{"componentChunkName":"component---src-templates-blog-list-template-js","path":"/identity/61","result":{"data":{"allMarkdownRemark":{"edges":[{"node":{"excerpt":"LoginRadius is a rapidly-expanding platform. And this time, the cloud-based customer identity and access management solution has launched a…","fields":{"slug":"/identity/loginradius-pin-based-authentication/"},"html":"<p>LoginRadius is a rapidly-expanding platform. And this time, the cloud-based customer identity and access management solution has launched a PIN Login authentication environment for its existing and new customers.</p>\n<h2 id=\"intend-behind-the-launch\" style=\"position:relative;\"><a href=\"#intend-behind-the-launch\" aria-label=\"intend behind the launch permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Intend Behind The Launch</h2>\n<p>The <a href=\"https://www.loginradius.com/multi-factor-authentication/\">method of authentication</a> is an important aspect of security, and likewise, a PIN strikes just the right balance between security and usability.</p>\n<p>To be clear, by authentication we mean how we identify and verify users on our platform to make sure <strong><em>'they are who they say they are.'</em></strong></p>\n<p>LoginRadius customers can now avoid time-consuming delays caused by entering long, complex credentials repeatedly within a trusted device. PIN login will also pose an additional challenge for hackers during or after login.</p>\n<h2 id=\"the-benefits-of-pin-authentication\" style=\"position:relative;\"><a href=\"#the-benefits-of-pin-authentication\" aria-label=\"the benefits of pin authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>The Benefits of PIN Authentication</h2>\n<p>In a new generation of end-users, a strong PIN based authentication uptake is a better way to validate their authenticity. Whether it’s PIN based authentication through platform or PIN authenticator, it’s always a reliable way of authentication when it comes to security and convenience. Here are a few more advantages of using PIN login as a method of authentication. </p>\n<ul>\n<li>It simplifies the login process. </li>\n<li>The validation happens in a matter of a few seconds. </li>\n<li>PIN authentication is hassle-free, convenient, and less time-consuming.</li>\n<li>The need for re-authentication during critical events strengthens security.</li>\n</ul>\n<h2 id=\"what-does-the-threat-mitigating-model-look-like\" style=\"position:relative;\"><a href=\"#what-does-the-threat-mitigating-model-look-like\" aria-label=\"what does the threat mitigating model look like permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What Does the Threat Mitigating Model Look Like</h2>\n<p>We have followed strict authentication protocols to make this launch a success. Likewise, here is an outline of how our threat mitigation model looks like and what it offers:</p>\n<p><strong>Enhanced usability for end-user</strong>: For customers looking for a secure, seamless sign-in to justify the authenticity of end-users, PIN Login will offer a shorter, less time consuming, and more usable experience that <a href=\"https://www.loginradius.com/blog/2019/05/what-is-single-sign-on/\">simplifies the sign-in process</a>.</p>\n<p><strong>No third-party integration</strong>: We conduct authentication and authorization of end-users inside our identity environment. No other third-party service provider is involved resulting in better response speed and boosted security.</p>\n<p><strong>Re-authentication upon prolonged inactivity</strong>: Long-lived sessions are harmful, especially if the user was inactive for a longer period of time. The new PIN login will require users to re-authenticate after a pre-set time duration.</p>\n<p><strong>Critical Information Accessibility</strong>: End-users will be validated every time when conducting a critical event. This event-based re-authentication flow will work for scenarios like while processing a transaction or deleting an account.</p>\n<p><strong>Complete configurable solution</strong>: Customers can configure the PIN length based on industry standards and set the flow as a mandate or optional for the end-users.</p>\n<p><strong>Forced account lockouts</strong>: The account will be locked automatically upon hitting the configured number of failed PIN attempts. The PIN will act as the protection layer against vulnerabilities like brute force attacks.</p>\n<p><a href=\"https://www.loginradius.com/resource/loginradius-and-pin-auth\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"Pin login data sheet\"\n        title=\"Pin login data sheet\"\n        src=\"/static/e67d9aef78dc3d6232525104404555df/e5715/DS-PIN-Login-1024x310.png\"\n        srcset=\"/static/e67d9aef78dc3d6232525104404555df/a6d36/DS-PIN-Login-1024x310.png 650w,\n/static/e67d9aef78dc3d6232525104404555df/e5715/DS-PIN-Login-1024x310.png 768w,\n/static/e67d9aef78dc3d6232525104404555df/2bef9/DS-PIN-Login-1024x310.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<p><strong>Pin Login Data Sheet</strong></p>\n<h2 id=\"making-authentication-convenient-and-simple-for-end-users\" style=\"position:relative;\"><a href=\"#making-authentication-convenient-and-simple-for-end-users\" aria-label=\"making authentication convenient and simple for end users permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Making Authentication Convenient and Simple for End-Users</h2>\n<p>It is quite impressive to deliver seamless experiences from the first interaction itself. With the latest PIN authentication, we aim to streamline end-users' journey by providing a <a href=\"https://www.loginradius.com/blog/identity/passwordless-authentication-the-future-of-identity-and-security/\">passwordless experience</a>.</p>\n<p>Our PIN login is another giant step towards achieving better security, usability, and identity management.</p>\n<h2 id=\"a-final-word\" style=\"position:relative;\"><a href=\"#a-final-word\" aria-label=\"a final word permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>A Final Word</h2>\n<p>PIN login is a successful attempt at not just embracing an alternative  two factor authentication PIN method or the multi factor authentication PIN method for the LoginRadius identity platform, but using a variety of other factors and combining them contextually for secured access management. </p>\n<p>All-in-all, we aim to ensure that logins are secure, simple, seamless, and frictionless. And if it can turn customers into loyal advocates, that will serve our purpose even better.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-free-demo-loginradius\"\n        title=\"book-a-free-demo-loginradius\"\n        src=\"/static/779ad148d33fb1ecfd80cc41f1a94ef3/e5715/Book-a-free-demo-request-1024x310.png\"\n        srcset=\"/static/779ad148d33fb1ecfd80cc41f1a94ef3/a6d36/Book-a-free-demo-request-1024x310.png 650w,\n/static/779ad148d33fb1ecfd80cc41f1a94ef3/e5715/Book-a-free-demo-request-1024x310.png 768w,\n/static/779ad148d33fb1ecfd80cc41f1a94ef3/2bef9/Book-a-free-demo-request-1024x310.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"April 28, 2020","updated_date":null,"description":"LoginRadius is a rapidly-expanding identity management platform. And this time, for its current and new clients, the cloud-based client identity and access management solution has introduced a PIN Login authentication environment.","title":"Announcement - LoginRadius Now Supports PIN Login with Enhanced Features","tags":["pin authentication","ciam solution","identity management"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.408450704225352,"src":"/static/2e44c89cd97a7cea9a08794c5a1d9ace/6051d/LoginRadius-Pin-Authentication.png","srcSet":"/static/2e44c89cd97a7cea9a08794c5a1d9ace/69585/LoginRadius-Pin-Authentication.png 200w,\n/static/2e44c89cd97a7cea9a08794c5a1d9ace/497c6/LoginRadius-Pin-Authentication.png 400w,\n/static/2e44c89cd97a7cea9a08794c5a1d9ace/6051d/LoginRadius-Pin-Authentication.png 769w","sizes":"(max-width: 769px) 100vw, 769px"}}},"author":{"id":"Kundan Singh","github":null,"avatar":null}}}},{"node":{"excerpt":"LoginRadius has banned the use of the video-conferencing app Zoom by LoginRadius staff owing to the security concerns centering around fake…","fields":{"slug":"/identity/loginradius-bans-zoom/"},"html":"<p>LoginRadius has banned the use of the video-conferencing app Zoom by LoginRadius staff owing to the security concerns centering around fake end-to-end-encryption claims and incomplete privacy policy.</p>\n<p>The decision came after the wide-scale criticism about its security and privacy lapses surfaced in recent weeks. There were also instances of leaked passwords and conferences being hijacked midway.</p>\n<h2 id=\"why-is-the-ban-imposed\" style=\"position:relative;\"><a href=\"#why-is-the-ban-imposed\" aria-label=\"why is the ban imposed permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Why Is the Ban Imposed</h2>\n<p>Zoom shot to unexpected popularity amid the coronavirus pandemic. With countries adopting quarantine measures, more and more people were using the platform for virtual meetings, online education, and even face-timing with friends.</p>\n<p>However, the video conferencing app came under the scanner when the news of multiple security vulnerabilities began surfacing from around the world.</p>\n<p>Earlier in April, <a href=\"https://www.bbc.com/news/technology-52200507\">Taiwan advised government agencies</a> against using Zoom when a group of researchers discovered that some traffic on the con-call was being sent through Beijing when all the participants were in North America.</p>\n<p>Google, SpaceX, NASA has also reportedly banned the application over data security concerns. <a href=\"https://www.theguardian.com/world/2020/apr/11/singapore-bans-teachers-using-zoom-after-hackers-post-obscene-images-on-screens\">Singapore has banned its teachers</a> from using Zoom after gatecrashers interrupted a class and posted obscene images. Even the <a href=\"https://www.fbi.gov/contact-us/field-offices/boston/news/press-releases/fbi-warns-of-teleconferencing-and-online-classroom-hijacking-during-covid-19-pandemic\">FBI has warned</a> of Zoom’s hijacking threats.</p>\n<p>The Cyber Coordination Centre (CyCord) of India’s Ministry of Home Affairs (MHA) has also issued a <a href=\"http://164.100.117.97/WriteReadData/userfiles/comprehensive-advisory-Zoom-%20meeting%20platfom-20200412-%282%29.pdf\">16-page advisory</a> related to its security loopholes and poor data privacy practices.</p>\n<h2 id=\"putting-security-at-the-core\" style=\"position:relative;\"><a href=\"#putting-security-at-the-core\" aria-label=\"putting security at the core permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Putting Security at the Core</h2>\n<p>LoginRadius has been implementing its business continuity plan to <a href=\"https://www.loginradius.com/blog/identity/loginradius-business-continuity-covid-19-outbreak/\">fight the COVID-19 outbreak</a>. We are following stringent privacy regulations and taking every possible measure to protect the confidentiality of our customer data.</p>\n<p>Therefore, as several countries expressed concern about the flawed security policies of the Zoom app, we decided to pull the plug on this one immediately.</p>\n<h2 id=\"a-final-word\" style=\"position:relative;\"><a href=\"#a-final-word\" aria-label=\"a final word permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>A Final Word</h2>\n<p>There is virtually no alternative to securing customer data than adopting stringent data security measures. At <a href=\"https://www.loginradius.com/\">LoginRadius</a>, we offer the highest level of transparency to our customers and stakeholders.</p>\n<p>We are always on the lookout to counter any disruption rising from potential threats that may affect our customers. We assure that personal assets remain protected, and we respond quickly in the event of a disaster.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"Book a demo 1024x310\"\n        title=\"Book a demo 1024x310\"\n        src=\"/static/c4fac6b24f15c7b7ba84deec1d1107ac/e5715/Book-a-demo-1024x310.png\"\n        srcset=\"/static/c4fac6b24f15c7b7ba84deec1d1107ac/a6d36/Book-a-demo-1024x310.png 650w,\n/static/c4fac6b24f15c7b7ba84deec1d1107ac/e5715/Book-a-demo-1024x310.png 768w,\n/static/c4fac6b24f15c7b7ba84deec1d1107ac/2bef9/Book-a-demo-1024x310.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"April 23, 2020","updated_date":null,"description":"Because of security issues, LoginRadius has forbidden the use of the Zoom video conferencing software by LoginRadius employees.","title":"LoginRadius Bans Video Conferencing App ‘Zoom’ Over Security Concerns","tags":["industry-news"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.408450704225352,"src":"/static/fa33939677023f22dbd041a4709bbeb7/14b42/LoginRadius-Bans-Zoom.jpg","srcSet":"/static/fa33939677023f22dbd041a4709bbeb7/f836f/LoginRadius-Bans-Zoom.jpg 200w,\n/static/fa33939677023f22dbd041a4709bbeb7/2244e/LoginRadius-Bans-Zoom.jpg 400w,\n/static/fa33939677023f22dbd041a4709bbeb7/14b42/LoginRadius-Bans-Zoom.jpg 800w,\n/static/fa33939677023f22dbd041a4709bbeb7/619a6/LoginRadius-Bans-Zoom.jpg 1068w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},{"node":{"excerpt":"With the COVID-19 pandemic forcing employees to stay indoors, how do you protect your business from a Corporate Account Takeover (CATO…","fields":{"slug":"/identity/corporate-account-takeover-attacks/"},"html":"<p>With the COVID-19 pandemic forcing employees to stay indoors, how do you protect your business from a Corporate Account Takeover (CATO) fraud?</p>\n<p>The use of stolen workforce identity by cybercriminals has been a popular hacking tactic for many years now. With the current world crisis, it is even easier to exploit coronavirus fears and steal corporate information, especially financial and medical data (which is very sensitive at the moment).</p>\n<p>So, what do you do?</p>\n<p>Well, as scary as it may sound, there are capabilities around corporate account takeover risk detection that can help organizations fight back.</p>\n<p>But first, let’s get to the core.</p>\n<h2 id=\"what-is-corporate-account-takeover\" style=\"position:relative;\"><a href=\"#what-is-corporate-account-takeover\" aria-label=\"what is corporate account takeover permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is Corporate Account Takeover</h2>\n<p>A corporate account takeover (CATO) is a kind of enterprise identity theft where unauthorized users steal employee passwords and other credentials to gain access to highly sensitive information within the organization.</p>\n<p>The media, finance, hospitality, retail, supply chain, gaming, travel, and hospitality industry are the hotspots for cybercriminals to devise their corporate account takeover attack.</p>\n<p>Here is how the scam works.</p>\n<p>The attacker may use phishing tactics, like approaching an employee to discuss an account-related error and then requesting login credentials to fix the issue.</p>\n<p>They use the <a href=\"https://www.loginradius.com/blog/2019/09/prevent-credential-stuffing-attacks/\">credentials to hack into the account</a> and exploit the financial stability and reputation of the account holder – in this case, the employee and the business at large.</p>\n<p>Corporate account takeover attacks are becoming more sophisticated and consequential with time and are costing millions of dollars every year.</p>\n<p>According to the 2020 Global Identity and Fraud Report by Experian, 57% of enterprises report higher fraud losses due to account takeover.</p>\n<h2 id=\"types-of-organization-mainly-targeted-by-account-takeover-ato-attacks\" style=\"position:relative;\"><a href=\"#types-of-organization-mainly-targeted-by-account-takeover-ato-attacks\" aria-label=\"types of organization mainly targeted by account takeover ato attacks permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Types of organization mainly targeted by account takeover (ATO) attacks</h2>\n<ul>\n<li><strong>Media and Entertainment Industry</strong>: Lately, there is a thriving parasitic ecosystem on the verge of overpowering the <a href=\"https://www.infosecurity-magazine.com/blogs/rise-account-takeover-media-1-1-1-1/\">music and video streaming</a> industry. Criminals work on a pretty straightforward model here by stealing login credentials from premium customers and selling them at a lower price for illegal access.</li>\n<li><strong>Financial Industry</strong>: Account takeover attacks also <a href=\"https://securityboulevard.com/2019/12/digital-banks-targeted-in-account-takeover-scams/\">threaten bank security</a>, insurance companies, and other financial institutions. Fraudsters steal victim's credentials or use phishing techniques to trick banks and gain complete control of millions of accounts.</li>\n<li><strong>Hospitality Industry</strong>: The <a href=\"https://www.loginradius.com/blog/2020/03/improve-customer-experience-hospitality-industry/\">hospitality industry</a> is a popular and easy target for fraudsters to deploy account takeover strategies. Hackers often seal reward balances and exploit them, resulting in the loss of loyal customers and damage to the brand's reputation.</li>\n<li><strong>Sports Industry</strong>: The <a href=\"https://www.loginradius.com/blog/2018/11/improving-customer-fan-experience-sports-entertainment-industry/\">sports industry</a> is a lucrative business. With sensitive information, athlete negotiation figures, medical records, strategy documents, and intellectual property, fraudsters are on the lookout for loopholes to steal those assets.</li>\n<li><strong>Retail Industry</strong>: Account takeover is a complex challenge for the <a href=\"https://www.loginradius.com/blog/2018/11/improving-customer-experience-in-the-retail-e-commerce-industry/\">retail industry</a> too. Fraudsters make money from such attacks in a number of ways. Examples include ordering goods with the hacked account, purchasing gift cards, redeeming rewards points, and worst, selling compromised accounts on the dark web.</li>\n<li><strong>Gaming Industry</strong>: The <a href=\"https://www.loginradius.com/blog/2020/01/improving-customer-experience-in-the-gaming-industry/\">gaming platform</a> has always been on the account takeover radar. Cybercriminals steal in-game payment information and make illegal purchases. They use <a href=\"https://www.pymnts.com/fraud-prevention/2019/deep-dive-video-game-fraud/\">stolen account information</a> to pull off phishing scams by luring other players into opening links with free character or in-game currency.</li>\n</ul>\n<h2 id=\"business-impact-of-corporate-account-takeover\" style=\"position:relative;\"><a href=\"#business-impact-of-corporate-account-takeover\" aria-label=\"business impact of corporate account takeover permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Business Impact of Corporate Account Takeover</h2>\n<p>Corporate account takeover is a big deal. It is one of the most damaging cyber threats that businesses and customers face today.</p>\n<p>These attacks are difficult to detect as criminals hack into accounts with legitimate credentials. By and large, these attacks hurt businesses’ reputation, scare customers, and can even end up with companies having to pay a heavy penalty.</p>\n<p>For instance, if the violation is booked under the EU’s GDPR, a fine as much as 4 percent of global annual turnover may be levied.</p>\n<p><strong>Some recent account takeover attacks:</strong></p>\n<ol>\n<li><a href=\"https://www.scmagazine.com/home/security-news/j-crew-says-year-old-breach-exposed-customer-account-info/\">J.Crew data breach</a>: In March 2020, J.Crew informed its customers that an unauthorized third-party accessed their accounts nearly a year ago.</li>\n<li><a href=\"https://www.loginradius.com/blog/2020/04/marriott-data-breach-2020/\">New Marriott data breach</a>: In March 2020, Marriott International announced another data breach that approximately affected 5.2 million guests.</li>\n<li><a href=\"https://www.computerweekly.com/news/252479101/Sports-retailer-Decathlon-left-employee-data-exposed\">Decathlon left data breach</a>: In February 2020, sports retailer Decathlon accidentally exposed more than 123 million employee data on an unsecured ElasticSearch server.</li>\n</ol>\n<h2 id=\"7-common-attacks-that-lead-to-corporate-account-takeover\" style=\"position:relative;\"><a href=\"#7-common-attacks-that-lead-to-corporate-account-takeover\" aria-label=\"7 common attacks that lead to corporate account takeover permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>7 Common Attacks That Lead To Corporate Account Takeover</h2>\n<p>Not <a href=\"https://www.loginradius.com/blog/2019/10/cybersecurity-attacks-business/\">all cyber attacks</a> are highly technical. In fact, the majority of them use simple tricks to deceive users into sharing their login credentials. Here are a few authentication attacks that may end up with a corporate account takeover.</p>\n<h3 id=\"1-phishing-attack\" style=\"position:relative;\"><a href=\"#1-phishing-attack\" aria-label=\"1 phishing attack permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. Phishing Attack</h3>\n<p>Perhaps the most common of all attacks, the bad guys during phishing attacks pose themselves as legit organizations and ask for personally identifiable information (PII) from the individual or company.</p>\n<p>The goal is to trick the recipient (over a phone call, email, or text messages) into taking action, like opening a link or downloading an attachment with malicious code.</p>\n<p>PII is any data that can be used to identify an individual. For example, name, geographic location, SSN, IP address, passport number, etc.</p>\n<p><a href=\"https://www.loginradius.com/resource/pii-data-breach-report/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"Protecting PII Against Data Breaches 1024x310\"\n        title=\"Protecting PII Against Data Breaches 1024x310\"\n        src=\"/static/3183d14f6c9662008b848dc5d81d718f/e5715/Protecting-PII-Against-Data-Breaches-1024x310.png\"\n        srcset=\"/static/3183d14f6c9662008b848dc5d81d718f/a6d36/Protecting-PII-Against-Data-Breaches-1024x310.png 650w,\n/static/3183d14f6c9662008b848dc5d81d718f/e5715/Protecting-PII-Against-Data-Breaches-1024x310.png 768w,\n/static/3183d14f6c9662008b848dc5d81d718f/2bef9/Protecting-PII-Against-Data-Breaches-1024x310.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<p><strong>Tips to detect a phishing attack</strong></p>\n<ul>\n<li>Emails starting with generic greetings like “hi there” instead of the recipient’s name.</li>\n<li>Emails that ask you to complete an action almost immediately. For example, your account will be blocked if you do not provide a set of details.</li>\n<li>Emails that do not take you to a page it claims to, and the URL does not begin with HTTPS.</li>\n</ul>\n<h3 id=\"2-brute-force-attack\" style=\"position:relative;\"><a href=\"#2-brute-force-attack\" aria-label=\"2 brute force attack permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. Brute Force Attack</h3>\n<p>Fraudsters conduct this type of corporate account takeover to target large businesses. They use automated bots to systematically check and identify valid credentials to crack password codes and log in to compromised accounts.</p>\n<p><strong>Tips to detect brute force attack</strong></p>\n<ul>\n<li>Surprisingly high login attempts on a single account.</li>\n<li>Failed testing attempts with multiple account ids and passwords.</li>\n<li>An exponential rise in account locks.</li>\n<li>More and more cases of hijacked accounts.</li>\n</ul>\n<h3 id=\"3-credential-stuffing\" style=\"position:relative;\"><a href=\"#3-credential-stuffing\" aria-label=\"3 credential stuffing permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3. Credential Stuffing</h3>\n<p>If your employees have been using the same password for multiple accounts, consider it a treat for cybercriminals. <a href=\"https://www.loginradius.com/blog/2019/09/prevent-credential-stuffing-attacks/\">Credential stuffing happens</a> when the attacker uses bot attacks to verify login credentials instead of manually testing credentials one-by-one.</p>\n<p><strong>Tips to detect credential stuffing</strong></p>\n<ul>\n<li>High rise in login attempts and failed login counts.</li>\n<li>Irregular traffic volumes.</li>\n<li>High use of non-existing user names during authentication.</li>\n<li>Abnormal bounce rate on the authentication page.</li>\n</ul>\n<h3 id=\"4-man-in-the-middle-attack\" style=\"position:relative;\"><a href=\"#4-man-in-the-middle-attack\" aria-label=\"4 man in the middle attack permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>4. Man-in-the-middle attack</h3>\n<p>The man-in-the-middle attack is a kind of cyber eavesdropping where the attacker intercepts communication between two entities and manipulates the transfer of data in real-time.</p>\n<p>For example, the attacker will exploit the real-time processing of transactions between a bank and its customer by diverting the customer to a fraudulent account.</p>\n<p><strong>Tips to detect man-in-the-middle attack</strong></p>\n<ul>\n<li>TCP and HTTP signatures during user sessions do not match.</li>\n<li>Evil twin Wi-Fi networks like IkeaFreeWiFi and IkeaWiFiJoin in the same location.</li>\n<li>Login pages that look fake.</li>\n<li>Software update pop-ups that look illegitimate.</li>\n<li>Suspicious SSIDs.</li>\n</ul>\n<h3 id=\"5-password-spraying\" style=\"position:relative;\"><a href=\"#5-password-spraying\" aria-label=\"5 password spraying permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>5. Password spraying</h3>\n<p>Password spraying is also a kind of brute force attack where the attacker feeds in a large database of usernames and password combinations in the hope that a few of those will work.</p>\n<p>It can be a dictionary attack where fraudsters enter the <a href=\"https://www.loginradius.com/blog/2019/12/worst-passwords-list-2019/\">most commonly-used passwords</a> to hack into accounts. A lot of people still use the same password for multiple sites.</p>\n<p><strong>Tips to detect password spraying attack</strong></p>\n<ul>\n<li>Login attempts from non-existent users.</li>\n<li>Significant increase in account lockouts.</li>\n<li>High login failure rate.</li>\n<li>Repeated login attempts from the same URL.</li>\n</ul>\n<h3 id=\"6-social-engineering\" style=\"position:relative;\"><a href=\"#6-social-engineering\" aria-label=\"6 social engineering permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>6. Social Engineering</h3>\n<p>Social engineering is a kind of corporate account takeover attack where the cybercriminal manipulates an employee into giving away login credentials or access into sensitive information.</p>\n<p>Fraudsters conduct social engineering in stages. First, they gather information about the intended victim. Then, they plan to launch and execute an attack by exploiting the victim’s weakness. Finally, they use the acquired data to conduct the attack.</p>\n<p><strong>Tips to detect social engineering attack</strong></p>\n<ul>\n<li>Unsolicited emails requesting payment information.</li>\n<li>Asking for OTP following a two-factor authentication. </li>\n<li>Suspicious chat boxes popping up.</li>\n</ul>\n<h3 id=\"7-session-hijacking\" style=\"position:relative;\"><a href=\"#7-session-hijacking\" aria-label=\"7 session hijacking permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>7. Session Hijacking</h3>\n<p>As the name suggests, session hijacking happens when the attacker takes complete control of a user session. Note that a session starts when you log in to a service like your banking app and ends when you log out of it.</p>\n<p>A successful session hijacking results in giving the attacker access to multiple gateways like financial and customer records and to other applications with intellectual properties.</p>\n<p><strong>Tips to detect session hijacking</strong></p>\n<ul>\n<li>Unusual frequency in the Received Signal Strength (RSS).</li>\n</ul>\n<h2 id=\"best-business-practices-to-prevent-corporate-account-takeover\" style=\"position:relative;\"><a href=\"#best-business-practices-to-prevent-corporate-account-takeover\" aria-label=\"best business practices to prevent corporate account takeover permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Best Business Practices to Prevent Corporate Account Takeover</h2>\n<p>Start with building a strong relationship with your employees. Make them understand what security measures they need to implement to safeguard their accounts and prevent unauthorized access to corporate data.</p>\n<p>Here are a few standard practices that you can follow:</p>\n<ul>\n<li>Flag emails that are too similar to your corporate email account.</li>\n<li>Register all domains that resemble your actual corporate domain.</li>\n<li>Add <a href=\"https://www.loginradius.com/multi-factor-authentication/\">MFA/2FA authentication</a> to verify the payment location, if it has been changed.</li>\n<li>Block unauthorized access attempts with authentication factors like biometric identifiers. </li>\n<li>Use phone, email, or any other verification factor to confirm fund transfer requests. </li>\n<li>Install spam filters in all systems across your organization.</li>\n<li>Install security updates as and when available.</li>\n<li>Perform security scans every month and note unexpected changes and unusual pop-ups.</li>\n<li>Educate employees not to use publicly available access points. </li>\n<li>Educate employees not to open unidentified attachments and emails. </li>\n<li>Train employees on how to identify suspicious emails.</li>\n</ul>\n<h2 id=\"how-loginradius-eliminates-account-takeover-attacks-for-enterprise-customers\" style=\"position:relative;\"><a href=\"#how-loginradius-eliminates-account-takeover-attacks-for-enterprise-customers\" aria-label=\"how loginradius eliminates account takeover attacks for enterprise customers permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How LoginRadius Eliminates Account Takeover Attacks for Enterprise Customers?</h2>\n<p>Customer-facing enterprises deal with large volumes of data every day. And it is their responsibility to protect them.</p>\n<p>LoginRadius is a cloud-based <a href=\"https://www.loginradius.com/blog/2019/06/customer-identity-and-access-management/\">customer identity and access management</a> (CIAM) platform that gets the much needed extra layer of protection for enterprises to protect customer data. The CIAM solution detects malicious activity before it can cause any harm to organizational reputation.</p>\n<p>Check out how LoginRadius prevents corporate account takeover attacks for enterprises:</p>\n<h3 id=\"passwordless-authentication-or-instant-login\" style=\"position:relative;\"><a href=\"#passwordless-authentication-or-instant-login\" aria-label=\"passwordless authentication or instant login permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Passwordless Authentication or Instant Login</h3>\n<p>To remove the risk of passwords altogether, LoginRadius offers <a href=\"https://www.loginradius.com/blog/2019/10/passwordless-authentication-the-future-of-identity-and-security/\">passwordless authentication</a> or instant login.</p>\n<p>Customers can either login using a magic link or via an OTP delivered to their registered email address or phone number. The best part, this method does not require registration or any preassigned credentials to log in.</p>\n<h3 id=\"multi-factor-authentication\" style=\"position:relative;\"><a href=\"#multi-factor-authentication\" aria-label=\"multi factor authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Multi-Factor Authentication</h3>\n<p>The secure identity and access management provider also offers two-factor or <a href=\"https://www.loginradius.com/blog/2019/06/what-is-multi-factor-authentication/\">multi-factor authentication</a> (2FA/MFA). This feature provides an extra layer of security to ensure that the right customer gets access to the correct account.</p>\n<p>For example, the customer is required to enter an OTP or answer a security question, even after filling in the login credentials.</p>\n<h3 id=\"risk-based-authentication\" style=\"position:relative;\"><a href=\"#risk-based-authentication\" aria-label=\"risk based authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Risk-based Authentication</h3>\n<p>This standard CIAM system also offers risk-based authentication (RBA).  This feature verifies a customer's identity by adding a new layer of protection in real-time if any unusual login pattern is identified.</p>\n<p>For example, an access attempt with a different login device, or from a suspicious geographic location to prevent the risk of a corporate account takeover.</p>\n<h3 id=\"security-and-compliance\" style=\"position:relative;\"><a href=\"#security-and-compliance\" aria-label=\"security and compliance permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Security and Compliance</h3>\n<p>Both the <a href=\"https://www.loginradius.com/blog/identity/ccpa-vs-gdpr-the-compliance-war/\">EU's GDPR and California's CCPA</a> are examples of global standards that rule the flow of customer data and keep them safe. Most western countries follow similar regulations, and others are catching up.</p>\n<p>LoginRadius is compliant with the majority of the global standards and you can even tailor it to meet the regulatory requirements depending on the industry and country of business.</p>\n<h3 id=\"consent-management\" style=\"position:relative;\"><a href=\"#consent-management\" aria-label=\"consent management permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Consent Management</h3>\n<p>At LoginRadius, consent management is another feature that is offered along <a href=\"https://www.loginradius.com/gdpr-and-privacy/\">with privacy compliance</a>. It manages customer's consent about data collection, storage, and communication. Customers can alter existing permissions and apply new ones according to their will.</p>\n<h3 id=\"data-management\" style=\"position:relative;\"><a href=\"#data-management\" aria-label=\"data management permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Data Management</h3>\n<p>LoginRadius also prevents corporate account takeover attacks with <a href=\"https://www.loginradius.com/data-governance/\">customer data management</a>. It provides an overview of individual profiles from its admin console and tracks their activities.</p>\n<p>Enterprises can manage millions of customers and perform manual actions on behalf of customers, like provisioning new accounts and triggering verification emails.</p>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>Corporate account takeover can translate into millions of dollars in losses, damaged brand image, and customer trust. As an enterprise, you and your employees are responsible for keeping finances and data safe.</p>\n<p>Stay informed about evolving threats, understand the warning signs, and practice responses to suspected takeovers.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-free-demo-loginradius\"\n        title=\"book-a-free-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"April 16, 2020","updated_date":null,"description":"How do you defend your company against a Corporate Account Takeover (CATO) fraud with the COVID-19 pandemic causing workers to stay indoors?","title":"Corporate Account Takeover Attacks: Detecting and Preventing it","tags":["data security","ciam solution","compliance"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5037593984962405,"src":"/static/5014dee26b7967351c23a21431677c80/33aa5/corporate-accnt-takeover.jpg","srcSet":"/static/5014dee26b7967351c23a21431677c80/f836f/corporate-accnt-takeover.jpg 200w,\n/static/5014dee26b7967351c23a21431677c80/2244e/corporate-accnt-takeover.jpg 400w,\n/static/5014dee26b7967351c23a21431677c80/33aa5/corporate-accnt-takeover.jpg 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"Kundan Singh","github":null,"avatar":null}}}},{"node":{"excerpt":"In mid-January 2020, Marriott International suffered a new data breach which affected around 5.2 million guests. Marriott claims the…","fields":{"slug":"/identity/marriott-data-breach-2020/"},"html":"<p>In mid-January 2020, Marriott International suffered a new data breach which affected around 5.2 million guests.</p>\n<p>Marriott claims the security breach could have revealed 5.2 million guests 'personal details. This is the second data breach by Marriott in recent years following a <a href=\"https://www.washingtonpost.com/business/2018/11/30/marriott-discloses-massive-data-breach-impacting-million-guests/\">breach in 2018</a>.</p>\n<h2 id=\"marriott-data-breach-2020-when-and-how-did-it-happen\" style=\"position:relative;\"><a href=\"#marriott-data-breach-2020-when-and-how-did-it-happen\" aria-label=\"marriott data breach 2020 when and how did it happen permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Marriott Data Breach 2020: When and How Did It Happen?</h2>\n<p><a href=\"https://news.marriott.com/news/2020/03/31/marriott-international-notifies-guests-of-property-system-incident/\">The breach was identified</a> at the end of February 2020 and dates back to mid-January 2020.</p>\n<p>Marriott says it discovered in late February that the network of an unspecified hotel chain had been hacked, and hackers who obtained the login credentials of two Marriott employees may have accessed the guest details. The firm has reason to believe the operation began as early as mid-January.</p>\n<p>The breach may have taken personal details such as names, birthdates, and telephone numbers, along with language preferences and loyalty account numbers. </p>\n<p><a href=\"https://mysupport.marriott.com/\">Marriott stated</a>, <em>\"While our investigation is continuing, we currently have no reason to assume that the details involved included passwords or PINs for Marriott Bonvoy account, payment card details, passport information, national IDs or driver's license numbers.\"</em></p>\n<p>Adding to it, Marriott said it contacted guests whose details may have been taken via email and launched a website dedicated to those who were affected. The company offered the program for tracking the personal information of visitors whose details could have been compromised.</p>\n<p>The hotel giant announced another <a href=\"https://news.marriott.com/2018/11/marriott-announces-starwood-guest-reservation-database-security-incident/\">data breach in late 2018</a>, which affected up to 500 million guests while staying at its subsidiary, Starwood, <a href=\"https://www.cnbc.com/2016/09/23/marriott-buys-starwood-becoming-worlds-largest-hotel-chain.html\">purchased by the company in 2016</a>.</p>\n<p>It could be considered an honest mistake to suffer one data breach but to suffer two in less than two years looks like carelessness. There are some promising signs that the company has learned some valuable information security lessons in spite of how it may look to an outsider. From this experience, the <a href=\"https://www.loginradius.com/blog/2020/03/improve-customer-experience-hospitality-industry/\">entire hospitality industry</a> should now know better.</p>\n<p><a href=\"https://www.loginradius.com/resource/pii-data-breach-report/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"Protecting-PII-Data-Breaches-industry-report\"\n        title=\"Protecting-PII-Data-Breaches-industry-report\"\n        src=\"/static/3183d14f6c9662008b848dc5d81d718f/e5715/Protecting-PII-Against-Data-Breaches.png\"\n        srcset=\"/static/3183d14f6c9662008b848dc5d81d718f/a6d36/Protecting-PII-Against-Data-Breaches.png 650w,\n/static/3183d14f6c9662008b848dc5d81d718f/e5715/Protecting-PII-Against-Data-Breaches.png 768w,\n/static/3183d14f6c9662008b848dc5d81d718f/2bef9/Protecting-PII-Against-Data-Breaches.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<h2 id=\"what-does-the-hotel-industry-do-to-avoid-data-breaches-like-marriotts\" style=\"position:relative;\"><a href=\"#what-does-the-hotel-industry-do-to-avoid-data-breaches-like-marriotts\" aria-label=\"what does the hotel industry do to avoid data breaches like marriotts permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What does the Hotel Industry do to avoid data breaches like Marriott’s?</h2>\n<p><strong>1. Develop a Security-Centric Culture at the Top Level.</strong><br>\nWhen the security of customer identities and profiles is priority number one. A security-centric mindset ensures a serious approach to <a href=\"https://www.loginradius.com/security/\">customer data security</a>. The approach should be top-down instead of bottom-up, with responsibility resting with the CEO and board.</p>\n<p><strong>2. Stay ahead of the security curve.</strong><br>\nIt’s okay to be cautious in adopting innovations, but when it comes to customer data security products, companies should be proactive, constantly reviewing and trying new developments to <a href=\"https://www.loginradius.com/blog/2019/10/cybersecurity-attacks-business/\">stay ahead of hackers</a>.</p>\n<p><strong>3. Make your security spend for customer data security unbudgeted.</strong><br>\nInvest whatever it takes to protect sensitive customer data. Yes, stay within your financial metrics, but don’t cap the budget, because capping it means you’re compromising. Give the security team whatever they request to <a href=\"https://www.loginradius.com/blog/2019/10/cybersecurity-best-practices-for-enterprises/\">protect the brand</a>. It’s not going to cost billions.</p>\n<p><strong>4. Recognize that customer data security is not a cost center but a revenue center.</strong><br>\nCompanies need to understand that customer data security is part of the revenue center, not the cost center. With better security, you are not only preventing breaches, but you are also <a href=\"https://www.loginradius.com/blog/identity/digital-identity-management/\">building trust within your customer</a> base to generate more revenue.</p>\n<p>Let’s hope that Marriott and its peers in the travel industry have learned that, while the security of customer accounts may not be their core business, it still needs to be priority number one.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"BD Developers2 1024x310\"\n        title=\"BD Developers2 1024x310\"\n        src=\"/static/a854d948ee1cb58ffca614fbff39f749/e5715/BD-Developers2-1024x310.png\"\n        srcset=\"/static/a854d948ee1cb58ffca614fbff39f749/a6d36/BD-Developers2-1024x310.png 650w,\n/static/a854d948ee1cb58ffca614fbff39f749/e5715/BD-Developers2-1024x310.png 768w,\n/static/a854d948ee1cb58ffca614fbff39f749/2bef9/BD-Developers2-1024x310.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"April 13, 2020","updated_date":null,"description":"Marriott International experienced a new data breach in mid-January 2020, which affected about 5.2 million guests.","title":"Marriott Data Breach 2020: 5.2 Million Guest Records Were Stolen","tags":["other"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.408450704225352,"src":"/static/538e5de9de27f75302287fa525580589/c3e3a/marriott-data-breach.jpg","srcSet":"/static/538e5de9de27f75302287fa525580589/f836f/marriott-data-breach.jpg 200w,\n/static/538e5de9de27f75302287fa525580589/2244e/marriott-data-breach.jpg 400w,\n/static/538e5de9de27f75302287fa525580589/c3e3a/marriott-data-breach.jpg 769w","sizes":"(max-width: 769px) 100vw, 769px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},{"node":{"excerpt":"As the retail and e-commerce industry enters the new era of digitalization, customer experience while interacting with a brand has taken a…","fields":{"slug":"/identity/loginradius-ciam-retail-ecommerce-business/"},"html":"<p>As the retail and e-commerce industry enters the new era of digitalization, customer experience while interacting with a brand has taken a giant leap forward. It has in fact, pushed products and services as a secondary entity to the overall shopping experience. They are no longer the driving motivation for shoppers to approach a store.</p>\n<p>Today, customers want to remember how they were treated. And if retailers do it right, they won’t shy away from coming back over and over again.</p>\n<p>Therefore, amid the struggle among retailers to stand out, the power has shifted heavily in favor of customers. Today, retailers must be everywhere to make their customers feel unique.</p>\n<p>They should be able to identify their visitors and <a href=\"https://www.loginradius.com/customer-experience-solutions/\">build personalized</a> <a href=\"https://www.loginradius.com/customer-experience-solutions/\">experiences</a> around major touchpoints like product discovery, research, purchase, and beyond.</p>\n<p>No wonder customer identification has been playing a pivotal role in driving new-age marketing campaigns.</p>\n<h2 id=\"what-is-identity-management-in-the-retail-and-e-commerce-industry\" style=\"position:relative;\"><a href=\"#what-is-identity-management-in-the-retail-and-e-commerce-industry\" aria-label=\"what is identity management in the retail and e commerce industry permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is Identity Management in the retail and e-commerce industry?</h2>\n<p>Identity management in the retail and e-commerce industry is a seamless, secure, and scalable solution to identify and protect customer data and ensure that they can easily access any information they need.</p>\n<p>Traditionally, identity management solutions have been only about employee-centric internal security. In fact, they were designed to manage the identities of a limited number of users.</p>\n<p>Fast forward to today’s scenario – the idea of putting customer identity right in the middle of the retailer's business model is gradually picking up and turning heads.</p>\n<p>There are <a href=\"https://www.loginradius.com/blog/2019/06/customer-identity-and-access-management/\">customer identity and access management</a> providers available that generate automated customer profiles across multiple channels.</p>\n<p>As a result, customers enjoy on-time delivery of digital (and physical) goods and services, along with a few add-ons like:</p>\n<ul>\n<li>Ensuring security compliance.</li>\n<li>Eliminating duplicate identity data.</li>\n<li>Reducing application-related complexities.</li>\n<li>Simplifying the customer registration process.</li>\n<li>Developing a larger database using first-party social data.</li>\n<li>Creating a unified customer profile.</li>\n<li>Collecting more customer purchase and interaction data.</li>\n<li>Storing customer data in a secure cloud directory.</li>\n</ul>\n<p>These are opportunities ready to be grabbed. But are retailers ready to fuse identity management into their workflow? If not, it is high time that they should.</p>\n<p><strong>A world without an identity management solution will invite the following challenges.</strong></p>\n<ol>\n<li>Lack of omnichannel customer experience.</li>\n<li>Absence of customer identity.</li>\n<li>Data compliance and security flaws.</li>\n<li>Lack of role-based privileges.</li>\n<li>Unmanageable data duplicacy.</li>\n</ol>\n<h2 id=\"creating-a-frictionless-customer-experience-with-loginradius\" style=\"position:relative;\"><a href=\"#creating-a-frictionless-customer-experience-with-loginradius\" aria-label=\"creating a frictionless customer experience with loginradius permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Creating a Frictionless Customer Experience with LoginRadius</h2>\n<p>Here’s a question. What will turn casual visitors into loyal customers?</p>\n<p>As a retailer, you need to understand the demographics of your customers and figure out their preferences. Adding a customer identity and access management (CIAM) solution to your business should do the trick. </p>\n<p>Speaking of which, the LoginRadius identity solution provides a centralized, available, and secure identification and <a href=\"https://www.loginradius.com/data-governance/\">management of customers' data</a> to retailers. </p>\n<p>Among its solutions include the real-time ability for visitors to self-register for services, login and authenticate, and enjoy a single-source view.</p>\n<p>Retailers can manage customer profiles and provide a <a href=\"https://www.loginradius.com/blog/2020/04/omnichannel-customer-experience/\">personalized omnichannel experience</a> with consent and other preferences.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 60.61538461538461%; position: relative; bottom: 0; left: 0; background-image: url('data:image/jpeg;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"improving registration and authentication with loginradius\"\n        title=\"improving registration and authentication with loginradius\"\n        src=\"/static/56f14b39a62284331307f7e6c6b6828c/212bf/loginradius-ciam-retail-ecommerce-business-1.jpg\"\n        srcset=\"/static/56f14b39a62284331307f7e6c6b6828c/6aca1/loginradius-ciam-retail-ecommerce-business-1.jpg 650w,\n/static/56f14b39a62284331307f7e6c6b6828c/212bf/loginradius-ciam-retail-ecommerce-business-1.jpg 768w,\n/static/56f14b39a62284331307f7e6c6b6828c/72e01/loginradius-ciam-retail-ecommerce-business-1.jpg 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<h3 id=\"improving-registration-and-login-options\" style=\"position:relative;\"><a href=\"#improving-registration-and-login-options\" aria-label=\"improving registration and login options permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Improving Registration and Login Options</h3>\n<p>The identity management platform allows customers to register using the following registration options quickly:</p>\n<p><strong>1. Smart Login:</strong> With this login option, a customer can log into a device that is neither a website or a mobile device. For example, if you want to authenticate your customers who are using an application on your smart TV, you can streamline the required authentication flow with this option.</p>\n<p><strong>2. One-Touch Login:</strong> Passwords are dead. Customers need not remember passwords to login to an application or website anymore. Therefore, to remove further friction during login and avoid too many forgot password requests, retailers can use these login options:</p>\n<ul>\n<li>Magic Link via Email (PasswordLess via Email)</li>\n<li>OTP Login via Email (PasswordLess via Email)</li>\n<li>OTP Login via Phone (PasswordLess via Phone)</li>\n</ul>\n<h3 id=\"getting-customer-data-with-customer-consent\" style=\"position:relative;\"><a href=\"#getting-customer-data-with-customer-consent\" aria-label=\"getting customer data with customer consent permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Getting Customer Data with Customer Consent</h3>\n<p>The concept of progressive profiling is getting a lot of attention these days. So, what is it, and why do retailers need it?</p>\n<p><a href=\"https://www.loginradius.com/progressive-profiling/\">Progressive profiling</a> is the method of collecting information about your customers using dynamic web forms throughout the purchase journey.</p>\n<p>Here's how this works. For example, you want some details from your customers to customize the end-user experience, or you want their consent to use some of your services, but you are afraid of losing them by asking to fill a long registration form. </p>\n<p><a href=\"https://www.loginradius.com/resource/how-retail-and-consumer-goods-companies-use-loginradius-identity-solution/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"How Retail Consumer Goods Companies Use the LoginRadius Identity Platform 1024x310\"\n        title=\"How Retail Consumer Goods Companies Use the LoginRadius Identity Platform 1024x310\"\n        src=\"/static/58eda90d8cb3e71f78a942b87b50d167/e5715/How-Retail-Consumer-Goods-Companies-Use-the-LoginRadius-Identity-Platform-1024x310.png\"\n        srcset=\"/static/58eda90d8cb3e71f78a942b87b50d167/a6d36/How-Retail-Consumer-Goods-Companies-Use-the-LoginRadius-Identity-Platform-1024x310.png 650w,\n/static/58eda90d8cb3e71f78a942b87b50d167/e5715/How-Retail-Consumer-Goods-Companies-Use-the-LoginRadius-Identity-Platform-1024x310.png 768w,\n/static/58eda90d8cb3e71f78a942b87b50d167/2bef9/How-Retail-Consumer-Goods-Companies-Use-the-LoginRadius-Identity-Platform-1024x310.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<p>Progressive profiling will do wonders here. For instance, when the customer has placed the first three orders, you can ask them to fill in a small questionnaire. They will more likely answer about their preferences at this stage rather than during the registration.</p>\n<h3 id=\"utilizing-shopper-insights\" style=\"position:relative;\"><a href=\"#utilizing-shopper-insights\" aria-label=\"utilizing shopper insights permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Utilizing Shopper Insights</h3>\n<p>One way to increase brand loyalty is by combining a 360-degree view of the <a href=\"https://www.loginradius.com/customer-insights/\">customer demographics</a> with their behavior and personal preferences. This helps retailers and e-commerce owners tweak the way they interact with their brands.</p>\n<p>All-in-all, centrally managing identities can primarily enhance the customer experience and build better relationships.</p>\n<h3 id=\"engaging-and-attracting-customers\" style=\"position:relative;\"><a href=\"#engaging-and-attracting-customers\" aria-label=\"engaging and attracting customers permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Engaging and Attracting Customers</h3>\n<p>LoginRadius simplifies the shopper registration process with social sign-in and single sign-on. </p>\n<p><strong>Social Sign-In:</strong> Customers tend to remember the credentials of their frequently used network. As such, <a href=\"https://www.loginradius.com/social-login/\">social sign-in is the method</a> of one-click authentication with a social media account. It reduces the hassles of the registration process and, thereby, helps a great deal in converting a random user to a value-added customer. </p>\n<p><strong>Single Sign-On:</strong> It means a customer can access multiple accounts with a <a href=\"https://www.loginradius.com/blog/2019/05/what-is-single-sign-on/\">single set of credentials</a>. It offers ease of authentication and reduces the risk of minimizing poor password habits.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 54.61538461538461%; position: relative; bottom: 0; left: 0; background-image: url('data:image/jpeg;base64,/9j/2wBDABALDA4MChAODQ4SERATGCgaGBYWGDEjJR0oOjM9PDkzODdASFxOQERXRTc4UG1RV19iZ2hnPk1xeXBkeFxlZ2P/2wBDARESEhgVGC8aGi9jQjhCY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2P/wgARCAALABQDASIAAhEBAxEB/8QAFwABAAMAAAAAAAAAAAAAAAAAAAECBf/EABUBAQEAAAAAAAAAAAAAAAAAAAAB/9oADAMBAAIQAxAAAAHcsISX/8QAFxAAAwEAAAAAAAAAAAAAAAAAABEgQf/aAAgBAQABBQJxp//EABQRAQAAAAAAAAAAAAAAAAAAABD/2gAIAQMBAT8BP//EABQRAQAAAAAAAAAAAAAAAAAAABD/2gAIAQIBAT8BP//EABQQAQAAAAAAAAAAAAAAAAAAACD/2gAIAQEABj8CX//EABgQAAMBAQAAAAAAAAAAAAAAAAABERAh/9oACAEBAAE/IXDLRDXSY//aAAwDAQACAAMAAAAQy8//xAAUEQEAAAAAAAAAAAAAAAAAAAAQ/9oACAEDAQE/ED//xAAUEQEAAAAAAAAAAAAAAAAAAAAQ/9oACAECAQE/ED//xAAbEAACAwADAAAAAAAAAAAAAAABEQAhMRBBYf/aAAgBAQABPxAyAH7MEdmNgiFbEauuP//Z'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"customer and data security with loginradius\"\n        title=\"customer and data security with loginradius\"\n        src=\"/static/9b583762e47764c8f347dde0d92d16a6/212bf/loginradius-3-1024x560.jpg\"\n        srcset=\"/static/9b583762e47764c8f347dde0d92d16a6/6aca1/loginradius-3-1024x560.jpg 650w,\n/static/9b583762e47764c8f347dde0d92d16a6/212bf/loginradius-3-1024x560.jpg 768w,\n/static/9b583762e47764c8f347dde0d92d16a6/72e01/loginradius-3-1024x560.jpg 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<h3 id=\"providing-customer-security\" style=\"position:relative;\"><a href=\"#providing-customer-security\" aria-label=\"providing customer security permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Providing Customer Security</h3>\n<p>The LoginRadius platform offers advanced frictionless security to enhance the customer experience in the retail and e-commerce industry. With features like data management and real-time fraud analysis, it prevents fraudulent access attempts.</p>\n<p>Privacy compliance is another critical aspect of LoginRadius. Some of the global standards that it abides by include the <a href=\"https://www.loginradius.com/blog/2019/09/ccpa-vs-gdpr-the-compliance-war/\">EU's GDPR and California's CCPA</a>.</p>\n<h3 id=\"preventing-account-takeover-ato\" style=\"position:relative;\"><a href=\"#preventing-account-takeover-ato\" aria-label=\"preventing account takeover ato permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Preventing Account Takeover (ATO)</h3>\n<p>Account takeover (ATO) fraud prevention is growing popular especially in the retail, and ecommerce sector.</p>\n<p>Wondering what is it?</p>\n<p>ATO happens when a hacker, for example, steals saved card details and places an order on behalf of the customer, redeems reward points for goods or services, steals gift cards, and sells attacked accounts to other cybercriminals.</p>\n<p>Not just the victimized customer, but ATO can cause severe damage to the overall customer experience in the retail and e-commerce industry.</p>\n<p>The LoginRadius identity platform protects customers and retailers from attacks such as social engineering, password spraying, <a href=\"https://www.loginradius.com/blog/2019/09/prevent-credential-stuffing-attacks/\">credential stuffing</a>, phishing, brute force, and session hijacking.</p>\n<h2 id=\"account-security-best-practices\" style=\"position:relative;\"><a href=\"#account-security-best-practices\" aria-label=\"account security best practices permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Account Security Best Practices</h2>\n<p>For any retailer, account management, verification, and password management is a huge deal. But when it comes to relying on an identity management provider platform, account management seems tricky and often falls short of expectations.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 60.61538461538461%; position: relative; bottom: 0; left: 0; background-image: url('data:image/jpeg;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"account security best practice for retail and ecommerce industry\"\n        title=\"account security best practice for retail and ecommerce industry\"\n        src=\"/static/1568052c8d60bb9f9e2b3fafc8f46e04/212bf/loginradius-ciam-4-1024x620.jpg\"\n        srcset=\"/static/1568052c8d60bb9f9e2b3fafc8f46e04/6aca1/loginradius-ciam-4-1024x620.jpg 650w,\n/static/1568052c8d60bb9f9e2b3fafc8f46e04/212bf/loginradius-ciam-4-1024x620.jpg 768w,\n/static/1568052c8d60bb9f9e2b3fafc8f46e04/72e01/loginradius-ciam-4-1024x620.jpg 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>LoginRadius offers the following security benefits in the e-commerce spectrum.</p>\n<ul>\n<li><strong>Password security:</strong> It supports features like setting password validation (minimum/maximum length, at least one special character, alphanumeric, etc.), enforcing password lifetime, password history, and password visibility. </li>\n<li><strong>Security against brute force attack:</strong> Brute Force Attack happens when hackers use multiple combinations of credentials to gain access to an account. When it happens, you can suspend your customer's account for a predefined time, prompt the captcha option, ask security questions, or block the account (as a last resort). </li>\n<li><strong>Risk-based authentication (RBA):</strong> RBA is an authentication technique where if there is a slight change in customer behavior like changed IP address, suspected search history, or any act that seems suspicious and risky, a new layer of security is triggered. LoginRadius offers a range of authentication protocols to choose from like biometrics, push notifications, OTP, and tokens. </li>\n<li><strong>Multi-factor Authentication (MFA):</strong> MFA requires your customers to pass <a href=\"https://www.loginradius.com/blog/identity/what-is-multi-factor-authentication/\">through multiple layers of authentication</a> during the login process. LoginRadius supports the SMS passcode and Google authenticator to configure the authentication feature.</li>\n</ul>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>Security and seamless customer experience in the retail and e-commerce industry are the major brand differentiators. </p>\n<p>But, there is no magic formula for mastering security. So, if you are not careful, you can lose your customers' trust. Plan and give your shoppers a hassle-free experience with your brand, every time.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAGCAYAAADDl76dAAAACXBIWXMAAAsTAAALEwEAmpwYAAABbElEQVQY0zVQO0/CUBQmaihthUbRhPhCAlhKEXlE3s+CCEaBwQF10riQODkwaFyMMcTFwR9gjBvRSeKko4NxcfD/fJ57C8PJbc53+r0soj8Lm5qHbS0HW6AIwZ+DXSvAESxBpJ3MMLph3+xWDlUwm2jCGa5A0isQtRIkhrH/CbdwwkDBHAJlGodexsy6wUkduknMBCfdmxCCBhZKHailfUxGm5jQKphaTUDwmaIWdigyF1oZsm7AFavBRspKuMpdTJMQO5yLbCHVPkG0cYRY4xAR9tbp3T5AsnUMT7YFqzdtOuQOSFmiyMupXUihKuzk0hWvc0xgUYlYod18tAZPrg13eg8rNIuJHSihMtVUHEUe51cLPJ5zo8oJJRJQRnHlQB6WpTjOru7w/fuH59d3PL0M8Th4w+fXDwbDD16R1ZsxCcelsyUbidQEEuC9ECap1J8nCaPTRe/2Ad3LvjkXfZxf3+O0d8P7FnwZ/AMzEsMp2f6LdQAAAABJRU5ErkJggg=='); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"Book a free demo request 1024x310\"\n        title=\"Book a free demo request 1024x310\"\n        src=\"/static/779ad148d33fb1ecfd80cc41f1a94ef3/e5715/Book-a-free-demo-request-1024x310.png\"\n        srcset=\"/static/779ad148d33fb1ecfd80cc41f1a94ef3/a6d36/Book-a-free-demo-request-1024x310.png 650w,\n/static/779ad148d33fb1ecfd80cc41f1a94ef3/e5715/Book-a-free-demo-request-1024x310.png 768w,\n/static/779ad148d33fb1ecfd80cc41f1a94ef3/2bef9/Book-a-free-demo-request-1024x310.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"April 08, 2020","updated_date":null,"description":"As the retail and e-commerce industry enters the modern digitalization age, a giant leap forward has been made by consumer experience when engaging with a brand. In reality, it has moved goods and services into the overall shopping experience as a secondary entity. For customers, they are no longer the motivating impetus to approach a store.","title":"How LoginRadius Help Retail and E-commerce Industry to Manage Customer Identities","tags":["ciam solution","compliance","cx"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5037593984962405,"src":"/static/67aa7da9a7d511d6602570357b94e8a3/33aa5/retail-ecommerce.jpg","srcSet":"/static/67aa7da9a7d511d6602570357b94e8a3/f836f/retail-ecommerce.jpg 200w,\n/static/67aa7da9a7d511d6602570357b94e8a3/2244e/retail-ecommerce.jpg 400w,\n/static/67aa7da9a7d511d6602570357b94e8a3/33aa5/retail-ecommerce.jpg 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},{"node":{"excerpt":"LoginRadius is happy to announce that we have a new logo now.  Yes! We loved the old one, but we decided to upgrade it as part of our ever…","fields":{"slug":"/identity/announcing-new-look-of-loginradius/"},"html":"<p>LoginRadius is happy to announce that we have a new logo now. </p>\n<p>Yes! We loved the old one, but we decided to upgrade it as part of our ever-evolving branding metrics. After all, progress is impossible without change. </p>\n<p>So, here’s our new look.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 20.615384615384617%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAECAYAAACOXx+WAAAACXBIWXMAAAsTAAALEwEAmpwYAAABHElEQVQY02NgmHzdiqH33CyGrpPzGKZcj2RY/JaBoe+CAEPfeQYw7j3HwNB/kZNh+h0GlrAGBk4ZPQYOdTsGTjUbBg41Gz4ONWteTlVrBk5VGwYQzcDQc2Yqh45rFZekVjVj3c4JQI0mQDEHoGHmQCwHNNCSoeesC8O021YsIXW6nLIGBkADNYEGanCoWmcAaScgFuRUszYB0kIMjI17Z3FJaKRziamlMWfO6WNY8AJowJkkoGFFQMNAOAVo4BKGWQ8DWWK7KjnlDH051G27gK5rBBoQD8RTgQanA+lSIHYAeaeCsWFPMHPGTB2gIRMZpt9mBNKqQGwLxBpAA/MZes9GMyx4yc+cMkWDU9FMhQPiKpCL7KC0KxAbg9gA89ZdHjcDBeIAAAAASUVORK5CYII='); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"LoginRadius Logo\"\n        title=\"LoginRadius Logo\"\n        src=\"/static/94ea4a6e0c8570663c681fca94cd44b2/e5715/loginradius-logo-horizontal-full-colour-on-white-1024x211.png\"\n        srcset=\"/static/94ea4a6e0c8570663c681fca94cd44b2/a6d36/loginradius-logo-horizontal-full-colour-on-white-1024x211.png 650w,\n/static/94ea4a6e0c8570663c681fca94cd44b2/e5715/loginradius-logo-horizontal-full-colour-on-white-1024x211.png 768w,\n/static/94ea4a6e0c8570663c681fca94cd44b2/2bef9/loginradius-logo-horizontal-full-colour-on-white-1024x211.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>As a leader in cloud-based Customer Identity and Access Management (CIAM) solution that the following two core principles are reflected in the branding:</p>\n<p><strong>Putting users at the center</strong></p>\n<p>Our platform is all about consumer-brand relationships and to strengthen the relationship we believe we need to put the consumer at the center. So, everything we design and develop, we keep the very end-users i.e. your consumers at the centre. </p>\n<p>Our first priority is to benefit them -- giving them peace of mind by protecting their data, account and privacy; and offering them a delightful experience.</p>\n<p><strong>Security is the foundation of our business</strong></p>\n<p>Security is not a feature but the foundation of our business. Protecting consumers’ data, account and privacy is the most important function of our business and platform. We and our customers never compromise on security. Period.</p>\n<h2 id=\"intend-behind-the-change\" style=\"position:relative;\"><a href=\"#intend-behind-the-change\" aria-label=\"intend behind the change permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Intend Behind The Change</h2>\n<p>Over the years, LoginRadius has exponentially grown from a simple social login provider to an industry-leading customer identity and access management (CIAM) platform. </p>\n<p>Therefore, it is important that we align our designing goals to reflect how we serve our customers, what our milestones are and most importantly, symbolize our future on what more do we intend to achieve.</p>\n<p>Keeping designing and user experience at the core of innovation, our creative thinkers came up with a logo that is crisp, smart, minimalistic and feels connected.</p>\n<p>Needless to say, they got exactly what we intended to project out to the world – user-centric CIAM platform with a strong security foundation.</p>\n<h2 id=\"what-has-changed\" style=\"position:relative;\"><a href=\"#what-has-changed\" aria-label=\"what has changed permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What Has Changed?</h2>\n<p>First, we would like to take a moment to highlight the retirement of our current logo. After all, it had been serving the spirit of LoginRadius since our inception. </p>\n<p>Fast-forward to the present day, the new logo marks a crucial milestone towards representing our brand-building process.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 96.76923076923077%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"LoginRadius Brandmark\"\n        title=\"LoginRadius Brandmark\"\n        src=\"/static/59a8962050016aa118585d686adbcd57/e5715/logo-1024x991.png\"\n        srcset=\"/static/59a8962050016aa118585d686adbcd57/a6d36/logo-1024x991.png 650w,\n/static/59a8962050016aa118585d686adbcd57/e5715/logo-1024x991.png 768w,\n/static/59a8962050016aa118585d686adbcd57/2bef9/logo-1024x991.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<ul>\n<li><strong>Brandmark</strong>:  It comprises two concentric circles. Most obvious is the negative space showing a keyhole which is also a literal radius from the centre to the outer edge. The keyhole represents robust security foundation of our platform. It can also be seen as a user icon, protected by white arms implied by the negative space and by the light blue circle. This demonstrates our philosophy of putting the user at the centre of everything. Both of these ideas speak to the concept of protecting identity.</li>\n<li><strong>Typeface:</strong> Our creative team made a unanimous decision to create a modern typeface that embodies our vision and is strong enough to sustain on its own. Therefore, we thickened the font with solid letters to give more presence to the brand. </li>\n<li><strong>Color</strong>: Colors are an important aspect of our brand personality. Our core colour palette consists of two primary colours viz. tarren blue and cosmic blue. They help to reinforce feelings of safety and confidence towards customer identity.</li>\n</ul>\n<p>Letting go of our core designing heritage was never our objective. Our color palette is the testimony of what we have been for our customers and promotes authenticity in every form.</p>\n<h2 id=\"logo-color-combinations\" style=\"position:relative;\"><a href=\"#logo-color-combinations\" aria-label=\"logo color combinations permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Logo Color Combinations</h2>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 57.53846153846154%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"logo 2 1024x589\"\n        title=\"logo 2 1024x589\"\n        src=\"/static/d24818d980fb398ad3f56a08831de268/e5715/logo-2-1024x589.png\"\n        srcset=\"/static/d24818d980fb398ad3f56a08831de268/a6d36/logo-2-1024x589.png 650w,\n/static/d24818d980fb398ad3f56a08831de268/e5715/logo-2-1024x589.png 768w,\n/static/d24818d980fb398ad3f56a08831de268/2bef9/logo-2-1024x589.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<h2 id=\"a-final-word\" style=\"position:relative;\"><a href=\"#a-final-word\" aria-label=\"a final word permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>A Final Word</h2>\n<p>The new logo is an attempt at modernizing our brand and helping it connect more with our customers. </p>\n<p>Amidst the huge chunk of workload that rebranding brings along, we are super thrilled to share this news and would like to take a moment to thank our loyal customer base. Do share your comments about the change.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAGCAYAAADDl76dAAAACXBIWXMAAAsTAAALEwEAmpwYAAABWElEQVQY0z2Ru04DMRBF97Oo+QFKUiEoERWUNPANFJSkSMNDQoKCPhJIQSEvFCJIFBQISdin1157nwmXsVew0mjnjjxn5tpWJCVUHCNJU6QUxbKA4ALMcfCzWiEvCmR5jjTLkOcZPCExdkIwGcNjIXgUmd44SUxYGliGogJBqdmxPUjfwzLXkBKoDyulMHUZ7kczdL58dAZDfM7mZiEN1n/rT8xtF37IKZcIGIeiAZJy12cG6PgB6o02mt0+2r0+Hts9tJ4HaPZe8PDUxdt4Yja1JE39t0y2jDWyqbdlPIJUMQrSusboKobvHxhNpnglgIZoPf92qC8tNzR2CRoKAUW2dC6oJmi7hevBDZgZpr+T6jnWNnZQ2TvE9sExtvaPsF7ZxSZpj85pqOWSlYCsBmFoijPbKTXnmC5s0q65v5xs1xstAz27uEH18tbEae0Ktes7cKEfJ8EvgnS3Wjt63B0AAAAASUVORK5CYII='); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"CTA Graphics for Blogs V03 01 05 2 1024x310\"\n        title=\"CTA Graphics for Blogs V03 01 05 2 1024x310\"\n        src=\"/static/d66987b67542719567f4fddb41b0fe18/e5715/CTA-Graphics-for-Blogs-V03.01-05-2-1024x310.png\"\n        srcset=\"/static/d66987b67542719567f4fddb41b0fe18/a6d36/CTA-Graphics-for-Blogs-V03.01-05-2-1024x310.png 650w,\n/static/d66987b67542719567f4fddb41b0fe18/e5715/CTA-Graphics-for-Blogs-V03.01-05-2-1024x310.png 768w,\n/static/d66987b67542719567f4fddb41b0fe18/2bef9/CTA-Graphics-for-Blogs-V03.01-05-2-1024x310.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"March 25, 2020","updated_date":null,"description":"LoginRadius is delighted to announce that we now have a new logo.","title":"Announcing New Look of LoginRadius","tags":["LoginRadius","industry-news"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.408450704225352,"src":"/static/ceb3e74c4c96c224a217049a0935b873/6051d/Announcing-New-Look-of-LoginRadius.png","srcSet":"/static/ceb3e74c4c96c224a217049a0935b873/69585/Announcing-New-Look-of-LoginRadius.png 200w,\n/static/ceb3e74c4c96c224a217049a0935b873/497c6/Announcing-New-Look-of-LoginRadius.png 400w,\n/static/ceb3e74c4c96c224a217049a0935b873/6051d/Announcing-New-Look-of-LoginRadius.png 769w","sizes":"(max-width: 769px) 100vw, 769px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}}]},"markdownRemark":{"excerpt":"Identity is evolving, and developers are at the forefront of this transformation. Every day brings a new learning—adapting to new standards…","fields":{"slug":"/identity/developer-first-identity-provider-loginradius/"},"html":"<p>Identity is evolving, and developers are at the forefront of this transformation. Every day brings a new learning—adapting to new standards and refining approaches to building secure, seamless experiences.</p>\n<p>We’re here to support developers on that journey. We know how important simplicity, efficiency, and well-structured documentation are when working with identity and access management solutions. That’s why we’ve redesigned the <a href=\"https://www.loginradius.com/\">LoginRadius website</a>—to be faster, more intuitive, and developer-first in every way.</p>\n<p>The goal? Having them spend less time searching and more time building.</p>\n<h2 id=\"whats-new-and-improved-on-the-loginradius-website\" style=\"position:relative;\"><a href=\"#whats-new-and-improved-on-the-loginradius-website\" aria-label=\"whats new and improved on the loginradius website permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What’s New and Improved on the LoginRadius Website?</h2>\n<p>LoginRadius’ vision is to give developers a product that simplifies identity management so they can focus on building, deploying, and scaling their applications. To enhance this experience, we’ve spent the last few months redesigning our interface— making navigation more intuitive and reassuring that essential resources are easily accessible.</p>\n<p>Here’s a closer look at what’s new and why it’s important:</p>\n<h3 id=\"a-developer-friendly-dark-theme\" style=\"position:relative;\"><a href=\"#a-developer-friendly-dark-theme\" aria-label=\"a developer friendly dark theme permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>A Developer-Friendly Dark Theme</h3>\n<p><img src=\"/f46881583c7518a93bb24e94c32320de/a-developer-friendly-dark-theme.webp\" alt=\"This image shows how LoginRadius offers several authentication methods like traditional login, social login, passwordless login, passkeys and more in a dark mode.\">    </p>\n<p>Developers spend long hours working in dark-themed IDEs and terminals, so we’ve designed the LoginRadius experience to be developer-friendly and align with that preference.</p>\n<p>The new dark mode reduces eye strain, enhances readability, and provides a seamless transition between a coding environment and our platform. Our new design features a clean, modern aesthetic with a consistent color scheme and Barlow typography, ensuring better readability. High-quality graphics and icons are thoughtfully placed to enhance the content without adding visual clutter.</p>\n<p>So, whether you’re navigating our API docs or configuring authentication into your system, our improved interface will make those extended development hours more comfortable and efficient.</p>\n<h3 id=\"clear-categorization-for-loginradius-capabilities\" style=\"position:relative;\"><a href=\"#clear-categorization-for-loginradius-capabilities\" aria-label=\"clear categorization for loginradius capabilities permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Clear Categorization for LoginRadius Capabilities</h3>\n<p><img src=\"/e5358b82be414940f3fb146013845933/capabilities.webp\" alt=\"This image shows a breakdown of all the LoginRadius CIAM capabilities, including authentication, security, UX, scalability and multi-brand management.\"></p>\n<p>We’ve restructured our website to provide a straightforward breakdown of our customer identity and access management platform capabilities, helping you quickly find what you need:</p>\n<ul>\n<li>Authentication: Easily understand <a href=\"https://www.loginradius.com/blog/identity/authentication-option-for-your-product/\">how to choose the right login method</a>, from traditional passwords and OTPs to social login, federated SSO, and passkeys with few lines of code.</li>\n<li>Security: Implement no-code security features like bot detection, IP throttling, breached password alerts, DDoS protection, and adaptive MFA to safeguard user accounts.</li>\n<li>User Experience: Leverage AI builder, hosted pages, and drag-and-drop workflows to create smooth, branded sign-up and login experiences.</li>\n<li>High Performance &#x26; Scalability: Confidently scale with sub-100ms API response times, 100% uptime, 240K+ RPS, and 28+ global data center regions.</li>\n<li>Multi-Brand Management: Efficiently manage multiple identity apps, choosing isolated or shared data stores based on your brand’s unique needs.</li>\n</ul>\n<p>This structured layout ensures you can quickly understand each capability and how it integrates into your identity ecosystem.</p>\n<h3 id=\"developer-first-navigation\" style=\"position:relative;\"><a href=\"#developer-first-navigation\" aria-label=\"developer first navigation permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Developer-First Navigation</h3>\n<p><img src=\"/a8c155c2b6faf3d5f4b4de4e2b14d763/developers-menu.webp\" alt=\"This image shows the LoginRadius menu bar, highlighting the developer dropdown.\">   </p>\n<p>We’ve been analyzing developer workflows to identify how you access key resources. That’s why we redesigned our navigation with one goal in mind: to reduce clicks and make essential resources readily available.</p>\n<p>The new LoginRadius structure puts APIs, SDKs, and integration guides right at the menu bar under the Developers dropdown so you can get started faster. Our Products, Solutions, and Customer Services are also clearly categorized, helping development teams quickly find the right tools and make informed decisions.</p>\n<h3 id=\"quick-understanding-of-integration-benefits\" style=\"position:relative;\"><a href=\"#quick-understanding-of-integration-benefits\" aria-label=\"quick understanding of integration benefits permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Quick Understanding of Integration Benefits</h3>\n<p><img src=\"/b2f9a964a2da0ea83e2f8596b833bba7/we-support-your-tech-stack.webp\" alt=\"This image shows a list of popular programming languages and frameworks offered by LoginRadius.\"></p>\n<p>Developers now have a clear view of the tech stack available with LoginRadius, designed to support diverse business needs.</p>\n<p>Our platform offers pre-built SDKs for Node.js, Python, Java, and more, making CIAM integration seamless across popular programming languages and frameworks.</p>\n<h2 id=\"over-to-you-now\" style=\"position:relative;\"><a href=\"#over-to-you-now\" aria-label=\"over to you now permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Over to You Now!</h2>\n<p>Check out our <a href=\"https://www.loginradius.com/\">revamped LoginRadius website</a> and see how the improved experience makes it easier to build, scale, and secure your applications.</p>\n<p>Do not forget to explore the improved navigation and API documentation, and get started with our free trial today. We’re excited to see what you’ll build with LoginRadius!</p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"February 21, 2025","updated_date":null,"description":"LoginRadius’ vision is to give developers a product that simplifies identity management so they can focus on building, deploying, and scaling their applications. To enhance this experience, we’ve redesigned our website interface, making navigation more intuitive and reassuring that essential resources are easily accessible.","title":"Revamped & Ready: Introducing the New Developer-First LoginRadius Website","tags":["Developer tools","API","Identity Management","User Authentication"],"pinned":true,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.7857142857142858,"src":"/static/80b4e4fbe176a10a327d273504607f32/58556/hero-section.webp","srcSet":"/static/80b4e4fbe176a10a327d273504607f32/61e93/hero-section.webp 200w,\n/static/80b4e4fbe176a10a327d273504607f32/1f5c5/hero-section.webp 400w,\n/static/80b4e4fbe176a10a327d273504607f32/58556/hero-section.webp 800w,\n/static/80b4e4fbe176a10a327d273504607f32/99238/hero-section.webp 1200w,\n/static/80b4e4fbe176a10a327d273504607f32/7c22d/hero-section.webp 1600w,\n/static/80b4e4fbe176a10a327d273504607f32/1258b/hero-section.webp 2732w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},"pageContext":{"limit":6,"skip":360,"currentPage":61,"type":"//identity//","numPages":70,"pinned":"ee8a4479-3471-53b1-bf62-d0d8dc3faaeb"}},"staticQueryHashes":["1171199041","1384082988","2100481360","23180105","528864852"]}