords are the digital keys to our daily lives. They are the gateway to our professional services, our network of friends, and all our financial applications. </p>\n<p>No wonder we want to keep our passwords private and secure! </p>\n<p>If someone gains access to your email ID, they can easily opt for the \"forgot your password?\" link on (for example, an online shopping or banking site) you use. </p>\n<p>Also, if a cybercriminal successfully hacks into your social media account, they can post fraudulent messages asking for money or sending out links to scammer websites. </p>\n<p>So, what's the solution? A good password. </p>\n<p>But before finding how to choose a strong password in 2021, let's first look at the most common methods of how passwords are being hacked today.    </p>\n<h2 id=\"how-does-a-password-get-hacked-top-5-threats\" style=\"position:relative;\"><a href=\"#how-does-a-password-get-hacked-top-5-threats\" aria-label=\"how does a password get hacked top 5 threats permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How Does a Password Get Hacked? Top 5 Threats</h2>\n<p>Hackers utilize numerous techniques to crack your passwords. One technique is to gain access by guessing the password directly. </p>\n<p>They could do it by closely following your social media presence, security questions, and similar details. This is why industry experts do not favor the use of personal details on passwords. </p>\n<p>Other tactics that hackers use include: </p>\n<h3 id=\"1-phishing-attacks\" style=\"position:relative;\"><a href=\"#1-phishing-attacks\" aria-label=\"1 phishing attacks permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. Phishing attacks</h3>\n<p>Phishing is a <a href=\"https://www.loginradius.com/blog/identity/2020/10/social-engineering-attacks/\">social engineering attack</a> that occurs when the hacker dupes a victim into opening an email using fraudulent ads or scareware tactics. </p>\n<p>Unfortunately, such attacks are no longer just an email problem. It has somewhat expanded to instant/ text messages, social networks, videoconferencing, and gaming applications. </p>\n<p>As phishing threats grew to over 50,000 a day around December 2020, <a href=\"https://www.slashnext.com/blog/zero-hour-phishing-attack-on-googles-app-engine-targeting-office-365-users-pushes-holiday-spike-above-100/\">SlashNext Threat Labs reported</a> a 30% increase throughout 2019. </p>\n<p>Both organizations and individuals should know how to choose a strong password and take a zero-trust approach beyond domain credibility. </p>\n<h3 id=\"2-dictionary-attack\" style=\"position:relative;\"><a href=\"#2-dictionary-attack\" aria-label=\"2 dictionary attack permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. Dictionary attack</h3>\n<p>A dictionary attack is a method of attacking the victim's account by entering every word in a dictionary as a password. They usually run through a list of common words and phrases or easy to guess passwords. </p>\n<p>Users frequently reuse their passwords or do not change them even after a breaching attempt. That makes this form of attack easy to execute. </p>\n<p>In fact, the <a href=\"https://enterprise.verizon.com/resources/reports/dbir/2019/results-and-analysis/\">2019 Verizon Data Breach Investigations Report</a> (DBIR) reveals that compromised and reused passwords are involved in 80 percent of hacking-related breaches.</p>\n<h3 id=\"3-brute-force-attacks\" style=\"position:relative;\"><a href=\"#3-brute-force-attacks\" aria-label=\"3 brute force attacks permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3. Brute force attacks</h3>\n<p>Similar to a dictionary attack, brute force uses trial-and-error to guess the victim's login credentials, find a hidden web page, or access network resources. </p>\n<p>Later, those tainted accounts are used to send phishing emails, sell credentials to third parties, or spread fake content. </p>\n<p><a href=\"https://enterprise.verizon.com/resources/reports/dbir/2020/introduction/\">Verizon's Data Breach Investigations Report 2020</a> reveals that around 20% of breaches happening within SMBs involve brute force. The number is approximately 10% for large enterprises. </p>\n<p>The trend essentially remained unchanged in 2018 and 2019, but the coronavirus pandemic may have impacted the number last year.</p>\n<h3 id=\"4-keystroke-logging\" style=\"position:relative;\"><a href=\"#4-keystroke-logging\" aria-label=\"4 keystroke logging permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>4. Keystroke logging</h3>\n<p>Keystroke logging or keyboard capturing is the method of tracking and recording the keystrokes of the victim, thereby capturing any information typed during the session. </p>\n<p>The hacker uses tools to record the data captured by each keystroke, which are retrieved later on. Moreso, a majority of these tools can record calls, GPS data, copy-cut-paste clipboard, and microphone or camera footage. The recorded data are later used for phishing attacks, stalking, and identity theft. </p>\n<h3 id=\"5-man-in-the-middle-attacks\" style=\"position:relative;\"><a href=\"#5-man-in-the-middle-attacks\" aria-label=\"5 man in the middle attacks permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>5. Man-in-the-middle attacks</h3>\n<p>In this attack, the hacker positions themselves in the middle of a conversation between a user and an application to eavesdrop or impersonate a website or application. </p>\n<p>In return, the hacker <a href=\"https://www.loginradius.com/blog/identity/2019/09/prevent-credential-stuffing-attacks/\">steals the victim's login credentials</a>, account numbers, social security numbers, etc. </p>\n<p>SaaS businesses, e-commerce sites, and users of financial services majorly fall victim to man-in-the-middle attacks.  </p>\n<h2 id=\"the-dos-and-dont-on-how-to-choose-a-strong-password\" style=\"position:relative;\"><a href=\"#the-dos-and-dont-on-how-to-choose-a-strong-password\" aria-label=\"the dos and dont on how to choose a strong password permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>The Do's and Don't on How to Choose a Strong Password</h2>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 60.61538461538461%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"do&#39;s-and-don&#39;t-to-choose-a-strong-password\"\n        title=\"do&#39;s-and-don&#39;t-to-choose-a-strong-password\"\n        src=\"/static/abb33a13f561a652b46fab1060593c58/e5715/do's-and-don't-to-choose-a-strong-password.png\"\n        srcset=\"/static/abb33a13f561a652b46fab1060593c58/a6d36/do's-and-don't-to-choose-a-strong-password.png 650w,\n/static/abb33a13f561a652b46fab1060593c58/e5715/do's-and-don't-to-choose-a-strong-password.png 768w,\n/static/abb33a13f561a652b46fab1060593c58/d0143/do's-and-don't-to-choose-a-strong-password.png 1025w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>What does a secure password look like? It is usually the one that cannot be guessed easily or cracked using software tools. </p>\n<p>Not that it should only be unique and complex, here is a collection of the do's and don't on how to choose a strong password to avoid being a victim of the attacks mentioned above.</p>\n<h3 id=\"the-dos\" style=\"position:relative;\"><a href=\"#the-dos\" aria-label=\"the dos permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>The Do's</h3>\n<p><strong>Use two-factor authentication (2FA)</strong>: <a href=\"https://www.loginradius.com/multi-factor-authentication/\">2FA</a> adds an additional layer of security to your existing account. Even if the hacker is able to crack your password, they will still have an extra layer to authenticate. </p>\n<p>The following are a few types of layers that businesses choose to provide:</p>\n<ul>\n<li>A PIN or password.</li>\n<li>A physical asset such as the last 4 digits of your credit card.</li>\n<li>An OTP sent to your mobile device.</li>\n<li>A biometric authenticator such as a fingerprint or voiceprint. </li>\n</ul>\n<p><strong>Follow standard password rules</strong>: There are a few basic rules on how to choose a strong password that you should closely follow.</p>\n<ul>\n<li>Short passwords are very easy to crack. Use a minimum of 10 characters.</li>\n<li>Include a mixture of numbers, capital letters, lower-case letters, and symbols to make the password difficult to crack. </li>\n</ul>\n<p><strong>Choose sufficiently random combinations of words</strong>: Yes, it is possible to use an easy-to-remember password and make it secure at the same time. The following are a few ways to do that:</p>\n<ul>\n<li>Pick a sentence that you probably won't forget, like \"When I was fifteen, I had my first international trip.\" Then use the first letters, add the numbers, and punctuation to make \"wIw15,ihmfit.\"</li>\n<li>Pick any three random words like Jack Book Pen. Choose your birth date, put the words together, and split up the date like 1jackbookpen4. Next, capitalize each letter and add a few special characters like 1J@ckBookPen4!</li>\n</ul>\n<p><strong>Pick something that does not make sense</strong>: How to choose a <a href=\"https://www.loginradius.com/blog/engineering/password-security-best-practices-compliance/\">strong password</a>? Go for something that has no meaning. For example, it could be:</p>\n<ul>\n<li>A familiar word using odd characters like phnybon instead of funnybone.</li>\n<li>A deliberately misspelled term like Win-G8 (Wooden Gate)</li>\n<li>Replace letters with the least expected symbols. Like for \"O\" use \"()\" instead of \"0\".</li>\n<li>Use phonetically pronounceable words that make no sense, like good-eits.</li>\n</ul>\n<p><strong>Change your passwords regularly</strong>: Also, do not reuse the same password for a long time. The more sensitive your data is, the more frequently you should change your password.</p>\n<p><a href=\"https://www.loginradius.com/resource/ebook/buyers-guide-to-multi-factor-authentication/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAGCAYAAADDl76dAAAACXBIWXMAAAsSAAALEgHS3X78AAABkklEQVQY0zWQyy9jYRjGTwQ9vYlQpTrViJ7T0lZIpeq0TqN1mWSmBAuKxCVCIqQrEqEiqUjM7GYjwcaKjQUWkxmJhZmNlZ2NZP6V33znHBZPvuR7n/e5vJJdzeBS01SVT4me/eViYpfVVp363ApSewG3msMu5gZPDmk4onk8qUkau/PYY8PIkSyykkY25gKSQXQoGt6dH/gq9ywnF0koWRKfUsj+EdzhvCBqlqDgOeMjBIZmiQ7P4EhOYYuPiv13Q/FKspLBKRLUrVWQisdIsRmkYJ6GwCS1vgKukG65C7IzohPo/4K/7zNNvaP4E2MEU19pEGnld1FT0Kji3fpO1/4lkaUT/EMlGmNFatwaro5B7OGMSa7t0MzltoECASFkoEWIm5U/BK3KabxrRyjb56jFQ5rT63jC0zg9WepEfVenjuTrYbP8jde3f9z8fOTq9hfXd795en7h4c8z9fGcaWgJGpXEcatVnepQBptIbQsZ/4M4whaqgkn6x5fY2DthvlRmbmvfxMp2hYXSgWlqE8H+AywzymSbMN5UAAAAAElFTkSuQmCC'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"EB-buyers-GD-to-MFA\"\n        title=\"EB-buyers-GD-to-MFA\"\n        src=\"/static/5093fa5ddf26d3a3ec38a96c3e0387e6/e5715/EB-buyers-GD-to-MFA.png\"\n        srcset=\"/static/5093fa5ddf26d3a3ec38a96c3e0387e6/a6d36/EB-buyers-GD-to-MFA.png 650w,\n/static/5093fa5ddf26d3a3ec38a96c3e0387e6/e5715/EB-buyers-GD-to-MFA.png 768w,\n/static/5093fa5ddf26d3a3ec38a96c3e0387e6/81501/EB-buyers-GD-to-MFA.png 2886w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<p><strong>Always remember to log out</strong> of websites and devices once you are done using them. </p>\n<h3 id=\"the-donts\" style=\"position:relative;\"><a href=\"#the-donts\" aria-label=\"the donts permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>The Don’ts</h3>\n<ul>\n<li>Do not use your name in your passwords in any form - first, last, spelled backward, or nicknames.</li>\n<li>Do not use passwords that are fewer than eight characters.</li>\n<li>Do not use the name of your pets, friends, or close relatives.</li>\n<li>Do not use special dates like your birthdays and anniversaries. </li>\n<li>Do not use your phone number or office number.</li>\n<li>Do not use your user ID, even when spelled backward.</li>\n<li>Do not use acronyms, technical terms, or names of places.</li>\n<li>Do not use names from popular culture like Harry_Potter, Hogwarts. </li>\n<li>Do not use all numeric passwords like your license plate numbers.</li>\n<li>Do not use dictionary words. </li>\n<li>Do not use commonly used passwords like 123456, qwerty, 11111111, asdfgh.</li>\n<li>Do not write down your passwords or share them with anyone else.</li>\n<li>Do not save your passwords in unfamiliar computers or browsers.</li>\n<li>Do not use the secret question option. It does not make any sense to use a strong password and back it up with an easily guessable security question.</li>\n<li>Do not use obvious substitutions like \"H0me\" for \"Home\" or \"D00R8377\" for \"DOORBELL.\"</li>\n</ul>\n<h2 id=\"the-20-worst-passwords-of-2020\" style=\"position:relative;\"><a href=\"#the-20-worst-passwords-of-2020\" aria-label=\"the 20 worst passwords of 2020 permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>The 20 Worst Passwords of 2020</h2>\n<p><a href=\"https://nordpass.com/most-common-passwords-list/\">According to Nordpass.com</a>, here are the 20 worst passwords of 2020. The list also offers an overview of how many times the password has been breached, among other parameters. </p>\n<p>Disclaimer: Stay away from these passwords. </p>\n<table>\n  <tr>\n   <td><strong>Position </strong>\n   </td>\n   <td><strong>Password </strong>\n   </td>\n   <td><strong>Number of users</strong>\n   </td>\n   <td><strong>Time to crack it</strong>\n   </td>\n   <td><strong>Times exposed</strong>\n   </td>\n  </tr>\n  <tr>\n   <td>1\n   </td>\n   <td>123456\n   </td>\n   <td>2,543,285\n   </td>\n   <td>Less than a second\n   </td>\n   <td>23,597,311\n   </td>\n  </tr>\n  <tr>\n   <td>2\n   </td>\n   <td>123456789\n   </td>\n   <td>961,435\n   </td>\n   <td>Less than a second\n   </td>\n   <td>7,870,694\n   </td>\n  </tr>\n  <tr>\n   <td>3\n   </td>\n   <td>picture1\n   </td>\n   <td>371,612\n   </td>\n   <td>Three hours\n   </td>\n   <td>11,190\n   </td>\n  </tr>\n  <tr>\n   <td>4\n   </td>\n   <td>password\n   </td>\n   <td>360,467\n   </td>\n   <td>Less than a second\n   </td>\n   <td>3,759,315\n   </td>\n  </tr>\n  <tr>\n   <td>5\n   </td>\n   <td>12345678\n   </td>\n   <td>322,187\n   </td>\n   <td>Less than a second\n   </td>\n   <td>2,944,615\n   </td>\n  </tr>\n  <tr>\n   <td>6\n   </td>\n   <td>111111\n   </td>\n   <td>230,507\n   </td>\n   <td>Less than a second\n   </td>\n   <td>3,124,368\n   </td>\n  </tr>\n  <tr>\n   <td>7\n   </td>\n   <td>123123\n   </td>\n   <td>189,327\n   </td>\n   <td>Less than a second\n   </td>\n   <td>2,238,694\n   </td>\n  </tr>\n  <tr>\n   <td>8\n   </td>\n   <td>12345\n   </td>\n   <td>188,268\n   </td>\n   <td>Less than a second\n   </td>\n   <td>2,389,787\n   </td>\n  </tr>\n  <tr>\n   <td>9\n   </td>\n   <td>1234567890\n   </td>\n   <td>171,724\n   </td>\n   <td>Less than a second\n   </td>\n   <td>2,264,884\n   </td>\n  </tr>\n  <tr>\n   <td>10\n   </td>\n   <td>senha\n   </td>\n   <td>167,728\n   </td>\n   <td>Ten seconds\n   </td>\n   <td>8,213\n   </td>\n  </tr>\n  <tr>\n   <td>11\n   </td>\n   <td>1234567\n   </td>\n   <td>165,909\n   </td>\n   <td>Less than a second\n   </td>\n   <td>2,516,606\n   </td>\n  </tr>\n  <tr>\n   <td>12\n   </td>\n   <td>qwerty\n   </td>\n   <td>156,765\n   </td>\n   <td>Less than a second\n   </td>\n   <td>3,946,737\n   </td>\n  </tr>\n  <tr>\n   <td>13\n   </td>\n   <td>abc123\n   </td>\n   <td>151,804\n   </td>\n   <td>Less than a second\n   </td>\n   <td>2,877,689\n   </td>\n  </tr>\n  <tr>\n   <td>14\n   </td>\n   <td>Million2\n   </td>\n   <td>143,664\n   </td>\n   <td>Three hours\n   </td>\n   <td>162,609\n   </td>\n  </tr>\n  <tr>\n   <td>15\n   </td>\n   <td>000000\n   </td>\n   <td>122,982\n   </td>\n   <td>Less than a second\n   </td>\n   <td>1,959,780\n   </td>\n  </tr>\n  <tr>\n   <td>16\n   </td>\n   <td>1234\n   </td>\n   <td>112,297\n   </td>\n   <td>Less than a second\n   </td>\n   <td>1,296,186\n   </td>\n  </tr>\n  <tr>\n   <td>17\n   </td>\n   <td>iloveyou\n   </td>\n   <td>106,327\n   </td>\n   <td>Less than a second\n   </td>\n   <td>1,645,337\n   </td>\n  </tr>\n  <tr>\n   <td>18\n   </td>\n   <td>aaron431\n   </td>\n   <td>90,256\n   </td>\n   <td>Three hours\n   </td>\n   <td>30,576\n   </td>\n  </tr>\n  <tr>\n   <td>19\n   </td>\n   <td>password1\n   </td>\n   <td>87,556\n   </td>\n   <td>Less than a second\n   </td>\n   <td>2,418,984\n   </td>\n  </tr>\n  <tr>\n   <td>20\n   </td>\n   <td>qqww1122\n   </td>\n   <td>85,476\n   </td>\n   <td>Fifty two minutes\n   </td>\n   <td>122,481\n   </td>\n  </tr>\n</table>\n<h2 id=\"5-tips-on-how-to-choose-a-strong-password-manager\" style=\"position:relative;\"><a href=\"#5-tips-on-how-to-choose-a-strong-password-manager\" aria-label=\"5 tips on how to choose a strong password manager permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>5 Tips on How to Choose a Strong Password Manager</h2>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 60.61538461538461%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"how-to-choose-a-strong-password\"\n        title=\"how-to-choose-a-strong-password\"\n        src=\"/static/f3dee84ff01c6019335478ccd1a0aa33/e5715/how-to-choose-a-strong-password.png\"\n        srcset=\"/static/f3dee84ff01c6019335478ccd1a0aa33/a6d36/how-to-choose-a-strong-password.png 650w,\n/static/f3dee84ff01c6019335478ccd1a0aa33/e5715/how-to-choose-a-strong-password.png 768w,\n/static/f3dee84ff01c6019335478ccd1a0aa33/d0143/how-to-choose-a-strong-password.png 1025w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>A password manager helps you auto-generate strong passwords and stores them in encrypted, centralized locations on your behalf. You can access all your passwords with a master password. </p>\n<p>A lot of password managers are free to use and provide optional features such as synchronizing new passwords across several devices. If allowed, they also audit users’ actions to ensure that they are not repeating their passwords in multiple locations. </p>\n<p>So, (to be on the right track), how to choose a strong password manager? Well, it should at least have the following core features:</p>\n<ul>\n<li><strong>Storage</strong>: While some password managers store passwords in a local hard-drive, some others use cloud storage. The latter is usually preferable if your employees or users use multiple devices. They can access their account credentials from any device with an internet connection. Also, if their devices are stolen, they won't lose their passwords. </li>\n<li><strong>Encryption</strong>: Go for a strong <a href=\"https://www.loginradius.com/blog/engineering/encryption-and-hashing/\">encryption standard</a>. The next time you wonder how to choose a strong password manager, go for the one that uses 256-bit Advanced Encryption Standard (AES) encryption.  </li>\n<li><strong>Easy-to-use</strong>: The password manager you choose should have an intuitive interface so that it's easy to use. Otherwise, your users or employees will stick to their old habits of creating weak, familiar passwords. Some managers also offer automated password changers that automatically change old passwords to new stronger ones.</li>\n<li><strong>Security</strong>: It should support two-factor authentication, track password usage, and generate audit reports. The password manager should also end sessions when a device is idle for a predefined amount of time. Also, ensure it has a built-in VPN and the ability to restrict access to blacklisted Internet sites. </li>\n<li>\n<p><strong>Value</strong>: The password manager should also have additional nice-to-have features:</p>\n<ul>\n<li>Automated support for directory services integration.</li>\n<li>The ability to generate a portable vault.</li>\n<li>An account recovery feature in case of forgotten master passwords.</li>\n<li>The ability to encrypt and store sensitive files in secure vaults. </li>\n</ul>\n</li>\n</ul>\n<h2 id=\"reduce-password-vulnerabilities-using-the-loginradius-password-management-solution\" style=\"position:relative;\"><a href=\"#reduce-password-vulnerabilities-using-the-loginradius-password-management-solution\" aria-label=\"reduce password vulnerabilities using the loginradius password management solution permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Reduce Password Vulnerabilities Using the LoginRadius Password Management Solution</h2>\n<p>To answer the popular question \"how to choose a strong password in 2021\", LoginRadius offers a range of robust Password Policy features. </p>\n<p><a href=\"https://www.loginradius.com/\">The CIAM platform</a> captures the following categories of password management in the LoginRadius Admin Console:</p>\n<ul>\n<li><strong>Password Expiration</strong>: You can customize how often you want your consumers to reset their passwords. There's a password expiry configuration setting to help you out.</li>\n<li><strong>Password History</strong>: You can configure the number of unique passwords a consumer must set before allowing them to reuse one of their older passwords. </li>\n<li><strong>Password Complexity</strong>: You can configure the password complexity for your consumer's account by forcing validation rules, preventing them from using common passwords and dictionary words.</li>\n<li><strong>Password Compliance Check</strong>: You can identify which consumers are abiding by your password complexity requirements and flag those who aren't. </li>\n</ul>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>By now, you know how to choose a strong password. However, hackers will still try to crack your passwords, no matter how secure you are trying to make them. </p>\n<p>Follow the steps listed above to make your passwords as strong and unique as possible. Remember, if your password is too easy to remember, it is probably not secure at all.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-loginradius\"\n        title=\"book-a-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"January 06, 2021","updated_date":null,"description":"Passwords are the digital keys to our daily lives. They are the gateway to our professional services, and our network of friends. So, what does a secure password look like? Here is a collection of the do's and don't on how to choose a strong password to avoid being a victim of cyberattack.","title":"The Do's and Don'ts of Choosing a Secure Password","tags":["data security","password management","ciam solution","cx"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.3986013986013985,"src":"/static/3744865801c829fc49bb5b4c058eb440/9a31d/how-to-choose-a-secure-password-in-2021.jpg","srcSet":"/static/3744865801c829fc49bb5b4c058eb440/f836f/how-to-choose-a-secure-password-in-2021.jpg 200w,\n/static/3744865801c829fc49bb5b4c058eb440/2244e/how-to-choose-a-secure-password-in-2021.jpg 400w,\n/static/3744865801c829fc49bb5b4c058eb440/9a31d/how-to-choose-a-secure-password-in-2021.jpg 767w","sizes":"(max-width: 767px) 100vw, 767px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},{"node":{"excerpt":"A website is incomplete without a contact form. Depending on the company’s requirements, there are several implications where they may be…","fields":{"slug":"/identity/bot-attacks/"},"html":"<p>A website is incomplete without a contact form. Depending on the company’s requirements, there are several implications where they may be added. For example, they may be included as a permanent element or used as a sudden appearing pop-up on websites. </p>\n<p>It is no surprise that the contact form attracts a lot of bot attacks. Hackers not only create false traffic, resulting in damages to brand images, it also results in malicious attacks on websites. The objective of this blog is to help you to secure contact form. </p>\n<p>We will explore the various methods that can be used to prevent bots from submitting forms and not fall into a random audacious attack.</p>\n<h1 id=\"what-is-a-spambot\" style=\"position:relative;\"><a href=\"#what-is-a-spambot\" aria-label=\"what is a spambot permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What Is a Spambot?</h1>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 56.769230769230774%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAALCAYAAAB/Ca1DAAAACXBIWXMAAAsSAAALEgHS3X78AAABhklEQVQoz11S226DMAzl/79p0n5gk7o+TFVHu1svo1wLJIGQ5MwOBFEimYTEPj7HduScw7jcZPSlu3Dfaot7ZyBoZyvprAY7+639I/5o69AMDi2ZnRMAchgBtHEYyEcbi54sV4O/W4KGc8RgqdAoG4G8UcjIOSwG6wjgp+5xEwOuZKky/q3qzOxnlwzr3iCTGpvdEfHpjwANCgJlqcyEZfK5J0bnssVX1niwXA4z2KXVaPoxQcQHzv6eChxKYkiOxSSJd5Y6Amg8bT7wvD3gWEjsczmz4ng51TXiAJYWbCmFk7V6/L/WHV6PV2y/b9gmLWICFdNbYOdryAcG5c4lVEvjHovNCbjLn8R+nyvsMom3RHhFkgA59o/iwoqWXWrIgZu0HgWu342CdplATFJ/7wqHQnkCXJZgNjAMgXeizgUOdzwmD2NECTMC4XryG5eo7i3iqvcKOf4BUEydDezCOCzZzqNCSmryT6saL/EZstMEaEfA9YCul1sBLwlcKoFTXiNpOl/Pf1ZcWzj9BDUOAAAAAElFTkSuQmCC'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"spambot\"\n        title=\"spambot\"\n        src=\"/static/94b847f1d6396e8ae36d410eed99679a/e5715/spambot.png\"\n        srcset=\"/static/94b847f1d6396e8ae36d410eed99679a/a6d36/spambot.png 650w,\n/static/94b847f1d6396e8ae36d410eed99679a/e5715/spambot.png 768w,\n/static/94b847f1d6396e8ae36d410eed99679a/2bef9/spambot.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>A spambot is a malicious program or unethical activity specially designed to gather email addresses or information from contact forms. It is usually done by sending spam emails.\nAs emails have a distinct structure, a bot creation process is easy for hackers. Hence, you need to be extra cautious while using contact forms for your website or important marketing campaigns. </p>\n<p>Here are some proven ways that will help your secure contact forms from spambots.</p>\n<h2 id=\"12-best-ways-to-stop-bots-from-filling-out-forms\" style=\"position:relative;\"><a href=\"#12-best-ways-to-stop-bots-from-filling-out-forms\" aria-label=\"12 best ways to stop bots from filling out forms permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>12 Best Ways to Stop Bots From Filling Out Forms</h2>\n<h3 id=\"1-add-google-recaptcha\" style=\"position:relative;\"><a href=\"#1-add-google-recaptcha\" aria-label=\"1 add google recaptcha permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. “Add Google reCAPTCHA.”</h3>\n<p>One of the most common ways to stop bots from filling up your form is to add CAPTCHA to the contact form. It offers an intelligent program that ensures that users who are filling out forms are actually humans.\nThe process is simplified by Google with reCAPTCHA and can be used as a protective practice against bots. However, this is not a silver bullet but effective against basic bots. Also, you might be sacrificing some bit of <a href=\"https://www.loginradius.com/blog/identity/2018/10/digital-transformation-safeguarding-customer-experience/\">user experience for security</a></p>\n<h3 id=\"2-secure-contact-forms-using-a-double-opt-in-form\" style=\"position:relative;\"><a href=\"#2-secure-contact-forms-using-a-double-opt-in-form\" aria-label=\"2 secure contact forms using a double opt in form permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. “Secure contact forms using a double opt-in form.”</h3>\n<p>Double opt-in forms make the signup process more secure and help to create spam-free contact forms. For example, it will send a confirmation link to your email address when you enter the email address. Humans generally feel comfortable with the process, but bots skip this step. </p>\n<h3 id=\"3-add-a-test-question-to-your-contact-form\" style=\"position:relative;\"><a href=\"#3-add-a-test-question-to-your-contact-form\" aria-label=\"3 add a test question to your contact form permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3. “Add a test question to your contact form.”</h3>\n<p>Add some <a href=\"https://www.loginradius.com/blog/identity/2019/01/best-practices-choosing-good-security-questions/\">tricky questions</a> to your form that are easy to understand by humans, but confuse the bots. However, make sure you put some common questions; otherwise, it may frustrate your potential subscribers.</p>\n<h3 id=\"4-add-honeypots\" style=\"position:relative;\"><a href=\"#4-add-honeypots\" aria-label=\"4 add honeypots permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>4. “Add Honeypots.”</h3>\n<p>Honeypots are hidden fields that are added to the user registration form to prevent bots from submitting forms. Users cannot see these, but bots can detect them. In this way, if the information is provided for that hidden field, it alerts you that a spambot is trying to fill the form. This unseen field can be programmed using CSS or HTML.  </p>\n<h3 id=\"5-implement-time-analysis\" style=\"position:relative;\"><a href=\"#5-implement-time-analysis\" aria-label=\"5 implement time analysis permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>5. “Implement time-analysis.”</h3>\n<p>This is again a great way to identify spammers since humans usually will take some time to fill out all the fields of a form while bots can do it instantly. So, measuring the time taken to fill a form can be helpful when finalizing your contact list.</p>\n<p><a href=\"https://www.loginradius.com/resource/understanding-credential-stuffing-attacks-whitepaper\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"credential-stuffing\"\n        title=\"credential-stuffing\"\n        src=\"/static/091051c0e36ccf509c9dea986078f13a/e5715/credential-stuffing.png\"\n        srcset=\"/static/091051c0e36ccf509c9dea986078f13a/a6d36/credential-stuffing.png 650w,\n/static/091051c0e36ccf509c9dea986078f13a/e5715/credential-stuffing.png 768w,\n/static/091051c0e36ccf509c9dea986078f13a/63ff0/credential-stuffing.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<h3 id=\"6-hide-target-request\" style=\"position:relative;\"><a href=\"#6-hide-target-request\" aria-label=\"6 hide target request permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>6. \"Hide target request.\"</h3>\n<p>Since bots target sensitive information, these should not be made available from the browser side. These can be added from your server-side, to which no one will have access.\nUse the form as just a medium to collect the information. If the data is not taken through the browser, you can protect your data easily. You can also make your form more secure if you allow only one signup from one IP address.</p>\n<h3 id=\"7-form-validation-after-geolocation-of-the-ip-address\" style=\"position:relative;\"><a href=\"#7-form-validation-after-geolocation-of-the-ip-address\" aria-label=\"7 form validation after geolocation of the ip address permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>7. \"Form validation after geolocation of the IP address.\"</h3>\n<p>You can also control the location from which the contact forms are being filled. For example, if you have been witnessing a lot of spam activities from a particular location/country or IP address, you can permanently block such addresses or geolocations. </p>\n<h3 id=\"8-use-a-web-application-firewall\" style=\"position:relative;\"><a href=\"#8-use-a-web-application-firewall\" aria-label=\"8 use a web application firewall permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>8. Use a web application firewall.</h3>\n<p>By adding a web application firewall, it is possible to manage <a href=\"https://www.loginradius.com/blog/identity/2019/10/cybersecurity-attacks-business/\">severe attacks</a> and prevent bots from spamming your forms. </p>\n<h3 id=\"9-blacklist-ips-and-limited-ip-addresses\" style=\"position:relative;\"><a href=\"#9-blacklist-ips-and-limited-ip-addresses\" aria-label=\"9 blacklist ips and limited ip addresses permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>9. Blacklist IPs and limited IP addresses.</h3>\n<p>If you notice some suspicious activities from a particular IP address, don’t hesitate to block it permanently. Another option is to set a limit for each IP. For example, you might allow only ten forms to be filled from each IP address.</p>\n<h3 id=\"10-beware-of-cross-site-request-forgery-csrf\" style=\"position:relative;\"><a href=\"#10-beware-of-cross-site-request-forgery-csrf\" aria-label=\"10 beware of cross site request forgery csrf permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>10. Beware of Cross-Site Request Forgery (CSRF).</h3>\n<p>A CSRF or XSRF attack usually focuses on executing an operation in a web application on behalf of the user but without consent. To prevent such an event from happening, make sure that the request you receive is from the server and that it is a legitimate one. </p>\n<p>A popular approach to know that the request sent is valid is to use a CSRF token, which stores the value of the matching token on the server. You can also adopt the double submit cookie approach in which the server stores the matching token value in the form of a cookie. The server then checks this value with the hidden field value when it receives a request. </p>\n<h3 id=\"11-validate-email-addresses-and-phone-numbers\" style=\"position:relative;\"><a href=\"#11-validate-email-addresses-and-phone-numbers\" aria-label=\"11 validate email addresses and phone numbers permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>11. Validate email addresses and phone numbers.</h3>\n<p>It can be fairly easy to determine whether the email submitted in the form is linked to a working inbox or not by using an email address <a href=\"https://www.loginradius.com/blog/engineering/best-practice-guide-for-rest-api-security/\">validation API</a>. This will also tell you whether the email has engaged in any abusive behavior.\nSince bots will use invalid email IDs most of the time, verifying the email addresses can give a good layer of protection to your site against bots. </p>\n<h3 id=\"12-block-copy-and-paste-in-your-forms\" style=\"position:relative;\"><a href=\"#12-block-copy-and-paste-in-your-forms\" aria-label=\"12 block copy and paste in your forms permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>12. Block copy and paste in your forms.</h3>\n<p>Another way to prevent contact form spam is to disable the right-click functionality. Your contact forms will only be secured from human spammers who copy and paste their details into your forms. You would also have the added advantage of keeping anyone from stealing content from anywhere on your platform.</p>\n<h2 id=\"stay-rest-assured-with-loginradius\" style=\"position:relative;\"><a href=\"#stay-rest-assured-with-loginradius\" aria-label=\"stay rest assured with loginradius permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Stay Rest Assured with LoginRadius</h2>\n<p>LoginRadius offers all the options mentioned above to secure contact forms from spam or fake signups. The consumer identity and access provider also offers world-class security for consumers to ensure that their data is safe during login, registration, password setup, and any other data touchpoints.\nThe <a href=\"https://www.loginradius.com/\">CIAM platform</a> is a powerhouse of open source SDKs, pre-designed and customizable login interfaces, and robust data security products such as MFA, RBA, and Advanced Password Policies.    </p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 57.53846153846154%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"LRbotprotection\"\n        title=\"LRbotprotection\"\n        src=\"/static/8ac22530787b3fd803dfe56d10162987/e5715/LRbotprotection.png\"\n        srcset=\"/static/8ac22530787b3fd803dfe56d10162987/a6d36/LRbotprotection.png 650w,\n/static/8ac22530787b3fd803dfe56d10162987/e5715/LRbotprotection.png 768w,\n/static/8ac22530787b3fd803dfe56d10162987/d0143/LRbotprotection.png 1025w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<h2 id=\"final-words\" style=\"position:relative;\"><a href=\"#final-words\" aria-label=\"final words permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Final Words</h2>\n<p>Spambots will not go anywhere so soon. Take your time and learn to implement these strategies to make things easier for you in the long-run. It demands a lot of effort and practice to implement these ideas, but the result is worth it. </p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-loginradius\"\n        title=\"book-a-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"December 24, 2020","updated_date":null,"description":"It is no surprise that the contact form attracts a lot of bot attacks. Hackers not only create false traffic, but also result in malicious attacks on websites. The objective of this blog is to help you to secure contact form from random audacious attacks.","title":"How To Secure Your Contact Form From Bot Attacks","tags":["data security","ciam solution","cx"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":2,"src":"/static/5311b4c6c298fc095f42c5e9cbcc80c0/33aa5/bot-attacks.jpg","srcSet":"/static/5311b4c6c298fc095f42c5e9cbcc80c0/f836f/bot-attacks.jpg 200w,\n/static/5311b4c6c298fc095f42c5e9cbcc80c0/2244e/bot-attacks.jpg 400w,\n/static/5311b4c6c298fc095f42c5e9cbcc80c0/33aa5/bot-attacks.jpg 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},{"node":{"excerpt":"You book a hotel for your stay in Paris; you go to the counter, show your passport and other ID verification documents, and take the keys to…","fields":{"slug":"/identity/identity-proofing/"},"html":"<p>You book a hotel for your stay in Paris; you go to the counter, show your passport and other ID verification documents, and take the keys to your room to finally enjoy your stay. </p>\n<p>This is identity proofing—the process of verifying that the claimed identity_ _of a person matches their actual identity. You’ve probably undergone this process a bunch of times yourself at hotels, financial institutions, and for retailers.</p>\n<p>The entire process feels taxing, intrusive, and needlessly comprehensive. Yet, it might be surprising to hear that, despite the measures taken by many institutes, according to Consumer Sentinel Network, <a href=\"https://www.ftc.gov/system/files/documents/reports/consumer-sentinel-network-data-book-2019/consumer_sentinel_network_data_book_2019.pdf\">3.4 million identity thefts</a> and frauds took place in 2019 alone.</p>\n<h2 id=\"importance-of-improved-identity-proofing\" style=\"position:relative;\"><a href=\"#importance-of-improved-identity-proofing\" aria-label=\"importance of improved identity proofing permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Importance of Improved Identity Proofing</h2>\n<p>According to the <a href=\"https://www.accenture.com/sa-en/insights/security/invest-cyber-resilience\">2020 State of Cybersecurity Report</a> by Accenture, an average company was subject to 22 data breaches in the studied year. Such data breaches are often the consequence of and result in more identity thefts and frauds. </p>\n<p>As a matter of fact, it takes over six months for <a href=\"https://www.zdnet.com/article/businesses-take-over-six-months-to-detect-data-breaches/\">an average data breach</a> to be detected. That gives the perpetrator six months to exploit your information as vastly as possible. The risk is significantly greater with the onset of higher cloud computing reliance in the day-to-day functioning of an organization.</p>\n<p>Typical knowledge-based identity proofing also involves asking a customer a set of common security questions, e.g., “What was your hometown?”, “What was your mother’s maiden name?” etc. These questions are used across a range of organizations. </p>\n<p>So, what happens when an organization as big as <a href=\"https://edition.cnn.com/2019/07/30/tech/biggest-hacks-in-history/index.html\">Facebook or Marriott Intl.</a> suffer a breach compromising hundreds of millions of accounts?</p>\n<p>Your Personally Identifiable Information (PII), including your bank account details and security questions, fall in the hands of fraudsters that can exploit your information through, for instance, fraudulent transactions.</p>\n<p>Therefore, effective identity solutions should be one of the top priorities for any organization at this phase. To exemplify, identity proofing is particularly useful when a user is trying to claim an account, access content above a certain age, or register for an ecommerce site.</p>\n<h2 id=\"how-to-implement-effective-identity-proofing\" style=\"position:relative;\"><a href=\"#how-to-implement-effective-identity-proofing\" aria-label=\"how to implement effective identity proofing permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How to Implement Effective Identity Proofing</h2>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 68.76923076923077%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAOCAYAAAAvxDzwAAAACXBIWXMAAAsSAAALEgHS3X78AAACNUlEQVQ4y32Ue08aQRTFN5Wd2U2obY2PptGmTfABgoCiFpRFXvKMsdZXtdZgje33/wKn597dJUgff9ywy8z85txzZtbxVw/grR2OK37X3/UA5vAOM5+ukdg9x0zpHO7+JUxwD3NwC8tnKVO+hi0M4acqcOLFf4A56BWHcMtf8e74AUvtB6z0n/Cyegt37wKmSijHFMgN7e6ZrnMUJgCqicEK36jBKwxU0YfhL7wnbJmVDO4UaKnKVL9HwCsCv2hHjiy02WO4my14WdaqqCsTGMDb6nLxJeYb91juPiJRG8GtP8JSkRHQM2Ck0OY6SBZ6WNwbwhLgCXjjiLAOn5twdz5jNviGWbb6IhjBNJ9gKjchKAZOeijKlgjLtq5Chfl+CMw04GfqcDMtzDVH+Mi2X7d+wGVIlopElQSm6giVNWKVYwlMFgeY2z8NVdEC2Ul9zLVh2UZy5wQrg594UyOAaYfqGEolTNrLtjm/EoWyVoXNNGGk1fTRxLHhhPWqBmO5SWKzDZfGWyYrrRr6abdPQmX0XNeJQk9TrUQVHZ0oeVXMtr10HT79VH9zHbVD/lOLCLQyxnna8hgialh+DJSdqU6PU2SBbpqKNpeTIPB8D6+yjSjE1iQw0Bq3HJU3deDHB59WuekGFood5Ls3eFvqwVC14/9lwRg0MeZPPcscl97Pb3eRCs6wWOozi8bzqxdPjD30p+84Q1Nb4tsk/vLsWgl2K/TW+efHYQL43w+I3CgNp6bvvwFsbKBKKMekGgAAAABJRU5ErkJggg=='); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"importance-identity-proofing\"\n        title=\"importance-identity-proofing\"\n        src=\"/static/a146c8695e81bf237cbcec728113bcaa/e5715/importance-identity-proofing.png\"\n        srcset=\"/static/a146c8695e81bf237cbcec728113bcaa/a6d36/importance-identity-proofing.png 650w,\n/static/a146c8695e81bf237cbcec728113bcaa/e5715/importance-identity-proofing.png 768w,\n/static/a146c8695e81bf237cbcec728113bcaa/2bef9/importance-identity-proofing.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>As stated above, identity proofing can be done manually through documentation and interactive checks. This process, as already pointed out, is taxing and poorly affects the user experience. Manual identity solutions are also unscalable for large organizations dealing with hundreds of thousands of consumers every day.</p>\n<p>To pick up virtual methods of identity proofing is the right way to go in the current tech-dominated global environment. For instance, the British government has come up with a document on verifying someone’s identity on the <a href=\"https://www.gov.uk/government/publications/identity-proofing-and-verification-of-an-individual#how-to-check-someones-identity\">basis of set guidelines</a>:</p>\n<ul>\n<li>Strength: Getting evidence of identity from official ID documents.</li>\n<li>Validity: Confirming that the document is legitimate.</li>\n<li>Activity: Tracking the prevalence of the identity over time with other records.</li>\n<li>Identity fraud: Assessing the risk of fraud by comparing it with the national fraud database.</li>\n<li>Verification: Assuring the identity belongs to the person claiming it.</li>\n</ul>\n<p>An adequate identity proofing system should be able to perform most of these tasks on its own. It’s worth noting that such a comprehensive undertaking is not necessary for all activities. The organization’s sound discretion should be used to assess where it wants to employ identity proofing solutions.</p>\n<h2 id=\"protect-your-business-identity-with-loginradius-ciam-solutions\" style=\"position:relative;\"><a href=\"#protect-your-business-identity-with-loginradius-ciam-solutions\" aria-label=\"protect your business identity with loginradius ciam solutions permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Protect Your Business Identity With LoginRadius CIAM Solutions</h2>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 60.61538461538461%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"identity-proofing-loginradius\"\n        title=\"identity-proofing-loginradius\"\n        src=\"/static/2f1995fa060fc29d0ca86bc251df00a1/e5715/identity-proofing-loginradius.png\"\n        srcset=\"/static/2f1995fa060fc29d0ca86bc251df00a1/a6d36/identity-proofing-loginradius.png 650w,\n/static/2f1995fa060fc29d0ca86bc251df00a1/e5715/identity-proofing-loginradius.png 768w,\n/static/2f1995fa060fc29d0ca86bc251df00a1/2bef9/identity-proofing-loginradius.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<h3 id=\"two-factor-and-multi-factor-authentication\" style=\"position:relative;\"><a href=\"#two-factor-and-multi-factor-authentication\" aria-label=\"two factor and multi factor authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Two-Factor and Multi-Factor Authentication</h3>\n<p>When dealing with sensitive information, regardless of the network being public or private, it is a good idea to add extra layers of security to an account. </p>\n<p><a href=\"https://www.loginradius.com/blog/identity/2019/06/what-is-multi-factor-authentication/\">Multi-factor authentication</a> overcomes the flaws of typical password-based authentication and mandates it for a user to verify the claim to an account through two or more methods.</p>\n<ul>\n<li>LoginRadius makes it incredibly convenient to implement MFA for consumers as well as employees without disrupting any other services of the company.</li>\n<li>You can choose the factors via which you would want anyone to verify their claim to the account: SMS, authenticator apps, dynamic security questions, automated phone calls, etc.</li>\n<li>LoginRadius makes sure that the user experience (UX) is not compromised through its intuitive and easy-to-pick user interface.</li>\n</ul>\n<h3 id=\"password-management-solution\" style=\"position:relative;\"><a href=\"#password-management-solution\" aria-label=\"password management solution permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Password Management Solution</h3>\n<p>Some accounts don’t need the comprehensive identity proofing processes that were explained above because they don’t interact with sensitive information. Nevertheless, it is a <a href=\"https://www.loginradius.com/blog/identity/2020/12/data-security-best-practices/\">good business practice to safeguard data</a>, no matter how insignificant it may seem. </p>\n<p>LoginRadius identity and access management solutions offer password management that helps make traditional password-based identity-proofing safer in itself.</p>\n<ul>\n<li><strong>Regulated password resets</strong>: This feature allows you to configure your system to mandate it for users to update their password at regular intervals. The default setting is set at 90 days.</li>\n<li><strong>One-way hashing</strong>: This feature encrypts the passwords of users of a system with <a href=\"https://www.loginradius.com/docs/security/platform-security/cryptographic-hashing-algorithms/\">customizable hashing</a> salts. The one-way here means that the password can only be encrypted, not decrypted. To increase security, each consumer is allowed to set a random hashing salt for each password. Thereby also disallowing anyone with access to the database to find out the passwords of other users.</li>\n<li>\n<p><strong>Password policy</strong>: The password policy recommended is:</p>\n<ul>\n<li>Password length + complexity: A minimum of ten characters with at least one number and one symbol.</li>\n<li>Password history: Users cannot use the last five passwords again.</li>\n<li>Maximum password age: 90 days.</li>\n<li>Multi-factor authentication: Optional to enable Google Authenticator or Phone SMS as the second authentication factor.</li>\n</ul>\n</li>\n</ul>\n<p><a href=\"https://www.loginradius.com/resource/the-enterprise-buyers-guide-to-consumer-identity/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"enterprise-buyer-guide-to-consumer-identity\"\n        title=\"enterprise-buyer-guide-to-consumer-identity\"\n        src=\"/static/6cd4771c097ebff7bd4aca4351efd934/e5715/enterprise-buyer-guide-to-consumer-identity.png\"\n        srcset=\"/static/6cd4771c097ebff7bd4aca4351efd934/a6d36/enterprise-buyer-guide-to-consumer-identity.png 650w,\n/static/6cd4771c097ebff7bd4aca4351efd934/e5715/enterprise-buyer-guide-to-consumer-identity.png 768w,\n/static/6cd4771c097ebff7bd4aca4351efd934/63ff0/enterprise-buyer-guide-to-consumer-identity.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<h3 id=\"built-in-layers-of-protection\" style=\"position:relative;\"><a href=\"#built-in-layers-of-protection\" aria-label=\"built in layers of protection permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Built-in layers of protection</h3>\n<p>To further strengthen your system’s ecosystem, LoginRadius’ tools enforce restricted access and stave off <a href=\"https://www.loginradius.com/blog/identity/2019/09/prevent-credential-stuffing-attacks/\">automated attacks</a> on your system. Some of the mechanisms involved in implementing it involve:</p>\n<ul>\n<li><strong>Blacklisting</strong>: You can ban accounts with specific email address domains and thereby, disallow them from registering into your services. </li>\n<li><strong>Whitelisting</strong>: You can allow email addresses of only set domains to interact with and register to your services.</li>\n<li><strong>Brute force lockout</strong>: You can set a threshold for failed login attempts. After a certain number of attempts, you can determine the next course of action. For example, you can temporarily block the account or ask a security question. This effectively reduces the vulnerability to brute force attacks to negligible proportions.</li>\n<li><strong>CAPTCHA</strong>: You can use captcha to restrict bots from generating accounts and interacting with your system. It helps you ensure only humans are using the system.</li>\n</ul>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>With the growing reliance on technology and cloud-based ecosystems, there is a higher susceptibility to <a href=\"https://www.loginradius.com/blog/identity/2019/10/cybersecurity-attacks-business/\">cyber-attacks</a>. SME organizations tend to undermine the benefits of identity proofing and cyber security. </p>\n<p>By improving privacy, the identity proofing process helps build a trustable image in the consumers’ minds towards your brand.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-loginradius\"\n        title=\"book-a-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"December 18, 2020","updated_date":null,"description":"Identity proofing is the process of verifying that the claimed identity of a person matches their actual identity. You’ve probably undergone this process a bunch of times yourself at hotels, financial institutions, and for retailers.","title":"What is Identity Proofing and Why is it Important?","tags":["data security","identity proofing","ciam solution"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5037593984962405,"src":"/static/275ab4ecedf2daa304ca8584a331adf6/33aa5/identity-proofing.jpg","srcSet":"/static/275ab4ecedf2daa304ca8584a331adf6/f836f/identity-proofing.jpg 200w,\n/static/275ab4ecedf2daa304ca8584a331adf6/2244e/identity-proofing.jpg 400w,\n/static/275ab4ecedf2daa304ca8584a331adf6/33aa5/identity-proofing.jpg 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},{"node":{"excerpt":"Identity Governance and Administration (IGA) is defined as the branch of Identity and Access Management (IAM) responsible for making these…","fields":{"slug":"/identity/identity-governance/"},"html":"<p>Identity Governance and Administration (IGA) is defined as the branch of Identity and Access Management (IAM) responsible for making these access approvals while aiding in auditing and meeting compliance standards of some industries.</p>\n<h1 id=\"what-is-identity-governance\" style=\"position:relative;\"><a href=\"#what-is-identity-governance\" aria-label=\"what is identity governance permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is Identity Governance</h1>\n<p>In its essence, Identity Governance is about automating the process of giving relevant data access levels to varying stakeholders. Identity Governance is based on the Identity Governance Framework, a project that aimed to standardize the treatment and facilitation of identity information usage in enterprises. </p>\n<p>At present, IGA is used by several entities across different industries to improve data security of their systems and meet regulatory compliance such as the <a href=\"https://www.cdc.gov/phlp/php/resources/health-insurance-portability-and-accountability-act-of-1996-hipaa.html\">Health Insurance Portability and Accountability Act (HIPAA)</a>, the <a href=\"https://www.congress.gov/bill/107th-congress/house-bill/3763\">Sarbanes-Oxley Act (SOX)</a>, and the Gramm-Leach-Bliley Act (GLBA).</p>\n<h2 id=\"5-most-common-misconceptions-about-identity-governance\" style=\"position:relative;\"><a href=\"#5-most-common-misconceptions-about-identity-governance\" aria-label=\"5 most common misconceptions about identity governance permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>5 Most Common Misconceptions About Identity Governance</h2>\n<h3 id=\"1-only-the-businesses-that-fall-under-regulatory-compliance-need-identity-governance\" style=\"position:relative;\"><a href=\"#1-only-the-businesses-that-fall-under-regulatory-compliance-need-identity-governance\" aria-label=\"1 only the businesses that fall under regulatory compliance need identity governance permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. “Only the businesses that fall under regulatory compliance need identity governance.”</h3>\n<p>While it goes without saying that it should be any business’s priority to safeguard classified information on itself as well as the sensitive and personally identifiable information (PII) of its consumers, that isn’t what IGA is all about. </p>\n<p>Among other merits, IGA is also important for retaining efficiency through a seamless transition in access rights when an employee switches departments or gains privilege access when he or she gets promoted to an administrative position.</p>\n<h3 id=\"2-small-medium-enterprises-need-not-employ-identity_-_governance-and-authorisation\" style=\"position:relative;\"><a href=\"#2-small-medium-enterprises-need-not-employ-identity_-_governance-and-authorisation\" aria-label=\"2 small medium enterprises need not employ identity_ _governance and authorisation permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. <em>“</em>Small-medium enterprises need not employ Identity_ _Governance and Authorisation.”</h3>\n<p>User identities are an essential factor in the protection and monitoring of data. In a predominantly tech-intensive world, enterprises of all sizes need to do their best at safeguarding classified and personal information from <a href=\"https://www.loginradius.com/blog/identity/2019/10/cybersecurity-attacks-business/\">cyber-attacks</a>. </p>\n<p>No matter how big or small, a firm needs to protect its cyber existence and the trust that its consumers placed in it.</p>\n<h3 id=\"3-iga-solutions-are-not-relevant-or-implementable-to-cloud-ecosystems\" style=\"position:relative;\"><a href=\"#3-iga-solutions-are-not-relevant-or-implementable-to-cloud-ecosystems\" aria-label=\"3 iga solutions are not relevant or implementable to cloud ecosystems permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3. “IGA solutions are not relevant or implementable to cloud ecosystems.”</h3>\n<p>Like most of the tech space, IGA has been moving towards cloud governance as well. Leaders in the field integrate their Identity Governance solutions with cross-domain capabilities, hence, allowing administration of cloud as well as on-premises applications.</p>\n<h3 id=\"4-our-internally-made-manual-ig-solutions-allow-satisfactory-control-over-it-systems\" style=\"position:relative;\"><a href=\"#4-our-internally-made-manual-ig-solutions-allow-satisfactory-control-over-it-systems\" aria-label=\"4 our internally made manual ig solutions allow satisfactory control over it systems permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>4. “Our internally made manual IG solutions allow satisfactory control over IT systems.”</h3>\n<p>Manual control of user access, i.e., manually altering the provisioning or deprovisioning of access to data, is inefficient and tedious. Not to mention, it is susceptible to human error. It also distracts the IT staff from other intensive tasks that demand effective human intervention. </p>\n<p>Using an automated and specialized access certification issuing system frees up human capital for core business activities.</p>\n<h3 id=\"5-iga-and-identity-management-are-the-same\" style=\"position:relative;\"><a href=\"#5-iga-and-identity-management-are-the-same\" aria-label=\"5 iga and identity management are the same permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>5. “IGA and identity management are the same.”</h3>\n<p>IGA adds more functionality to the mainstream Identity Management systems. IGA enables an entity to audit access reports for compliance requirements. IGA solutions automate the process of <a href=\"https://www.loginradius.com/provisioning/\">provisioning</a> and deprovisioning the access to certain data by a stakeholder throughout their Access Lifecycle.</p>\n<h2 id=\"5-benefits-of-identity-governance\" style=\"position:relative;\"><a href=\"#5-benefits-of-identity-governance\" aria-label=\"5 benefits of identity governance permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>5 Benefits of Identity Governance</h2>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 60.61538461538461%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"benefits-identity-governance\"\n        title=\"benefits-identity-governance\"\n        src=\"/static/bc0d017a7d1ef1f0b6464b15df5c21bd/e5715/benefits-identity-governance.png\"\n        srcset=\"/static/bc0d017a7d1ef1f0b6464b15df5c21bd/a6d36/benefits-identity-governance.png 650w,\n/static/bc0d017a7d1ef1f0b6464b15df5c21bd/e5715/benefits-identity-governance.png 768w,\n/static/bc0d017a7d1ef1f0b6464b15df5c21bd/2bef9/benefits-identity-governance.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<h3 id=\"1-consumers-can-get-timely-access-to-the-data-they-want\" style=\"position:relative;\"><a href=\"#1-consumers-can-get-timely-access-to-the-data-they-want\" aria-label=\"1 consumers can get timely access to the data they want permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. Consumers can get timely access to the data they want.</h3>\n<p>In the digital age of immediacy and the consequent instant availability of information, we’re no longer used to waiting for hours or even minutes to have access to the information needed. Identity Governance can be a key contributor to <a href=\"https://www.loginradius.com/blog/growth/improve-customer-experience-ecommerce/\">improving CX</a> (Consumer Experience).</p>\n<h3 id=\"2-you-can-handle-access-requests-and-track-danger-requests\" style=\"position:relative;\"><a href=\"#2-you-can-handle-access-requests-and-track-danger-requests\" aria-label=\"2 you can handle access requests and track danger requests permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. You can handle access requests and track danger requests.</h3>\n<p>The Identity Administration part of a typical IGA system would allow for a centralized or designated approval location to be set for different data sets. Hence your stakeholders can conveniently ask for approvals. </p>\n<p>This, at the same time, also allows you to track activity that may seem suspicious and hence kick out the perpetrator before any breaches.</p>\n<h3 id=\"3-flexible-access-and-hence-greater-productivity\" style=\"position:relative;\"><a href=\"#3-flexible-access-and-hence-greater-productivity\" aria-label=\"3 flexible access and hence greater productivity permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3. Flexible access and hence greater productivity.</h3>\n<p>The ongoing pandemic has made the importance of flexibility clear. Always working on-premises and using safe and secured corporate devices and networks is unrealistic in the new context. </p>\n<p>This restates the importance of IGA, through which the firm can allow remote access, albeit limited for security, on employees’ personal devices for the operations to keep running.</p>\n<p><a href=\"https://www.loginradius.com/resource/the-enterprise-buyers-guide-to-consumer-identity/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"enterprise-buyer-guide-to-consumer-identity\"\n        title=\"enterprise-buyer-guide-to-consumer-identity\"\n        src=\"/static/6cd4771c097ebff7bd4aca4351efd934/e5715/enterprise-buyer-guide-to-consumer-identity.png\"\n        srcset=\"/static/6cd4771c097ebff7bd4aca4351efd934/a6d36/enterprise-buyer-guide-to-consumer-identity.png 650w,\n/static/6cd4771c097ebff7bd4aca4351efd934/e5715/enterprise-buyer-guide-to-consumer-identity.png 768w,\n/static/6cd4771c097ebff7bd4aca4351efd934/63ff0/enterprise-buyer-guide-to-consumer-identity.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<h3 id=\"4-helpful-in-meeting-regulations\" style=\"position:relative;\"><a href=\"#4-helpful-in-meeting-regulations\" aria-label=\"4 helpful in meeting regulations permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>4. Helpful in meeting regulations.</h3>\n<p>Since IGA was essentially built to meet corporate regulations on data accessibility, it might seem obvious that it helps an entity meet these regulations. However, you will at first need to make sure that the necessary controls are in place to <a href=\"https://www.loginradius.com/blog/identity/2020/03/how-loginradius-helps-enterprises-stay-ccpa-compliant-in-2020/\">comply with the security and privacy standards</a> set out by data-laws.</p>\n<h3 id=\"5-support-to-auditing\" style=\"position:relative;\"><a href=\"#5-support-to-auditing\" aria-label=\"5 support to auditing permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>5. Support to auditing</h3>\n<p>Applications, devices, data, and stakeholders are all linked through the IGA solutions. Consequently, the system can determine who has access to which information, device, and/or application, hence, helping it in making access reports that are relevant to the questions that come up during regulatory auditing.</p>\n<h2 id=\"empower-your-business-using-loginradius-identity-governance-solution\" style=\"position:relative;\"><a href=\"#empower-your-business-using-loginradius-identity-governance-solution\" aria-label=\"empower your business using loginradius identity governance solution permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Empower Your Business Using LoginRadius Identity Governance Solution</h2>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 68.76923076923077%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"loginradius-identity-governance-solution\"\n        title=\"loginradius-identity-governance-solution\"\n        src=\"/static/61a0eda89e45cff46e96a3657e063f79/e5715/loginradius-identity-governance-solution.png\"\n        srcset=\"/static/61a0eda89e45cff46e96a3657e063f79/a6d36/loginradius-identity-governance-solution.png 650w,\n/static/61a0eda89e45cff46e96a3657e063f79/e5715/loginradius-identity-governance-solution.png 768w,\n/static/61a0eda89e45cff46e96a3657e063f79/2bef9/loginradius-identity-governance-solution.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>The fundamental factor underpinning IGA is <a href=\"https://www.loginradius.com/blog/identity/2020/07/data-governance-best-practices/\">data governance</a>. LoginRadius offers world-class data governance, which, consequently, bolsters your organization’s cybersecurity and the virtual security of your consumers.</p>\n<p>Here’s how LoginRadius’ data governance solutions are remarkably effective at aiding identity governance in your organization:</p>\n<ul>\n<li><strong>A network of data regions</strong>: LoginRadius allows you to serve consumers globally and, at the same time, meet the regional data privacy regulations like <a href=\"https://gdpr-info.eu/\">GDPR</a> through its worldwide network of data centers.</li>\n<li>\n<p><strong>Comprehensive Encryption</strong>: All data moving from one server to another does so over HTTPS tunnels that are encrypted using industry-standard ciphers.</p>\n<ul>\n<li>LoginRadius’ data solutions also let you encrypt data within the LoginRadius Cloud Directory. Depending on your needs, the encryption of user data can be one-way or two-way.</li>\n<li>Critical data, such as passwords, are hashed one-way by default. Thereby disallowing anyone, even database managers, from viewing this data.</li>\n</ul>\n</li>\n<li>\n<p><strong>Transparent data consent and preference management dashboard</strong>: </p>\n<ul>\n<li>The system actively asks for consent from new and existing consumers. You can customize the consent you request from them and thereby conveniently manage their data accordingly with the help of LoginRadius’ tracking system.</li>\n<li>The system also manages and remembers consumers’ preferences. Amongst other things, this includes their preferred mode of communication (e.g., emails, texts, notifications, etc.) and the privacy policies accepted and the ones not accepted.</li>\n</ul>\n</li>\n</ul>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>The demand for IGA is growing year on year. The increased agility granted by introducing IGA in a company’s application ecosystem and elsewhere has logical merit. </p>\n<p>Needless to say, so does the issue of relevant access certification to designated stakeholders. With the automation of policy management and auditing, adding to its favor, identity governance seems immensely important in an increasingly agility-demanding and virtual work environment.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-loginradius\"\n        title=\"book-a-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"December 16, 2020","updated_date":null,"description":"Needless to mention, the question of relevant certification of access to specified stakeholders also applies. In an increasingly agility-intensive and virtual work environment, identity governance seems immensely relevant with the automation of policy management and auditing, adding to its benefit.","title":"What is Identity Governance & Administration?","tags":["data security","identity governance","compliance"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.492537313432836,"src":"/static/fa5b59ab3823c6eaf17c6465ae99ce02/33aa5/identity-governanc.jpg","srcSet":"/static/fa5b59ab3823c6eaf17c6465ae99ce02/f836f/identity-governanc.jpg 200w,\n/static/fa5b59ab3823c6eaf17c6465ae99ce02/2244e/identity-governanc.jpg 400w,\n/static/fa5b59ab3823c6eaf17c6465ae99ce02/33aa5/identity-governanc.jpg 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},{"node":{"excerpt":"Businesses are accountable to consumers that trust them with their personal data. So, they should not only be protecting it but also should…","fields":{"slug":"/identity/privacy-policy-management/"},"html":"<p>Businesses are accountable to consumers that trust them with their personal data. So, they should not only be protecting it but also should be explaining how they are managing and processing such data. </p>\n<p>Our recently launched Privacy Policy Management serves as the central place where businesses maintain versions of their privacy policy, notify consumers when it changes, or get their acceptance of the newer versions. </p>\n<p><img src=\"/c29788d47d12bf23b1516637bc3d2437/privacy-policy-loginradius.gif\" alt=\"privacy-policy-loginradius\"></p>\n<h2 id=\"intend-behind-the-launch\" style=\"position:relative;\"><a href=\"#intend-behind-the-launch\" aria-label=\"intend behind the launch permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Intend Behind the Launch</h2>\n<p>With LoginRadius Privacy Policy Management, we achieve the following benefits for businesses. </p>\n<ul>\n<li><strong>Win consumer trust</strong>: With privacy policy briefing about consumer data collection and usage, businesses can give more clarity around what they're doing to <a href=\"https://www.loginradius.com/security/\">protect such data</a>, and in the process win consumers’ trust.</li>\n<li><strong>Easy implementation</strong>: Businesses can easily configure and deploy privacy policy versioning and related workflows from the LoginRadius Admin Console. It significantly saves time and development efforts.</li>\n<li><strong>Be compliance-ready</strong>: Businesses can be easily <a href=\"https://www.loginradius.com/compliances/\">compliant and audit-ready</a> by keeping a record of information like time of issuing a policy version, until when a policy version was effective, who agreed to which policy version, etc.</li>\n</ul>\n<h2 id=\"key-features-of-loginradius-privacy-policy-management\" style=\"position:relative;\"><a href=\"#key-features-of-loginradius-privacy-policy-management\" aria-label=\"key features of loginradius privacy policy management permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Key Features of LoginRadius Privacy Policy Management</h2>\n<p>As the global compliance and data protection landscape continue to evolve, LoginRadius offers the following capabilities:</p>\n<ul>\n<li>**Versions **- Businesses can name the privacy policy version after each update, making it easier to handle versioning.</li>\n<li>**Timestamps **- Businesses can set and manage the date and time from when a privacy policy version will be effective. They can set the schedule in advance, and the consumers are notified about the new version with a message of their choice to ensure personalization.</li>\n<li>**Flow Type **- Businesses can choose whether notifying the consumers about the privacy policy change is enough or <a href=\"https://www.loginradius.com/blog/identity/2020/06/consumer-data-privacy-security/\">consumers should provide acceptance</a> on the same. LoginRadius handles the notification or the acceptance process on their behalf. </li>\n</ul>\n<p><a href=\"https://www.loginradius.com/resource/privacy-policy-management-datasheet\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"privacy-policy-management-datasheet\"\n        title=\"privacy-policy-management-datasheet\"\n        src=\"/static/4a6a4d40995fdda4041041c29221207a/e5715/privacy-policy-management-datasheet.png\"\n        srcset=\"/static/4a6a4d40995fdda4041041c29221207a/a6d36/privacy-policy-management-datasheet.png 650w,\n/static/4a6a4d40995fdda4041041c29221207a/e5715/privacy-policy-management-datasheet.png 768w,\n/static/4a6a4d40995fdda4041041c29221207a/81501/privacy-policy-management-datasheet.png 2886w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<h2 id=\"implementation-and-deployment\" style=\"position:relative;\"><a href=\"#implementation-and-deployment\" aria-label=\"implementation and deployment permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Implementation and Deployment</h2>\n<p>LoginRadius supports the following implementation and deployment methods for Privacy Policy Management.</p>\n<ul>\n<li><strong>JavaScript:</strong> Implementation and deployment using LoginRadiusV2.js automatically populate the privacy policy message on the registration and login pages if the flow type is Strict in the configuration. </li>\n<li><strong>APIs</strong>: LoginRadius offers <a href=\"https://www.loginradius.com/identity-api/\">API support</a> to prompt consumers to view the privacy policy and allow them to accept it.</li>\n</ul>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>Businesses cannot escape from maintaining privacy policy versions and workflows for their consumers. Looking forward, LoginRadius' Privacy Policy Management will effortlessly ensure a holistic insight into privacy policies where consumers are notified about new updates, everytime. </p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-loginradius\"\n        title=\"book-a-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"December 16, 2020","updated_date":null,"description":"Our newly introduced Privacy Policy Management acts as the central place where companies retain versions of their privacy policy, inform customers when it changes, or get new versions adopted by them.","title":"Announcement: LoginRadius Embraces Privacy Policy Management Amid Heightened Regulatory Updates","tags":["compliance","data privacy","data security","cx"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.408450704225352,"src":"/static/02a23c9872be63fa3fa34ca9490470a2/6051d/privacy-policy-management.png","srcSet":"/static/02a23c9872be63fa3fa34ca9490470a2/69585/privacy-policy-management.png 200w,\n/static/02a23c9872be63fa3fa34ca9490470a2/497c6/privacy-policy-management.png 400w,\n/static/02a23c9872be63fa3fa34ca9490470a2/6051d/privacy-policy-management.png 769w","sizes":"(max-width: 769px) 100vw, 769px"}}},"author":{"id":"Kundan Singh","github":null,"avatar":null}}}}]},"markdownRemark":{"excerpt":"Identity is evolving, and developers are at the forefront of this transformation. Every day brings a new learning—adapting to new standards…","fields":{"slug":"/identity/developer-first-identity-provider-loginradius/"},"html":"<p>Identity is evolving, and developers are at the forefront of this transformation. Every day brings a new learning—adapting to new standards and refining approaches to building secure, seamless experiences.</p>\n<p>We’re here to support developers on that journey. We know how important simplicity, efficiency, and well-structured documentation are when working with identity and access management solutions. That’s why we’ve redesigned the <a href=\"https://www.loginradius.com/\">LoginRadius website</a>—to be faster, more intuitive, and developer-first in every way.</p>\n<p>The goal? Having them spend less time searching and more time building.</p>\n<h2 id=\"whats-new-and-improved-on-the-loginradius-website\" style=\"position:relative;\"><a href=\"#whats-new-and-improved-on-the-loginradius-website\" aria-label=\"whats new and improved on the loginradius website permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What’s New and Improved on the LoginRadius Website?</h2>\n<p>LoginRadius’ vision is to give developers a product that simplifies identity management so they can focus on building, deploying, and scaling their applications. To enhance this experience, we’ve spent the last few months redesigning our interface— making navigation more intuitive and reassuring that essential resources are easily accessible.</p>\n<p>Here’s a closer look at what’s new and why it’s important:</p>\n<h3 id=\"a-developer-friendly-dark-theme\" style=\"position:relative;\"><a href=\"#a-developer-friendly-dark-theme\" aria-label=\"a developer friendly dark theme permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>A Developer-Friendly Dark Theme</h3>\n<p><img src=\"/f46881583c7518a93bb24e94c32320de/a-developer-friendly-dark-theme.webp\" alt=\"This image shows how LoginRadius offers several authentication methods like traditional login, social login, passwordless login, passkeys and more in a dark mode.\">    </p>\n<p>Developers spend long hours working in dark-themed IDEs and terminals, so we’ve designed the LoginRadius experience to be developer-friendly and align with that preference.</p>\n<p>The new dark mode reduces eye strain, enhances readability, and provides a seamless transition between a coding environment and our platform. Our new design features a clean, modern aesthetic with a consistent color scheme and Barlow typography, ensuring better readability. High-quality graphics and icons are thoughtfully placed to enhance the content without adding visual clutter.</p>\n<p>So, whether you’re navigating our API docs or configuring authentication into your system, our improved interface will make those extended development hours more comfortable and efficient.</p>\n<h3 id=\"clear-categorization-for-loginradius-capabilities\" style=\"position:relative;\"><a href=\"#clear-categorization-for-loginradius-capabilities\" aria-label=\"clear categorization for loginradius capabilities permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Clear Categorization for LoginRadius Capabilities</h3>\n<p><img src=\"/e5358b82be414940f3fb146013845933/capabilities.webp\" alt=\"This image shows a breakdown of all the LoginRadius CIAM capabilities, including authentication, security, UX, scalability and multi-brand management.\"></p>\n<p>We’ve restructured our website to provide a straightforward breakdown of our customer identity and access management platform capabilities, helping you quickly find what you need:</p>\n<ul>\n<li>Authentication: Easily understand <a href=\"https://www.loginradius.com/blog/identity/authentication-option-for-your-product/\">how to choose the right login method</a>, from traditional passwords and OTPs to social login, federated SSO, and passkeys with few lines of code.</li>\n<li>Security: Implement no-code security features like bot detection, IP throttling, breached password alerts, DDoS protection, and adaptive MFA to safeguard user accounts.</li>\n<li>User Experience: Leverage AI builder, hosted pages, and drag-and-drop workflows to create smooth, branded sign-up and login experiences.</li>\n<li>High Performance &#x26; Scalability: Confidently scale with sub-100ms API response times, 100% uptime, 240K+ RPS, and 28+ global data center regions.</li>\n<li>Multi-Brand Management: Efficiently manage multiple identity apps, choosing isolated or shared data stores based on your brand’s unique needs.</li>\n</ul>\n<p>This structured layout ensures you can quickly understand each capability and how it integrates into your identity ecosystem.</p>\n<h3 id=\"developer-first-navigation\" style=\"position:relative;\"><a href=\"#developer-first-navigation\" aria-label=\"developer first navigation permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Developer-First Navigation</h3>\n<p><img src=\"/a8c155c2b6faf3d5f4b4de4e2b14d763/developers-menu.webp\" alt=\"This image shows the LoginRadius menu bar, highlighting the developer dropdown.\">   </p>\n<p>We’ve been analyzing developer workflows to identify how you access key resources. That’s why we redesigned our navigation with one goal in mind: to reduce clicks and make essential resources readily available.</p>\n<p>The new LoginRadius structure puts APIs, SDKs, and integration guides right at the menu bar under the Developers dropdown so you can get started faster. Our Products, Solutions, and Customer Services are also clearly categorized, helping development teams quickly find the right tools and make informed decisions.</p>\n<h3 id=\"quick-understanding-of-integration-benefits\" style=\"position:relative;\"><a href=\"#quick-understanding-of-integration-benefits\" aria-label=\"quick understanding of integration benefits permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Quick Understanding of Integration Benefits</h3>\n<p><img src=\"/b2f9a964a2da0ea83e2f8596b833bba7/we-support-your-tech-stack.webp\" alt=\"This image shows a list of popular programming languages and frameworks offered by LoginRadius.\"></p>\n<p>Developers now have a clear view of the tech stack available with LoginRadius, designed to support diverse business needs.</p>\n<p>Our platform offers pre-built SDKs for Node.js, Python, Java, and more, making CIAM integration seamless across popular programming languages and frameworks.</p>\n<h2 id=\"over-to-you-now\" style=\"position:relative;\"><a href=\"#over-to-you-now\" aria-label=\"over to you now permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Over to You Now!</h2>\n<p>Check out our <a href=\"https://www.loginradius.com/\">revamped LoginRadius website</a> and see how the improved experience makes it easier to build, scale, and secure your applications.</p>\n<p>Do not forget to explore the improved navigation and API documentation, and get started with our free trial today. We’re excited to see what you’ll build with LoginRadius!</p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"February 21, 2025","updated_date":null,"description":"LoginRadius’ vision is to give developers a product that simplifies identity management so they can focus on building, deploying, and scaling their applications. To enhance this experience, we’ve redesigned our website interface, making navigation more intuitive and reassuring that essential resources are easily accessible.","title":"Revamped & Ready: Introducing the New Developer-First LoginRadius Website","tags":["Developer tools","API","Identity Management","User Authentication"],"pinned":true,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.7857142857142858,"src":"/static/80b4e4fbe176a10a327d273504607f32/58556/hero-section.webp","srcSet":"/static/80b4e4fbe176a10a327d273504607f32/61e93/hero-section.webp 200w,\n/static/80b4e4fbe176a10a327d273504607f32/1f5c5/hero-section.webp 400w,\n/static/80b4e4fbe176a10a327d273504607f32/58556/hero-section.webp 800w,\n/static/80b4e4fbe176a10a327d273504607f32/99238/hero-section.webp 1200w,\n/static/80b4e4fbe176a10a327d273504607f32/7c22d/hero-section.webp 1600w,\n/static/80b4e4fbe176a10a327d273504607f32/1258b/hero-section.webp 2732w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},"pageContext":{"limit":6,"skip":318,"currentPage":54,"type":"//identity//","numPages":70,"pinned":"ee8a4479-3471-53b1-bf62-d0d8dc3faaeb"}},"staticQueryHashes":["1171199041","1384082988","2100481360","23180105","528864852"]}