{"componentChunkName":"component---src-templates-blog-list-template-js","path":"/identity/66","result":{"data":{"allMarkdownRemark":{"edges":[{"node":{"excerpt":"Every day, societies are becoming more digitized. Instead of speaking to a colleague, you’ll chat online. To hail a cab, just tap your phone…","fields":{"slug":"/identity/ccpa-introduction/"},"html":"<p>Every day, societies are becoming more digitized. Instead of speaking to a colleague, you’ll chat online. To hail a cab, just tap your phone screen. Need a doctor? There’s an app for that, too. All of this online activity gives businesses valuable consumer data (e.g., name, age, email addresses).</p>\n<p>However, starting January 01, 2020, the way you collect, store, and share this data may land you in trouble. If you’re unsure how the <strong>California Consumer Privacy Act (CCPA)</strong> will impact your company, keep reading. This introduction to CCPA compliance focuses on the most common questions that businesses have today.</p>\n<p>For more detailed information, including the major differences between GDPR and CCPA, <a href=\"https://www.loginradius.com/blog/identity/2019/09/ccpa-vs-gdpr-the-compliance-war/\">check out our infographic</a>.</p>\n<p>For now, let’s start with the basics.</p>\n<h2 id=\"what-is-the-california-consumer-privacy-act\" style=\"position:relative;\"><a href=\"#what-is-the-california-consumer-privacy-act\" aria-label=\"what is the california consumer privacy act permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>What is the California Consumer Privacy Act?</strong></h2>\n<p>The CCPA’s goal is to give consumers more information and control over how their personal information is being used. It will apply to all businesses that handle or collect data from California residents.</p>\n<p>What is residency based on? Basically, anyone who pays taxes to the State of California is a California consumer, whether they currently live in the Golden State or not<em>.</em> This California <a href=\"https://www.palmspringstaxandtrustlawyers.com/the-part-time-resident-tax-trap/\">residency law site</a> explains more:</p>\n<p><em>“Under California law, a person who visits the state for other than a temporary or transitory purpose is also a legal resident, subject to California taxation. Even visits can result in residency status. Examples of such visits include an indefinite stay for health reasons, extended stays (usually over six months), retirement, or employment that requires a prolonged or indefinite period to accomplish.”</em></p>\n<h2 id=\"how-do-you-comply-with-the-california-consumer-privacy-act\" style=\"position:relative;\"><a href=\"#how-do-you-comply-with-the-california-consumer-privacy-act\" aria-label=\"how do you comply with the california consumer privacy act permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>How do you comply with the California Consumer Privacy Act?</strong></h2>\n<p>Preparing for compliance can feel overwhelming. In fact, in a recent survey of American companies, nearly half had not begun implementing privacy policies (<a href=\"https://www.trustarc.com/\">TrustArc</a>, 2019).</p>\n<p>However, here are three ways you can get started now.</p>\n<p><strong>Ensure that your decision-makers and key stakeholders know:</strong></p>\n<ul>\n<li>What the CCPA is and who it concerns.</li>\n<li>When it goes into effect: January 1st, 2020.</li>\n<li>How CCPA rules affect your business practices.</li>\n</ul>\n<p><strong>Document and organize customer information, so your company knows:</strong></p>\n<ul>\n<li>Which personal information is being collected.</li>\n<li>How personal information is being collected.</li>\n<li>Where personal information is being stored.</li>\n<li>Why personal information is being collected.</li>\n<li>Where personal information is being shared.</li>\n</ul>\n<p>This will help you set up an efficient system for information retrieval should a customer or auditor request that info. Enlisting a Data Protection Officer or a Data Protection Team to handle these requests is a good idea.</p>\n<p><strong>Review and update your privacy policies.</strong></p>\n<p>A GDPR Privacy Policy will meet CalOPPA/CCPA requirements, but a CalOPPA/CCPA policy might <em>not</em> be GDPR-compliant. To be safe, be sure that your CCPA privacy policy is clearly defined and easily distinguishable from <a href=\"https://www.loginradius.com/gdpr-and-privacy/\">GDPR regulations</a>.</p>\n<p>It’s also helpful to train your customer-facing employees on how privacy policies and CCPA compliance can <a href=\"https://www.loginradius.com/customer-trust/\">improve customer trust</a> and increase engagement.</p>\n<p><a href=\"https://www.loginradius.com/resource/the-ccpa-and-customer-identity\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"ccpa and customer identity\"\n        title=\"ccpa and customer identity\"\n        src=\"/static/277eebfdb42ba7a9547788e0c4bc7ae6/e5715/ccpa-and-customer-identity.png\"\n        srcset=\"/static/277eebfdb42ba7a9547788e0c4bc7ae6/a6d36/ccpa-and-customer-identity.png 650w,\n/static/277eebfdb42ba7a9547788e0c4bc7ae6/e5715/ccpa-and-customer-identity.png 768w,\n/static/277eebfdb42ba7a9547788e0c4bc7ae6/63ff0/ccpa-and-customer-identity.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<h2 id=\"ccpa-20-what-you-need-to-know-about-the-new-cpra\" style=\"position:relative;\"><a href=\"#ccpa-20-what-you-need-to-know-about-the-new-cpra\" aria-label=\"ccpa 20 what you need to know about the new cpra permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>CCPA 2.0: What You Need to Know About the New CPRA</strong></h2>\n<p>On November 3, 2020, the voters in California approved the Consumer Privacy Rights Act (on the ballot as <a href=\"https://ballotpedia.org/California_Proposition_24,_Consumer_Personal_Information_Law_and_Agency_Initiative_(2020)#California_Consumer_Privacy_Act_.28AB_375.29\">Proposition 24</a>) with 56.1% of the vote. This revised version of the CCPA will further strengthen the consumer privacy rights for California citizens. </p>\n<p>We are thrilled to announce the passage of <a href=\"https://twitter.com/hashtag/Prop24?src=hash&#x26;ref_src=twsrc%5Etfw\">#Prop24</a>, the California Privacy Rights Act, with a decisive majority of Californians supporting the measure to strengthen consumer privacy rights. #California once again makes history and leads the nation!</p>\n<p>— Yes on Prop 24 — <a href=\"https://twitter.com/caprivacyorg/status/1323998270369099776?ref_src=twsrc%5Etfw\">Californians for Consumer Privacy</a> (@caprivacyorg) November 4, 2020_</p>\n<p>While some of the changes took effect immediately, the law would become effective on January 1, 2023 with the majority of the enforcement set for July 1 of that year. </p>\n<h3 id=\"ccpa-20-key-aspects-of-the-new-cpra\" style=\"position:relative;\"><a href=\"#ccpa-20-key-aspects-of-the-new-cpra\" aria-label=\"ccpa 20 key aspects of the new cpra permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>CCPA 2.0: Key Aspects of the New CPRA</h3>\n<p>Most significant new additions include: </p>\n<ul>\n<li><strong>New type of personal information</strong>: CPRA categorises a new kind of personal data - “sensitive personal information” that subsets elements like financial account number, social security number, and driver license number. The new law also includes (without limitation), a consumer’s racial or ethnic origin, religious beliefs, union membership, the content of email and text messages, consumers sex life and sexual orientation, and genetic information.</li>\n<li><strong>New consumer rights</strong>: California consumers will have the right to request to limit the use and disclosure of personal information. Consumers also will have the right to ask businesses to correct any inaccurate detail maintained by the business.</li>\n<li><strong>Changes to the Notice at Collection</strong>: Businesses will have to provide consumers a notice at collection. For example, the notice should come with a retention period for each category of  information, both personal and sensitive.</li>\n<li><strong>Adds a data security requirement</strong>: Businesses will have to implement security procedures and practices to protect consumer data from unauthorized access, destruction, use, modification, or disclosure. </li>\n<li><strong>Extension of the employee personal information and B2B exemptions</strong>: CPRA extends the exemption for employee personal information and “B2B” personal information until January 1, 2023. </li>\n<li><strong>Protection for children’s data</strong>: CPRA will impose fines on businesses for collecting and selling information of minors under 16 years. </li>\n<li><strong>Adds data retention requirement</strong>: Businesses cannot retain consumers' personal or sensitive information for longer than reasonably necessary. </li>\n</ul>\n<h3 id=\"ccpa-20-key-differences-with-the-ccpa\" style=\"position:relative;\"><a href=\"#ccpa-20-key-differences-with-the-ccpa\" aria-label=\"ccpa 20 key differences with the ccpa permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>CCPA 2.0: Key Differences with the CCPA</h3>\n<table>\n  <tr>\n   <td><strong>Parameter</strong>\n   </td>\n   <td><strong>CCPA</strong>\n   </td>\n   <td><strong>CPRA</strong>\n   </td>\n  </tr>\n  <tr>\n   <td>Consumer Rights\n   </td>\n   <td>\n<ul>\n<li>Right to Know/Access \n<li>Right to Delete \n<li>Right to Opt-out of Sale \n<li>Right to Non-Discrimination\n</li>\n</ul>\n   </td>\n   <td>All rights defined under the CCPA, plus: \n<ul>\n<li>Right to Rectification \n<li>Right to Limit Use and Disclosure of Sensitive Personal Information \n</li>\n</ul>\n   </td>\n  </tr>\n  <tr>\n   <td>Employee and B2B Exemption\n   </td>\n   <td>Expires on Jan 1, 2021 \n   </td>\n   <td>Expires on Jan 1, 2023\n   </td>\n  </tr>\n  <tr>\n   <td>Personal Information\n   </td>\n   <td>Information that identifies, relates to, describes, or could reasonably be linked, directly or indirectly, with a consumer or household. \n   </td>\n   <td>Personal information, as well as “Sensitive Personal Information” which includes SSN, driver license numbers, biometric information, precise geolocation, and racial and ethnic origin etc. \n   </td>\n  </tr>\n  <tr>\n   <td>Threshold Application\n   </td>\n   <td>It applies to businesses that collect personal information from California's consumers and meet any of the following:\n<ul>\n<li>A gross annual revenue of over $25 million.\n<li>Buy, receive, or sell the personal information of 50,000 or more California consumers, households, or devices.\n<li>Derive 50% or more of their annual revenue from selling California consumers’ personal information.\n</li>\n</ul>\n   </td>\n   <td>It applies to businesses that collect personal information from California's consumers and meet any of the following:\n<ul>\n<li>A gross annual revenue of over $25 million.\n<li>Buy, receive, or sell the personal information of 100,000 or more California consumers, households, or devices.\n<li>Derive 50% or more of their annual revenue from selling or sharing California consumers’ personal information. \n</li>\n</ul>\n   </td>\n  </tr>\n  <tr>\n   <td>Enforcement\n   </td>\n   <td>\n<ul>\n<li>The Attorney General can pursue violations.\n<li>Consumers have a private right of action for a breach. \n<li>Businesses will have a 30–day cure period before imposing fine.\n</li>\n</ul>\n   </td>\n   <td>\n<ul>\n<li>Consumers have a private right of action for a breach.\n<li>Businesses will be fined immediately with no cure period. \n</li>\n</ul>\n   </td>\n  </tr>\n  <tr>\n   <td>Use Limitation \n   </td>\n   <td>N/A \n   </td>\n   <td>Collection, retention, and use should be limited to what is necessary to provide goods or service. \n   </td>\n  </tr>\n</table>\n<h2 id=\"how-businesses-should-prepare-for-the-new-cpra\" style=\"position:relative;\"><a href=\"#how-businesses-should-prepare-for-the-new-cpra\" aria-label=\"how businesses should prepare for the new cpra permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>How Businesses Should Prepare for the New CPRA</strong></h2>\n<p>The good news for companies is that the implementation of the CPRA will not begin until July 2023. So, organizations have some time to plan out their new data policies.</p>\n<p><strong>Step up data deletion policies</strong></p>\n<p>Under CPRA, businesses will have to delete personal data after it has served its purpose. So, here's what you can do.</p>\n<p>Put an identity and access management (IAM) system in place to connect all personal data under centralized user profiles. With a single repository of consumer data, you can simplify compliance and abide more easily by the primary aspects of CPRA. They may include deleting personal data, making corrections, and offering reports to consumers upon request.</p>\n<p><strong>Implement MFA for logins</strong></p>\n<p>One way to improve the security of login credentials is by implementing multi-factor authentication (MFA). It puts a bar on automatic account access and enforces additional authentication layers such as a fingerprint or a one-time code in the event of an unusual login.</p>\n<p>It is a simple effort to prevent broken authentication attacks, such as credential stuffing, in which exposed login credentials become the gateway for identity thieves. </p>\n<h2 id=\"how-does-loginradius-handle-consent-withdrawal\" style=\"position:relative;\"><a href=\"#how-does-loginradius-handle-consent-withdrawal\" aria-label=\"how does loginradius handle consent withdrawal permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>How does LoginRadius handle consent withdrawal?</strong></h2>\n<p>With the CCPA, your organization needs to prepare for consent withdrawal. The LoginRadius Identity Platform centralizes all your customers’ personal information. You can document and manage your <a href=\"https://www.loginradius.com/\">customers’ consent</a> including withdrawal.</p>\n<p>Another core component of the CCPA is providing data access to auditors or customers, should they request it. With the LoginRadius Identity Platform, customer data is unified into one profile for easy access. You can also export it in an easy-to-read format.</p>\n<p>Last but not least, LoginRadius provides <a href=\"https://www.loginradius.com/security/\">top-notch security</a> that monitors and protects your customer data. For example, our CIAM software can encourage your customers to use intelligent passwords, protect the data against brute force attacks from hackers, block access to suspicious IPs, and more.</p>\n<h3 id=\"summary\" style=\"position:relative;\"><a href=\"#summary\" aria-label=\"summary permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>Summary</strong></h3>\n<p>Following the old CCPA rules will <em>not automatically</em> lead to CCPA 2.0 compliance; don’t wait to be sued to find out. Let LoginRadius help your business become globally compliant. Not only does our technology meet the new CPRA regulations, but we continuously update it to meet new international privacy laws.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book a demo loginradius\"\n        title=\"book a demo loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"May 03, 2019","updated_date":null,"description":"On November 3, 2020, the voters in California approved the Consumer Privacy Rights Act (on the ballot as Proposition 24) with 56.1% of the vote. This revised version of the CCPA will further strengthen the consumer privacy rights for California citizens.","title":"California's CCPA 2.0 Passed: Everything You Need to Know About the New CPRA","tags":["ccpa","data privacy","compliance","customer trust"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":2.150537634408602,"src":"/static/6e185d6a87b7773ea2ca9a79de8d9527/c3e3a/ccpa-intro.jpg","srcSet":"/static/6e185d6a87b7773ea2ca9a79de8d9527/f836f/ccpa-intro.jpg 200w,\n/static/6e185d6a87b7773ea2ca9a79de8d9527/2244e/ccpa-intro.jpg 400w,\n/static/6e185d6a87b7773ea2ca9a79de8d9527/c3e3a/ccpa-intro.jpg 769w","sizes":"(max-width: 769px) 100vw, 769px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},{"node":{"excerpt":"The conventional employee identity and access management (IAM) systems were initially designed to manage employee identities. And they aren…","fields":{"slug":"/identity/iam-vs-ciam/"},"html":"<p>The conventional employee identity and access management (IAM) systems were initially designed to manage employee identities. And they aren’t potent enough to cater to customers' diverse needs pertaining to user experience and security. </p>\n<p>Apart from this, employee IAM also doesn’t help when the needs of consumers are growing with every passing year, and internal identity management systems are not built to keep up.</p>\n<p>Users now expect a seamless and secure customer experience across multiple platforms, devices, and touchpoints. And the conventional IAM will always struggle to meet these requirements. </p>\n<p><a href=\"https://blog.loginradius.com/identity/customer-identity-and-access-management/\">Customer Identity and Access Management</a> (CIAM) solutions help to improve the customer experience, reduce security risks, shrink costs, and increase the availability of applications.</p>\n<p>CIAM solutions are becoming more commonly used in organizations today because they provide several benefits. For example, a customer identity and access management (CIAM) solution can improve the customer experience by increasing the flexibility and customization of applications. </p>\n<p>CIAM solutions can also reduce security risks by allowing users to access only those applications they need for their work tasks. </p>\n<p>Finally, these solutions can be very cost-effective because they allow companies to scale their technology needs by providing an easy way to manage all users with one set of tools.</p>\n<p>This is where customer IAM solutions come in. These solutions have been built to handle customer <a href=\"https://www.loginradius.com/authentication/\">authentication requirements</a>, scalability, privacy and data regulations, user experience, and integration.</p>\n<p>Compared to employee IAM, a customer identity and access management (CIAM) solution improves the customer experience, reduces security risks, shrinks costs, and increases the availability of applications.</p>\n<p>In this infographic, we compare the following features of both an IAM and CIAM solution:</p>\n<ul>\n<li>Functional Difference</li>\n<li>Authentication</li>\n<li>Authentication Methods</li>\n<li>User Experience</li>\n<li>Performance </li>\n<li>Security</li>\n<li>Privacy &#x26; Data Regulation</li>\n<li>Platform Scalability</li>\n<li>Real-Life Examples</li>\n</ul>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 369.2307692307692%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"employee-iam-vs-ciam\"\n        title=\"employee-iam-vs-ciam\"\n        src=\"/static/4c1ca15260cbb83bff6ff97caa5d7617/e5715/employee-iam-vs-ciam.png\"\n        srcset=\"/static/4c1ca15260cbb83bff6ff97caa5d7617/a6d36/employee-iam-vs-ciam.png 650w,\n/static/4c1ca15260cbb83bff6ff97caa5d7617/e5715/employee-iam-vs-ciam.png 768w,\n/static/4c1ca15260cbb83bff6ff97caa5d7617/b2c3d/employee-iam-vs-ciam.png 2584w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"March 21, 2019","updated_date":null,"description":"In order to serve customers, conventional identity management is no longer enough. This truly ought to go without saying. After all, internal management systems were initially designed to handle employee identities, and consumer preferences are not generally matched with their preferences of a successful user experience.","title":"IAM vs. CIAM: Which Solution is Right For You?","tags":["iam","ciam","identity management"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.408450704225352,"src":"/static/33f5de275c064ffdda7e9e501bd74fa7/0756a/IAM-vs-CIAM-V01.01-01-1.png","srcSet":"/static/33f5de275c064ffdda7e9e501bd74fa7/69585/IAM-vs-CIAM-V01.01-01-1.png 200w,\n/static/33f5de275c064ffdda7e9e501bd74fa7/497c6/IAM-vs-CIAM-V01.01-01-1.png 400w,\n/static/33f5de275c064ffdda7e9e501bd74fa7/0756a/IAM-vs-CIAM-V01.01-01-1.png 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},{"node":{"excerpt":"The customer identity space is in a dynamic phase, with lots of activity around mergers and acquisitions (M&A) and investment. One notable…","fields":{"slug":"/identity/looking-gigya-alternative-try-loginradius-superior-modern-identity-platform/"},"html":"<p>The customer identity space is in a dynamic phase, with lots of activity around mergers and acquisitions (M&#x26;A) and investment.</p>\n<p>One notable event was the <a href=\"https://techcrunch.com/2017/09/24/sap-is-buying-identity-management-firm-gigya-for-350m/\"><strong>SAP acquisition of Gigya</strong></a> <strong>in late 2017</strong>.</p>\n<p>Now that a year has gone by, existing Gigya contracts are ending. Engineers are probably thinking that everything’s fine and that not much has changed with their customer identity solution.</p>\n<p>But as a leader, you should be worried. The Gigya technology may not have changed (yet) but the company that delivers it has changed significantly. Now is the time to start looking for the best Gigya alternatives.</p>\n<h2 id=\"acquisitions-create-problems-for-customers\" style=\"position:relative;\"><a href=\"#acquisitions-create-problems-for-customers\" aria-label=\"acquisitions create problems for customers permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Acquisitions Create Problems for Customers</h2>\n<p>M&#x26;A can be exciting for everyone associated with the acquired company. However, in some cases an acquisition can be damaging for customers, partners, and employees, depending on who the acquirer is.</p>\n<p>One such case is when the acquirer is significantly larger than the acquired company and they do not let the acquired company operate independently. The differences in size and power create culture clash, which is one of the <a href=\"https://www.aon.com/attachments/thought-leadership/M_A_Survey.pdf\">top reasons that mergers fail</a>.</p>\n<p>Culture clash then leads to staff turnover, which can be <a href=\"https://www.jamespwalsh.com/Resources/Walsh%20-%201988%20-%20Top%20management%20turnover%20following%20mergers%20and%20acquistions.pdf\">up to three times higher</a> than in non-acquired companies.</p>\n<p>When employees and partners leave an acquired company, customers are the most hurt group among the three. Customers have to move quickly to find an alternative provider, and it also impacts resource allocation, service quality, and all of their future plans.</p>\n<p>This is the tough situation where Gigya customers now find themselves.</p>\n<h2 id=\"why-are-companies-looking-for-other-solutions-like-gigya-sap\" style=\"position:relative;\"><a href=\"#why-are-companies-looking-for-other-solutions-like-gigya-sap\" aria-label=\"why are companies looking for other solutions like gigya sap permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Why Are Companies Looking for Other Solutions Like Gigya (SAP)?</h2>\n<p>In the past twelve months, many customers have done their research on Gigya competitors and migrated away from <strong>Gigya to LoginRadius</strong>. We’ve heard from them about why they switched, and I wanted to share their feedback.</p>\n<h3 id=\"sap-is-not-a-personality-fit-its-big-old-and-slow\" style=\"position:relative;\"><a href=\"#sap-is-not-a-personality-fit-its-big-old-and-slow\" aria-label=\"sap is not a personality fit its big old and slow permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>“SAP is not a personality fit. It’s big, old, and slow.”</strong></h3>\n<p>Gigya no longer has its young, fast-moving culture from pre-acquisition days. It’s now part of a long-standing and enormous organization at SAP, which means a slower pace of technological innovation.</p>\n<p>SAP has 95,000 employees and Gigya had 500, which makes SAP 190 times larger. It’s not hard to guess which culture is going to win out.</p>\n<p>If your company chose Gigya because their agility and cutting-edge creativity were a great match for your corporate personality, there’s now a big disconnect.</p>\n<h3 id=\"our-contacts-and-partners-are-no-longer-there\" style=\"position:relative;\"><a href=\"#our-contacts-and-partners-are-no-longer-there\" aria-label=\"our contacts and partners are no longer there permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>“Our contacts and partners are no longer there.”</strong></h3>\n<p>Customers aren’t the only ones who don’t want to make the leap to a different culture. Employees are even more affected by the organizational change, and a lot of them leave rather than try to adapt.</p>\n<p>Many of the people who took care of Gigya’s customers are gone by now. If you’re one of those customers, this turnover marks an end to your human relationship with Gigya.</p>\n<p>Then you get assigned to new account managers from the SAP culture and SAP strategies, not from Gigya’s young and innovative culture.</p>\n<h3 id=\"were-now-a-tiny-customer-for-the-massive-sap-enterprise\" style=\"position:relative;\"><a href=\"#were-now-a-tiny-customer-for-the-massive-sap-enterprise\" aria-label=\"were now a tiny customer for the massive sap enterprise permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>“We’re now a tiny customer for the massive SAP enterprise.”</strong></h3>\n<p>Gigya used to be a small company with a few thousand customers. They were able to give quick personalized support.</p>\n<p>Now, as SAP, they have a huge client base.</p>\n<p>Perhaps you were in the top 10% of Gigya customers. Post-acquisition, you’re probably not even in the top 40% of customers. Big acquiring companies have customers who pay them $100 million or more, and you end up becoming a Tier 3 or 4 customer.</p>\n<p>You never get the same level of care you enjoyed before from your <a href=\"https://www.loginradius.com/\">CIAM vendor</a>.</p>\n<p>SAP is also outsourcing its support for Gigya customers to external partners who don’t necessarily have the level of expertise required. They may not understand your actual implementation. It can take days or weeks to resolve issues.</p>\n<h3 id=\"with-sap-were-stuck-using-sap-products-and-technologies\" style=\"position:relative;\"><a href=\"#with-sap-were-stuck-using-sap-products-and-technologies\" aria-label=\"with sap were stuck using sap products and technologies permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>“With SAP, we’re stuck using SAP products and technologies.”</strong></h3>\n<p>SAP Customer Data Cloud, the new name for Gigya’s customer identity and access management (CIAM) platform, is just a tiny part of the SAP universe. CIAM is now one offering out of 200.</p>\n<p>Gigya uses SAP servers for colocation, and they only have five regional data centers.</p>\n<h2 id=\"top-5-reasons-companies-are-migrating-from-gigya-sap-to-loginradius\" style=\"position:relative;\"><a href=\"#top-5-reasons-companies-are-migrating-from-gigya-sap-to-loginradius\" aria-label=\"top 5 reasons companies are migrating from gigya sap to loginradius permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Top 5 Reasons Companies Are Migrating from Gigya (SAP) to LoginRadius</h2>\n<p>Many large brands, including a large media company with 30 million users, have migrated from Gigya/SAP to LoginRadius. Here are the top 5 reasons why big brands are considering LoginRadius as the best Gigya alternative.</p>\n<h3 id=\"1-loginradius-is-a-young-and-innovative-company-that-is-a-leader-in-the-ciam-space\" style=\"position:relative;\"><a href=\"#1-loginradius-is-a-young-and-innovative-company-that-is-a-leader-in-the-ciam-space\" aria-label=\"1 loginradius is a young and innovative company that is a leader in the ciam space permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. LoginRadius is a young and innovative company that is a leader in the CIAM space.</h3>\n<p>“Innovate or die” is the mantra of the 21st century for tech businesses. The LoginRadius <a href=\"https://www.linkedin.com/pulse/loginradius-our-evolution-end-to-end-customer-identity-rakesh-soni/\">customer identity platform</a> is the most modern offering in its class. In the security industry, it’s essential to stay current and jump on new developments quickly, and we have the agility to do that. The company has been recognized as a leader by many analyst firms, including KuppingerCole, Gartner, and Forrester.</p>\n<h3 id=\"2-customer-identity-is-our-core-business\" style=\"position:relative;\"><a href=\"#2-customer-identity-is-our-core-business\" aria-label=\"2 customer identity is our core business permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. Customer identity is our core business.</h3>\n<p>LoginRadius started in customer identity and it’s what we do. The full focus of our technology and business leadership is on creating modern customer experiences and helping businesses win customer trust.</p>\n<h3 id=\"3-loginradius-infrastructure-is-global-and-ready-to-scale\" style=\"position:relative;\"><a href=\"#3-loginradius-infrastructure-is-global-and-ready-to-scale\" aria-label=\"3 loginradius infrastructure is global and ready to scale permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3. LoginRadius infrastructure is global and ready to scale.</h3>\n<p>LoginRadius is deployed on Microsoft Azure cloud servers with failover to Amazon Web Services. Our platform scales to handle hundreds of millions of customers and over 150K logins per second. We have 35 global data storage centers (and counting).</p>\n<h3 id=\"4-we-have-in-house-customer-support\" style=\"position:relative;\"><a href=\"#4-we-have-in-house-customer-support\" aria-label=\"4 we have in house customer support permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>4. We have in-house customer support.</h3>\n<p>LoginRadius offers our clients a dedicated support team, consisting of a customer success manager and implementation engineer. These are LoginRadius experts who understand your environment and resolve your issues quickly.</p>\n<h3 id=\"5-loginradius-has-the-best-system-availability\" style=\"position:relative;\"><a href=\"#5-loginradius-has-the-best-system-availability\" aria-label=\"5 loginradius has the best system availability permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>5. LoginRadius has the best system availability.</h3>\n<p>LoginRadius is the only CIAM platform on the market that guarantees 100% uptime, compared to 99.9% offered by other vendors. While other platforms have minutes to hours of unscheduled downtime as well as downtime for regular maintenance, <a href=\"https://www.loginradius.com/\">LoginRadius is simply always available</a>.</p>\n<h2 id=\"migration-program-for-gigya-customers-looking-to-move\" style=\"position:relative;\"><a href=\"#migration-program-for-gigya-customers-looking-to-move\" aria-label=\"migration program for gigya customers looking to move permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Migration Program for Gigya Customers Looking to Move</h2>\n<p>LoginRadius has migrated many customers, and we’re good at it. Our team will work with you through the whole process and manage the production deployment so there’s very little effort required on your side.</p>\n<p>We have automated software for a seamless migration and quick go-to-market, and we do most of the migration testing. Your users won’t be affected—they won’t even notice anything. Customers are pleasantly surprised at how simple the process is.</p>\n<p>If you’d like to hear more about customers making the switch to LoginRadius, contact us at 1-844-625-8889. We can also <a href=\"https://www.loginradius.com/schedule-demo/\">give you a demo</a> so you can see how our features compare.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"CTA Graphics for Blogs V02 01 14 1024x310\"\n        title=\"CTA Graphics for Blogs V02 01 14 1024x310\"\n        src=\"/static/8f35aa0484e3c7f6abeab3116ff1873e/e5715/CTA-Graphics-for-Blogs-V02.01-14-1024x310.png\"\n        srcset=\"/static/8f35aa0484e3c7f6abeab3116ff1873e/a6d36/CTA-Graphics-for-Blogs-V02.01-14-1024x310.png 650w,\n/static/8f35aa0484e3c7f6abeab3116ff1873e/e5715/CTA-Graphics-for-Blogs-V02.01-14-1024x310.png 768w,\n/static/8f35aa0484e3c7f6abeab3116ff1873e/2bef9/CTA-Graphics-for-Blogs-V02.01-14-1024x310.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"February 20, 2019","updated_date":null,"description":"The Gigya technology may not have changed (yet), but it has dramatically changed the business that provides it. Now is the moment to start searching for the best alternatives to Gigya.","title":"Looking for a Gigya Alternative? Try LoginRadius, a Superior and Modern Identity Platform","tags":["public-sector"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":2,"src":"/static/97b1fa6e10212cd0f545c5d71c30668b/14b42/STUPID-WPPPPPPP-1.jpg","srcSet":"/static/97b1fa6e10212cd0f545c5d71c30668b/f836f/STUPID-WPPPPPPP-1.jpg 200w,\n/static/97b1fa6e10212cd0f545c5d71c30668b/2244e/STUPID-WPPPPPPP-1.jpg 400w,\n/static/97b1fa6e10212cd0f545c5d71c30668b/14b42/STUPID-WPPPPPPP-1.jpg 800w,\n/static/97b1fa6e10212cd0f545c5d71c30668b/47498/STUPID-WPPPPPPP-1.jpg 1200w,\n/static/97b1fa6e10212cd0f545c5d71c30668b/0e329/STUPID-WPPPPPPP-1.jpg 1600w,\n/static/97b1fa6e10212cd0f545c5d71c30668b/01617/STUPID-WPPPPPPP-1.jpg 2112w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},{"node":{"excerpt":"Have you ever had a website ask for personal information that made you say, “Why do you need to know that?” Customers may not always…","fields":{"slug":"/identity/presenting-progressive-profiling-loginradius/"},"html":"<p>Have you ever had a website ask for personal information that made you say, “Why do you need to know <em>that</em>?” Customers may not always understand why certain information is necessary, which can cause a lack of trust between them and the company.</p>\n<p><a href=\"https://www.loginradius.com/progressive-profiling/\">Progressive profiling</a> is a new feature of the LoginRadius Identity Platform that gradually gathers  data from customers in an automated way.</p>\n<h2 id=\"the-benefits-of-progressive-profiling\" style=\"position:relative;\"><a href=\"#the-benefits-of-progressive-profiling\" aria-label=\"the benefits of progressive profiling permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>The Benefits of Progressive Profiling</h2>\n<p>The benefit of progressive profiling is that it requests permissions for a customer’s data at various stages of their life cycle rather than all at once. You can establish a greater level of trust with your customers as you only request their personal data when it is needed.</p>\n<h3 id=\"progressive-profiling-strategy\" style=\"position:relative;\"><a href=\"#progressive-profiling-strategy\" aria-label=\"progressive profiling strategy permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Progressive Profiling Strategy</h3>\n<p>When considering whether and how to use progressive profiling with your customers, ask yourself these questions:</p>\n<ul>\n<li>What is the customer journey? What types of interactions do you have with customers over time?</li>\n<li>What customer data and permissions are you requesting now?</li>\n<li>What additional customer data and permissions could you request that would allow you to serve customers better?</li>\n<li>What data and permissions are required upfront, and which ones are more directly related to interactions that are further along in the customer journey?</li>\n<li>Would shorter forms and/or fewer permission requests increase conversion?</li>\n</ul>\n<p>A progressive profiling strategy can create a smoother registration experience for customers while also optimizing the customer data and permissions available.</p>\n<p>There are two types of progressive profiling: multi-step registration and social accounts.</p>\n<h3 id=\"progressive-profiling-with-multi-step-registration\" style=\"position:relative;\"><a href=\"#progressive-profiling-with-multi-step-registration\" aria-label=\"progressive profiling with multi step registration permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Progressive Profiling with Multi-Step Registration</h3>\n<p>Progressive profiling for customer registration allows you to split a potentially complicated registration process into multiple steps. You can capture a customer’s information upfront and then slowly build out a holistic view of that customer through subsequent actions.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 85.6923076923077%; position: relative; bottom: 0; left: 0; background-image: url('data:image/jpeg;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"Progressive Profiling Workflow\"\n        title=\"Progressive Profiling Workflow\"\n        src=\"/static/ea983b7e1319818f6b204a4de0d2a855/212bf/progressive-data-gather.jpg\"\n        srcset=\"/static/ea983b7e1319818f6b204a4de0d2a855/6aca1/progressive-data-gather.jpg 650w,\n/static/ea983b7e1319818f6b204a4de0d2a855/212bf/progressive-data-gather.jpg 768w,\n/static/ea983b7e1319818f6b204a4de0d2a855/d165a/progressive-data-gather.jpg 1400w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span> <strong>As customer trust increases, businesses can request more data</strong>.</p>\n<p>The subsequent actions often take the place of secondary registration forms or event-driven calls to action for your customer to supply additional profile metadata. For example, you could request more detailed data only after a customer has logged in a certain number of times or navigated to a certain digital property.</p>\n<h3 id=\"progressive-profiling-with-social-accounts\" style=\"position:relative;\"><a href=\"#progressive-profiling-with-social-accounts\" aria-label=\"progressive profiling with social accounts permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Progressive Profiling with Social Accounts</h3>\n<p>Progressive profiling with social accounts is the process of progressively requesting additional OAuth Access permissions from your customers. This process allows you to minimize the access permissions requested and get business-critical access from your customers based on their social providers.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 56.30769230769231%; position: relative; bottom: 0; left: 0; background-image: url('data:image/jpeg;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"Progressive Profiling Workflow\"\n        title=\"Progressive Profiling Workflow\"\n        src=\"/static/f8a9125e2dfc82f669b70f46da74e936/212bf/final-feb-8.jpg\"\n        srcset=\"/static/f8a9125e2dfc82f669b70f46da74e936/6aca1/final-feb-8.jpg 650w,\n/static/f8a9125e2dfc82f669b70f46da74e936/212bf/final-feb-8.jpg 768w,\n/static/f8a9125e2dfc82f669b70f46da74e936/0f98f/final-feb-8.jpg 1920w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span> <strong>An example of progressive profiling with social accounts</strong></p>\n<p>Once the customer interacts more with your platform, you can begin requesting additional permissions from the social provider they are authenticating with. For example, you can ask for basic information, such as name and email, during registration, and then ask for birthdate, likes, and interests from the same customer at a later point.</p>\n<p><strong>To learn more about how LoginRadius can improve customer experience and data collection using Progressive Profiling or other features, Book a demo today.</strong></p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-free-demo-loginradius\"\n        title=\"book-a-free-demo-loginradius\"\n        src=\"/static/779ad148d33fb1ecfd80cc41f1a94ef3/e5715/Book-a-free-demo-request-1024x310.png\"\n        srcset=\"/static/779ad148d33fb1ecfd80cc41f1a94ef3/a6d36/Book-a-free-demo-request-1024x310.png 650w,\n/static/779ad148d33fb1ecfd80cc41f1a94ef3/e5715/Book-a-free-demo-request-1024x310.png 768w,\n/static/779ad148d33fb1ecfd80cc41f1a94ef3/2bef9/Book-a-free-demo-request-1024x310.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"February 07, 2019","updated_date":null,"description":"A new feature of the LoginRadius Identity Platform is progressive profiling, which gradually collects data from customers in an automated way.","title":"Presenting: Progressive Profiling from LoginRadius","tags":["progressive profiling","cx","ciam solution"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5037593984962405,"src":"/static/da44452f5513e8a73504016fe0488f80/33aa5/progrssive-profiling.jpg","srcSet":"/static/da44452f5513e8a73504016fe0488f80/f836f/progrssive-profiling.jpg 200w,\n/static/da44452f5513e8a73504016fe0488f80/2244e/progrssive-profiling.jpg 400w,\n/static/da44452f5513e8a73504016fe0488f80/33aa5/progrssive-profiling.jpg 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},{"node":{"excerpt":"Introduction Security questions can add an extra layer of certainty to your authentication process. Security questions are an alternative…","fields":{"slug":"/identity/best-practices-choosing-good-security-questions/"},"html":"<h2 id=\"introduction\" style=\"position:relative;\"><a href=\"#introduction\" aria-label=\"introduction permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Introduction</h2>\n<p>Security questions can add an extra layer of certainty to your authentication process.</p>\n<p>Security questions are an alternative way of identifying your consumers when they have <a href=\"https://www.loginradius.com/blog/identity/is-password-reset-ruining-cx/\">forgotten their password</a>, entered the wrong credentials too many times, or tried to log in from an unfamiliar device or location.</p>\n<p>So, how do you define a good security question? We have come up with some basic guidelines that will help you create the best ones. </p>\n<h2 id=\"what-makes-a-good-security-question\" style=\"position:relative;\"><a href=\"#what-makes-a-good-security-question\" aria-label=\"what makes a good security question permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What Makes a Good Security Question?</h2>\n<p>The best security questions and answers make it easy for legitimate consumers to authenticate themselves without worrying about their account being infiltrated.</p>\n<ul>\n<li>If a question is too hard to answer due to complexity or changing circumstances, it can end up wasting your consumer’s time—and ultimately, it may keep them locked out of their account.</li>\n<li>If the answer is too quickly researched or there are too few possible answers, it can be easy for an attacker to gain access by guessing correctly.</li>\n<li>If the answer has favorite foods or colors, they change over time.</li>\n<li>If the answer has birthdays, it can be easy for an attacker to find online.</li>\n<li>If the question and answer have a school name or location too, such information is easily available for attackers.</li>\n</ul>\n<p>You can minimize both of these outcomes by creating good security questions. </p>\n<ol>\n<li><strong>Safe</strong>: Cannot be guessed or researched.</li>\n<li><strong>Stable</strong>: Does not change over time.</li>\n<li><strong>Memorable</strong>: Can be remembered.</li>\n<li><strong>Simple</strong>: Is precise, easy, and consistent.</li>\n<li><strong>Many</strong>: Has many possible answers.</li>\n</ol>\n<p><em>You can see examples of good security questions from the</em> <em><a href=\"https://sites.google.com/site/pwordsecuritykate/home/list-of-ideas-security-questions\">University of Virginia</a>. Let’s take a look at each of these criteria in more detail.</em></p>\n<h3 id=\"1-safe\" style=\"position:relative;\"><a href=\"#1-safe\" aria-label=\"1 safe permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. Safe</h3>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 66.76923076923077%; position: relative; bottom: 0; left: 0; background-image: url('data:image/jpeg;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"boy car child 1266014\"\n        title=\"boy car child 1266014\"\n        src=\"/static/d4fae33c2faad6854ead18d5f1d44b8d/212bf/boy-car-child-1266014.jpg\"\n        srcset=\"/static/d4fae33c2faad6854ead18d5f1d44b8d/6aca1/boy-car-child-1266014.jpg 650w,\n/static/d4fae33c2faad6854ead18d5f1d44b8d/212bf/boy-car-child-1266014.jpg 768w,\n/static/d4fae33c2faad6854ead18d5f1d44b8d/93719/boy-car-child-1266014.jpg 4000w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>When choosing security question and answers, it’s extremely important that the correct answers cannot be guessed or researched over the internet.</p>\n<p>Here’s an example of a question that fails to meet these rules:</p>\n<p><em>“In what county were you born?”</em></p>\n<p>This question could be considered unsafe because the information can be found online. Also, this information may be common knowledge to friends and family members.</p>\n<p>Aside from these issues, if a hacker was interested in a specific account, it might be easy to brute-force their way past this question since there are only a fixed number of counties in each US state.</p>\n<h3 id=\"2-stable\" style=\"position:relative;\"><a href=\"#2-stable\" aria-label=\"2 stable permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. Stable</h3>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 66.61538461538463%; position: relative; bottom: 0; left: 0; background-image: url('data:image/jpeg;base64,/9j/2wBDABALDA4MChAODQ4SERATGCgaGBYWGDEjJR0oOjM9PDkzODdASFxOQERXRTc4UG1RV19iZ2hnPk1xeXBkeFxlZ2P/2wBDARESEhgVGC8aGi9jQjhCY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2P/wgARCAANABQDASIAAhEBAxEB/8QAFgABAQEAAAAAAAAAAAAAAAAABAUA/8QAFQEBAQAAAAAAAAAAAAAAAAAAAQD/2gAMAwEAAhADEAAAAaRwES5oWj//xAAdEAACAgEFAAAAAAAAAAAAAAABAwACERITFCEj/9oACAEBAAEFAuo+/jkGOcdO4TTkMn//xAAVEQEBAAAAAAAAAAAAAAAAAAAAEf/aAAgBAwEBPwFH/8QAFREBAQAAAAAAAAAAAAAAAAAAABH/2gAIAQIBAT8BV//EABoQAQACAwEAAAAAAAAAAAAAAAARIQECMaH/2gAIAQEABj8CThLWKW74/8QAGhABAAIDAQAAAAAAAAAAAAAAAQARITFRcf/aAAgBAQABPyEfEIbrrUaXRcxxtd3HFrTF265OJDlJ/9oADAMBAAIAAwAAABCE/wD/xAAVEQEBAAAAAAAAAAAAAAAAAAAQEf/aAAgBAwEBPxCD/8QAFREBAQAAAAAAAAAAAAAAAAAAEBH/2gAIAQIBAT8Qo//EAB4QAQADAAEFAQAAAAAAAAAAAAEAESExQVFxgZGh/9oACAEBAAE/EDBaW4+QX8js6C3f5M8sIUdHZcmYgNWZz7j/AGGtj3NpPMXoFFAoD5P/2Q=='); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"balance beach boulder 1051449\"\n        title=\"balance beach boulder 1051449\"\n        src=\"/static/ee7a85d6a513b71ddbe76236572934b6/212bf/balance-beach-boulder-1051449.jpg\"\n        srcset=\"/static/ee7a85d6a513b71ddbe76236572934b6/6aca1/balance-beach-boulder-1051449.jpg 650w,\n/static/ee7a85d6a513b71ddbe76236572934b6/212bf/balance-beach-boulder-1051449.jpg 768w,\n/static/ee7a85d6a513b71ddbe76236572934b6/4b319/balance-beach-boulder-1051449.jpg 5472w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>A good security question should have a fixed answer, meaning that it won’t change over time.</p>\n<p>A good example of a security question with a stable answer:</p>\n<p><em>“What is your oldest cousin’s first name?”</em></p>\n<p>This example works because the answer never changes.</p>\n<p>Note: Questions like this one might not apply to all users. Asking about someone’s wedding anniversary or cousins does them no good if they have never been married or have no cousins! It’s important to offer your consumers several questions to choose from to make sure they apply.</p>\n<p>Some examples of questions with unstable answers:</p>\n<p><em>“What is the title and artist of your favorite song?”</em></p>\n<p><em>“What is your work address?”</em></p>\n<p>Both of these examples make for poor security questions because their answers will change for most people over time. Many people change their minds about their favorite things over the course of their lives, and they also may change jobs or move to a different office location.</p>\n<h3 id=\"3-memorable\" style=\"position:relative;\"><a href=\"#3-memorable\" aria-label=\"3 memorable permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3. Memorable</h3>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 66.61538461538463%; position: relative; bottom: 0; left: 0; background-image: url('data:image/jpeg;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"adorable blur child 573293\"\n        title=\"adorable blur child 573293\"\n        src=\"/static/e335faab9f2b625202c48a2ead01c68d/212bf/adorable-blur-child-573293.jpg\"\n        srcset=\"/static/e335faab9f2b625202c48a2ead01c68d/6aca1/adorable-blur-child-573293.jpg 650w,\n/static/e335faab9f2b625202c48a2ead01c68d/212bf/adorable-blur-child-573293.jpg 768w,\n/static/e335faab9f2b625202c48a2ead01c68d/4b319/adorable-blur-child-573293.jpg 5472w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>A good security question should be easily answered by the account holders but not readily obvious to others or quickly researched.</p>\n<p>Examples of good memorable questions:</p>\n<p><em>“What is your oldest sibling's middle name?”</em></p>\n<p>Most consumers who have siblings know their middle name off the top of their heads, making this a good example of a memorable security question. This question is also excellent because someone would have to do quite a bit of digging to first find out who the consumer’s oldest sibling is, and then find their middle name in order to crack this question.</p>\n<p><em>“In what city or town did your mother and father meet?”</em></p>\n<p>Most consumers know the answer to a question like this, making it fit the criteria of being memorable. It is also more difficult to guess or research this fact. Best of all, it fits the stability criteria as well.</p>\n<p><a href=\"https://www.loginradius.com/resource/ebook/buyers-guide-to-multi-factor-authentication/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"EB-buyers-GD-to-MFA\"\n        title=\"EB-buyers-GD-to-MFA\"\n        src=\"/static/5093fa5ddf26d3a3ec38a96c3e0387e6/e5715/EB-buyers-GD-to-MFA.png\"\n        srcset=\"/static/5093fa5ddf26d3a3ec38a96c3e0387e6/a6d36/EB-buyers-GD-to-MFA.png 650w,\n/static/5093fa5ddf26d3a3ec38a96c3e0387e6/e5715/EB-buyers-GD-to-MFA.png 768w,\n/static/5093fa5ddf26d3a3ec38a96c3e0387e6/81501/EB-buyers-GD-to-MFA.png 2886w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<p>Some examples of question and answers that are unmemorable include:</p>\n<p><em>“What is your car’s license plate number?”</em></p>\n<p>Many people don’t have their license plate number memorized. Also, it’s relatively simple for a potential intruder to do some digging and find this information for themselves.</p>\n<p><em>“What was your favorite elementary school teacher’s name?”</em></p>\n<p>The answer to this question may be quick to recall for someone younger, but for older consumers, things from their childhood can be a lot foggier. So answers to such questions might not come so easily. It’s good practice to try to avoid questions from a consumer’s childhood.</p>\n<h3 id=\"4-simple\" style=\"position:relative;\"><a href=\"#4-simple\" aria-label=\"4 simple permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>4. Simple</h3>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 66.61538461538463%; position: relative; bottom: 0; left: 0; background-image: url('data:image/jpeg;base64,/9j/2wBDABALDA4MChAODQ4SERATGCgaGBYWGDEjJR0oOjM9PDkzODdASFxOQERXRTc4UG1RV19iZ2hnPk1xeXBkeFxlZ2P/2wBDARESEhgVGC8aGi9jQjhCY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2P/wgARCAANABQDASIAAhEBAxEB/8QAGQAAAgMBAAAAAAAAAAAAAAAAAAUCAwQG/8QAFAEBAAAAAAAAAAAAAAAAAAAAAf/aAAwDAQACEAMQAAABtkrxi/OfE//EABsQAAIDAAMAAAAAAAAAAAAAAAECAAMEERNB/9oACAEBAAEFAltNNY2LDqERz1+Acz//xAAUEQEAAAAAAAAAAAAAAAAAAAAQ/9oACAEDAQE/AT//xAAUEQEAAAAAAAAAAAAAAAAAAAAQ/9oACAECAQE/AT//xAAbEAACAgMBAAAAAAAAAAAAAAAAARIhAhAxcf/aAAgBAQAGPwLFRkjjRR5W/wD/xAAcEAACAQUBAAAAAAAAAAAAAAAAASERMUFRYYH/2gAIAQEAAT8hV53q6wxxzuWKqUdRl3L2irOwf//aAAwDAQACAAMAAAAQtw//xAAXEQADAQAAAAAAAAAAAAAAAAAAASER/9oACAEDAQE/EHaYz//EABcRAQADAAAAAAAAAAAAAAAAAAABIVH/2gAIAQIBAT8QjFP/xAAdEAEAAgMAAwEAAAAAAAAAAAABABEhMUFhcZGx/9oACAEBAAE/EO1oNs0vCqmBb0Wjsspwv9iy1INHaKD6r4wAt+KiBcKa1P/Z'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"automobile automotive car 1386649\"\n        title=\"automobile automotive car 1386649\"\n        src=\"/static/48a561df1c3111652c9955744ae723d2/212bf/automobile-automotive-car-1386649.jpg\"\n        srcset=\"/static/48a561df1c3111652c9955744ae723d2/6aca1/automobile-automotive-car-1386649.jpg 650w,\n/static/48a561df1c3111652c9955744ae723d2/212bf/automobile-automotive-car-1386649.jpg 768w,\n/static/48a561df1c3111652c9955744ae723d2/e0242/automobile-automotive-car-1386649.jpg 5616w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>A simple question has a precise answer that doesn’t create confusion.</p>\n<p>Some examples of questions with simple answers:</p>\n<p><em>“What was your first car’s make and model? (e.g. Ford Taurus)”</em></p>\n<p><em>“What month and day is your anniversary? (e.g. January 2)”</em></p>\n<p>These both make for good security questions because the answers are specific. These questions show consumers how to format their answers in a memorable, simple way.</p>\n<p>But how many security questions should be asked? These questions can also be asked in a way that doesn’t give simple, precise answers:</p>\n<p><em>“What was your first car?”</em></p>\n<p><em>“When is your anniversary?”</em></p>\n<h3 id=\"5-many\" style=\"position:relative;\"><a href=\"#5-many\" aria-label=\"5 many permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>5. Many</h3>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 66.61538461538463%; position: relative; bottom: 0; left: 0; background-image: url('data:image/jpeg;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"arms bonding closeness 1645634\"\n        title=\"arms bonding closeness 1645634\"\n        src=\"/static/67f6633a9615e228b2ee293724cd0bbf/212bf/arms-bonding-closeness-1645634.jpg\"\n        srcset=\"/static/67f6633a9615e228b2ee293724cd0bbf/6aca1/arms-bonding-closeness-1645634.jpg 650w,\n/static/67f6633a9615e228b2ee293724cd0bbf/212bf/arms-bonding-closeness-1645634.jpg 768w,\n/static/67f6633a9615e228b2ee293724cd0bbf/ea502/arms-bonding-closeness-1645634.jpg 7000w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>A good security question should have many potential answers. This makes guessing the answer much more difficult and will also slow down automated or brute-force attempts at gaining access to the consumer’s account.</p>\n<p>An example of a question with many possible answers:</p>\n<p><em>“What is the middle name of your oldest child?”</em></p>\n<p>A question with too few possible answers:</p>\n<p><em>“What is your birth month?”</em></p>\n<h2 id=\"but-wait-is-there-any-such-thing-as-a-good-security-question\" style=\"position:relative;\"><a href=\"#but-wait-is-there-any-such-thing-as-a-good-security-question\" aria-label=\"but wait is there any such thing as a good security question permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>But wait. Is there any such thing as a good security question?</h2>\n<p>By their very nature, even so-called good security questions are vulnerable to hackers because they aren’t random—users are meant to answer them in meaningful, memorable ways. And those answers could be obtained through <a href=\"https://www.loginradius.com/blog/2018/02/phishing-for-identity\">phishing</a>, social engineering, or research.</p>\n<p>There’s a scene in the movie <em><a href=\"https://en.wikipedia.org/wiki/NowYouSeeMe2\">Now You See Me 2</a></em> where a magician tricks his target into giving him the answers to his bank security questions. The magician guesses the answers and his target corrects him with the actual information. It’s a fictional example, but the phishing mechanics are real.</p>\n<p>Many social media memes tap into the answers to common security questions, such as the name of your first pet or the street you grew up on. So by innocently posting your superhero name or rapper name on Facebook, you’re inadvertently sharing important personal information.</p>\n<h2 id=\"security-questions-you-should-avoid\" style=\"position:relative;\"><a href=\"#security-questions-you-should-avoid\" aria-label=\"security questions you should avoid permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Security Questions You Should Avoid</h2>\n<p>When it comes to creating security questions, there are certain types of questions that should be avoided. Questions that have answers that are easily guessed or found online should not be used.</p>\n<p>For example, questions like “What city were you born in?” or “What is your mother’s maiden name?” are too common and can be easily guessed or found online. Additionally, questions that are too personal or sensitive should also be avoided as they may make users uncomfortable or cause them to reveal too much personal information.</p>\n<p>Examples of questions to avoid include “What is your social security number?” or “What is your salary?”</p>\n<h2 id=\"list-of-good-security-questions-one-can-use\" style=\"position:relative;\"><a href=\"#list-of-good-security-questions-one-can-use\" aria-label=\"list of good security questions one can use permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>List of Good Security Questions One Can Use</h2>\n<p>Choosing good security questions can be challenging, but there are certain types of questions that can be effective. </p>\n<p>Good security questions should have answers that are easy for the user to remember but difficult for someone else to guess. For example, questions about personal preferences or experiences can be effective, such as “What is your favorite movie?” or “What was the name of your first pet?” </p>\n<p>Another effective approach is to use questions that require numerical answers, such as “What is your favorite number?” or “How many siblings do you have?”</p>\n<h2 id=\"security-question-best-practices\" style=\"position:relative;\"><a href=\"#security-question-best-practices\" aria-label=\"security question best practices permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Security Question Best Practices</h2>\n<p>When choosing security questions, there are several best practices to keep in mind. First, it is important to choose questions that are easy for the user to remember but difficult for others to guess or find online. </p>\n<p>Additionally, it is important to avoid using questions that are too personal or sensitive. Another best practice is to avoid using the same security questions for multiple accounts, as this can make it easier for hackers to gain access to multiple accounts if they can answer the same security questions. </p>\n<p>Finally, it is important to regularly update security questions and answers, as well as to use two-factor authentication or other security measures to further protect accounts. By following these best practices, users can create strong security questions that help protect their online accounts.</p>\n<h2 id=\"what-authentication-methods-are-good-alternatives-to-security-questions\" style=\"position:relative;\"><a href=\"#what-authentication-methods-are-good-alternatives-to-security-questions\" aria-label=\"what authentication methods are good alternatives to security questions permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What Authentication Methods are Good Alternatives to Security Questions?</h2>\n<p>Passwords and security questions aren’t the only methods for locking down consumer accounts. A good <a href=\"https://www.loginradius.com/blog/2018/03/top-5-business-objectives-that-ciam-solves\">CIAM</a> solution offers several secure alternatives:</p>\n<h3 id=\"1-multi-factor-authentication\" style=\"position:relative;\"><a href=\"#1-multi-factor-authentication\" aria-label=\"1 multi factor authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. Multi-factor authentication</h3>\n<p><a href=\"https://www.loginradius.com/two-factor-authentication/\">Multi-factor authentication</a> is a much more robust and secure method of consumer authentication that relies on two or more ways of verifying the consumer’s identity. Typically, the consumer will be required to present something that they know, something they possess, and/or something they are. Some examples of these different factors are:</p>\n<ul>\n<li>Something they know: A password, pin code, or an answer to a security question.</li>\n<li>Something they possess: Such as a bank card, key, or key fob.</li>\n<li>Something they are: A scanned fingerprint or retina, voice or face recognition.</li>\n</ul>\n<p>As an example, the <a href=\"https://www.mbna.ca/\">MBNA bank</a> recently decided that security questions were not doing enough for them and their consumers to keep their accounts safe. To upgrade their security, they decided to go with two-factor authentication instead of security questions in order to verify their consumer’s identities.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 76.76923076923077%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"MBNA 2factor steps\"\n        title=\"MBNA 2factor steps\"\n        src=\"/static/6ed6e2532ac99de6a02d01ab6874cb06/e5715/MBNA-2factor-steps.png\"\n        srcset=\"/static/6ed6e2532ac99de6a02d01ab6874cb06/a6d36/MBNA-2factor-steps.png 650w,\n/static/6ed6e2532ac99de6a02d01ab6874cb06/e5715/MBNA-2factor-steps.png 768w,\n/static/6ed6e2532ac99de6a02d01ab6874cb06/a4262/MBNA-2factor-steps.png 814w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p><em>Source: MBNA website</em></p>\n<p>In these screenshots, you can see that the transition from security questions to two-factor authentication was fairly seamless for MBNA consumers. They even had the option to choose how often they would be prompted to provide a security code as their second factor.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 87.38461538461539%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"MBNA 2factor login options\"\n        title=\"MBNA 2factor login options\"\n        src=\"/static/a5a4227f8cd2a8f1b1cc606f9fdf66e5/e5715/MBNA-2factor-login-options.png\"\n        srcset=\"/static/a5a4227f8cd2a8f1b1cc606f9fdf66e5/a6d36/MBNA-2factor-login-options.png 650w,\n/static/a5a4227f8cd2a8f1b1cc606f9fdf66e5/e5715/MBNA-2factor-login-options.png 768w,\n/static/a5a4227f8cd2a8f1b1cc606f9fdf66e5/d7542/MBNA-2factor-login-options.png 810w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p><em>Source: MBNA website</em></p>\n<h3 id=\"2-strong-password-rules\" style=\"position:relative;\"><a href=\"#2-strong-password-rules\" aria-label=\"2 strong password rules permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. Strong password rules</h3>\n<p>By requiring your consumers to follow <a href=\"https://www.loginradius.com/resource/infographic/death-of-passwords\">strong password rules</a>, you minimize the risk of hackers brute-forcing their way into their accounts. Lengthy alphanumeric passwords with special and non-repeating characters are much more difficult for an attacker to guess. It also takes significantly longer for brute force programs to break in.</p>\n<h3 id=\"3-passwordless-login\" style=\"position:relative;\"><a href=\"#3-passwordless-login\" aria-label=\"3 passwordless login permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3. Passwordless Login</h3>\n<p><a href=\"https://www.loginradius.com/passwordless-login/\">Passwordless Login</a> takes the password right out of the equation. consumers log in with a key fob, a biometric such as a fingerprint, or a magic link. This login method eliminates the issue of consumers forgetting passwords entirely, and it also makes it impossible for hackers to crack their accounts by brute-forcing.</p>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>If you’re interested in learning why passwords are slowly becoming a thing of the past, download our e-book <a href=\"https://www.loginradius.com/resource/the-death-of-passwords/\">The Death of Passwords</a>. There are better authentication methods than passwords and security questions available for your company—and with support from LoginRadius, you can adopt them quickly and easily.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-loginradius\"\n        title=\"book-a-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"January 31, 2019","updated_date":null,"description":"Security questions will bring to your authentication process an extra layer of certainty. Security problems are an alternative way to recognise your customers when they have forgotten their password, entered too many times the wrong passwords, or attempted to log in from a location or unknown computer.","title":"Best Practices for Choosing Good Security Questions","tags":["data security","password management","cx"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5037593984962405,"src":"/static/f79a91f9673ff866743dad68c04204fe/33aa5/security-questions.jpg","srcSet":"/static/f79a91f9673ff866743dad68c04204fe/f836f/security-questions.jpg 200w,\n/static/f79a91f9673ff866743dad68c04204fe/2244e/security-questions.jpg 400w,\n/static/f79a91f9673ff866743dad68c04204fe/33aa5/security-questions.jpg 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},{"node":{"excerpt":"The Dangers of Bad Password Hygiene Many people use their email addresses and a small set of passwords (or even just one password) to log in…","fields":{"slug":"/identity/how-do-i-know-if-my-email-has-been-leaked-in-a-data-breach/"},"html":"<h3 id=\"the-dangers-of-bad-password-hygiene\" style=\"position:relative;\"><a href=\"#the-dangers-of-bad-password-hygiene\" aria-label=\"the dangers of bad password hygiene permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>The Dangers of Bad Password Hygiene</h3>\n<p>Many people use their email addresses and a small set of passwords (or even just one password) to log in to their online accounts. Unfortunately, this means that any hacker with your email address already has half your login details. Add in numerous password breaches from big-name digital service providers and you have a recipe for disaster.</p>\n<p>Since most people still recycle versions of their passwords, once one of them is released in a data leak, it could mean that all of your online accounts are compromised thanks to <a href=\"https://www.loginradius.com/blog/2018/12/infographic-the-death-of-passwords/\">bad password hygiene</a>.</p>\n<p>Even if you're one of the many people who use a selection of different passwords based on some sort of theme or the rearrangement of certain elements, an attacker could combine knowledge of one password with a brute force attack or social engineering to more easily discover your other passwords.</p>\n<h3 id=\"have-i-been-pwned-good-question\" style=\"position:relative;\"><a href=\"#have-i-been-pwned-good-question\" aria-label=\"have i been pwned good question permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Have I Been Pwned? Good Question!</h3>\n<p>Luckily there's a well-trusted website where anyone can quickly find out if their email address has been compromised in an email leak and which company leaked your data. Have I Been Pwned? (HIBP) was set up by <a href=\"https://twitter.com/troyhunt\">Troy Hunt</a>, a highly respected digital security expert.</p>\n<p>It’s simple to find out if your email address has been compromised. Just go to <a href=\"https://haveibeenpwned.com/\">Have I Been Pwned?</a> to search their database of leaked details.</p>\n<p>HIBP doesn't just include leaked emails, but (as my friend found out) other personal data that has been exposed on the web. What you learn may surprise you—I asked a friend to try a few of their emails, and though all of their passwords were safe, other bits of personal data had been leaked by several marketing data aggregation companies.</p>\n<p>Hackers make use of many types of personal data, combining databases with known passwords when they do leak to make cracking your accounts that much quicker, so any sort of data leak can be risky.</p>\n<p>Check a few of your emails on the site, and chances are that at least one of them will have been involved in a data leak at some point, even if your passwords haven't been released.</p>\n<p>There's also a handy <a href=\"https://haveibeenpwned.com/Passwords\">password checker</a> to find out if a certain password has made its way into the public domain. (Don’t worry, the site uses hashing to keep your password anonymous and doesn’t store it.)</p>\n<p><a href=\"https://www.loginradius.com/resource/pii-data-breach-report/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"Protecting-PII-Data-Breaches-industry-report\"\n        title=\"Protecting-PII-Data-Breaches-industry-report\"\n        src=\"/static/3183d14f6c9662008b848dc5d81d718f/e5715/RP-Data-Breach-Report.png\"\n        srcset=\"/static/3183d14f6c9662008b848dc5d81d718f/a6d36/RP-Data-Breach-Report.png 650w,\n/static/3183d14f6c9662008b848dc5d81d718f/e5715/RP-Data-Breach-Report.png 768w,\n/static/3183d14f6c9662008b848dc5d81d718f/2bef9/RP-Data-Breach-Report.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<p>Out of curiosity I checked the statistics for using \"password\" as a password—it turned out to have been pwned 3,533,661 times, a stark reminder that common sense doesn't always triumph when humans are left to their own devices <a href=\"https://www.loginradius.com/blog/2019/12/worst-passwords-list-2019/\">regarding password strength</a>.</p>\n<p>Subscribing to Have I Been Pwned is free and doing so will alert you to future leaks involving that email address as soon as they become public; adding additional emails is straightforward and doesn't incur any additional fees. As a website owner or administrator, you can also set up alerts that let you know if any email addresses associated with your domain have been compromised.</p>\n<h3 id=\"what-should-i-do-if-i-find-my-address-in-an-email-leak\" style=\"position:relative;\"><a href=\"#what-should-i-do-if-i-find-my-address-in-an-email-leak\" aria-label=\"what should i do if i find my address in an email leak permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What Should I Do if I Find My Address in an Email Leak?</h3>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 54.61538461538461%; position: relative; bottom: 0; left: 0; background-image: url('data:image/jpeg;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"image 2\"\n        title=\"image 2\"\n        src=\"/static/754f60988c3b16d9d07308a4d62eb5e5/212bf/image-2.jpg\"\n        srcset=\"/static/754f60988c3b16d9d07308a4d62eb5e5/6aca1/image-2.jpg 650w,\n/static/754f60988c3b16d9d07308a4d62eb5e5/212bf/image-2.jpg 768w,\n/static/754f60988c3b16d9d07308a4d62eb5e5/64175/image-2.jpg 1025w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<h4 id=\"1-change-your-passwords\" style=\"position:relative;\"><a href=\"#1-change-your-passwords\" aria-label=\"1 change your passwords permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. Change Your Passwords</h4>\n<p>Once you’ve checked your email addresses for breaches, the next step is to change all of your passwords that are related to that email to something strong and complex. Choosing <a href=\"https://www.loginradius.com/blog/2019/10/passwordless-authentication-the-future-of-identity-and-security/\">strong, unique passwords</a> can be difficult for some people – believe it or not, a random string of letters, numbers, and symbols can be just as easy for a machine to crack as any other password.</p>\n<p>XKCD explains it pretty well in <a href=\"https://xkcd.com/936/\">this cartoon</a>; think “pass phrases” of unrelated terms, rather than just a “password.” And no, changing letters for numbers (l33t style) is far too common to make this a safe way to create a cunning password!</p>\n<p>If your password comes up as having been leaked on the password checker, it doesn’t necessarily mean that your personal password has been leaked. Maybe your choice of secret word wasn’t as unique as you thought it was.</p>\n<p>What it does mean is that your password is likely to be in a database along with other confirmed passwords that a cracker program will use first when trying a brute-force attack on your account. Combine a compromised password with a leaked email for an account without <a href=\"https://www.loginradius.com/blog/2019/06/what-is-multi-factor-authentication/\">multi-factor authentication</a>, and you’ve just handed anyone with those two databases full account access.</p>\n<p>And what do we mean by unique? Not unique to you, but unique to each site or login you use. Remember never to use any of your biographical data in your passwords either; many of the data breaches on Have I Been Pwned? are from marketing companies that don’t actually have people’s passwords. What they do leak is a handy, searchable database of lots of your other information (including things like kids’ birthdays, work anniversaries, and so forth).</p>\n<h3 id=\"2-use-a-password-manager\" style=\"position:relative;\"><a href=\"#2-use-a-password-manager\" aria-label=\"2 use a password manager permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. Use a password manager</h3>\n<p>Of course, with all these unique passwords, you may be tempted to write them all down. If you want to keep your new set of passwords safe, though, consider using a password manager (with a strong, unique password that you can remember). There are <a href=\"https://www.techradar.com/uk/news/software/applications/the-best-password-manager-1325845\">a number</a> of options, many of them free, that will help you store your passwords safely.</p>\n<p>LastPass and Dashlane are the two most popular options, and both have points in their favour. If you take your online security seriously, it’s worthwhile paying for a premium version.They’re relatively inexpensive and include important features like syncing across devices and advanced multi-factor authentication. Where possible, you should enable multi-factor authentication on all of your accounts.</p>\n<p><a href=\"https://www.loginradius.com/blog/identity/cybersecurity-attacks-business/\">Leaks of any type of customer data</a> can be both embarrassing and expensive for businesses. An increasing number of countries have steep penalties for any kind of data breach, in some cases attracting unlimited fines or large percentages of an organization's annual turnover (yes turnover, not after-tax profit).</p>\n<p>If you're responsible for your company’s data security or digital platforms, then you're probably acutely aware of this fact.</p>\n<p>LoginRadius has a vested interest in maintaining the highest levels of data protection. </p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-loginradius\"\n        title=\"book-a-demo-loginradius\"\n        src=\"/static/c4fac6b24f15c7b7ba84deec1d1107ac/e5715/BD-Plexicon1-1024x310-1.png\"\n        srcset=\"/static/c4fac6b24f15c7b7ba84deec1d1107ac/a6d36/BD-Plexicon1-1024x310-1.png 650w,\n/static/c4fac6b24f15c7b7ba84deec1d1107ac/e5715/BD-Plexicon1-1024x310-1.png 768w,\n/static/c4fac6b24f15c7b7ba84deec1d1107ac/2bef9/BD-Plexicon1-1024x310-1.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"January 10, 2019","updated_date":null,"description":"To log into their online accounts, many individuals use their email addresses and a short collection of passwords (or even only one password). Sadly, this means that every hacker already has half your login information with your email address. Add in multiple login violations from big-name digital service providers and you have a catastrophe recipe.","title":"How Do I Know If My Email Has Been Leaked in a Data Breach?","tags":["data security","password management","cx"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5037593984962405,"src":"/static/68e50fe405a78a6072d742de4e3eecd7/33aa5/email-breach.jpg","srcSet":"/static/68e50fe405a78a6072d742de4e3eecd7/f836f/email-breach.jpg 200w,\n/static/68e50fe405a78a6072d742de4e3eecd7/2244e/email-breach.jpg 400w,\n/static/68e50fe405a78a6072d742de4e3eecd7/33aa5/email-breach.jpg 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}}]},"markdownRemark":{"excerpt":"Identity is evolving, and developers are at the forefront of this transformation. Every day brings a new learning—adapting to new standards…","fields":{"slug":"/identity/developer-first-identity-provider-loginradius/"},"html":"<p>Identity is evolving, and developers are at the forefront of this transformation. Every day brings a new learning—adapting to new standards and refining approaches to building secure, seamless experiences.</p>\n<p>We’re here to support developers on that journey. We know how important simplicity, efficiency, and well-structured documentation are when working with identity and access management solutions. That’s why we’ve redesigned the <a href=\"https://www.loginradius.com/\">LoginRadius website</a>—to be faster, more intuitive, and developer-first in every way.</p>\n<p>The goal? Having them spend less time searching and more time building.</p>\n<h2 id=\"whats-new-and-improved-on-the-loginradius-website\" style=\"position:relative;\"><a href=\"#whats-new-and-improved-on-the-loginradius-website\" aria-label=\"whats new and improved on the loginradius website permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What’s New and Improved on the LoginRadius Website?</h2>\n<p>LoginRadius’ vision is to give developers a product that simplifies identity management so they can focus on building, deploying, and scaling their applications. To enhance this experience, we’ve spent the last few months redesigning our interface— making navigation more intuitive and reassuring that essential resources are easily accessible.</p>\n<p>Here’s a closer look at what’s new and why it’s important:</p>\n<h3 id=\"a-developer-friendly-dark-theme\" style=\"position:relative;\"><a href=\"#a-developer-friendly-dark-theme\" aria-label=\"a developer friendly dark theme permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>A Developer-Friendly Dark Theme</h3>\n<p><img src=\"/f46881583c7518a93bb24e94c32320de/a-developer-friendly-dark-theme.webp\" alt=\"This image shows how LoginRadius offers several authentication methods like traditional login, social login, passwordless login, passkeys and more in a dark mode.\">    </p>\n<p>Developers spend long hours working in dark-themed IDEs and terminals, so we’ve designed the LoginRadius experience to be developer-friendly and align with that preference.</p>\n<p>The new dark mode reduces eye strain, enhances readability, and provides a seamless transition between a coding environment and our platform. Our new design features a clean, modern aesthetic with a consistent color scheme and Barlow typography, ensuring better readability. High-quality graphics and icons are thoughtfully placed to enhance the content without adding visual clutter.</p>\n<p>So, whether you’re navigating our API docs or configuring authentication into your system, our improved interface will make those extended development hours more comfortable and efficient.</p>\n<h3 id=\"clear-categorization-for-loginradius-capabilities\" style=\"position:relative;\"><a href=\"#clear-categorization-for-loginradius-capabilities\" aria-label=\"clear categorization for loginradius capabilities permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Clear Categorization for LoginRadius Capabilities</h3>\n<p><img src=\"/e5358b82be414940f3fb146013845933/capabilities.webp\" alt=\"This image shows a breakdown of all the LoginRadius CIAM capabilities, including authentication, security, UX, scalability and multi-brand management.\"></p>\n<p>We’ve restructured our website to provide a straightforward breakdown of our customer identity and access management platform capabilities, helping you quickly find what you need:</p>\n<ul>\n<li>Authentication: Easily understand <a href=\"https://www.loginradius.com/blog/identity/authentication-option-for-your-product/\">how to choose the right login method</a>, from traditional passwords and OTPs to social login, federated SSO, and passkeys with few lines of code.</li>\n<li>Security: Implement no-code security features like bot detection, IP throttling, breached password alerts, DDoS protection, and adaptive MFA to safeguard user accounts.</li>\n<li>User Experience: Leverage AI builder, hosted pages, and drag-and-drop workflows to create smooth, branded sign-up and login experiences.</li>\n<li>High Performance &#x26; Scalability: Confidently scale with sub-100ms API response times, 100% uptime, 240K+ RPS, and 28+ global data center regions.</li>\n<li>Multi-Brand Management: Efficiently manage multiple identity apps, choosing isolated or shared data stores based on your brand’s unique needs.</li>\n</ul>\n<p>This structured layout ensures you can quickly understand each capability and how it integrates into your identity ecosystem.</p>\n<h3 id=\"developer-first-navigation\" style=\"position:relative;\"><a href=\"#developer-first-navigation\" aria-label=\"developer first navigation permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Developer-First Navigation</h3>\n<p><img src=\"/a8c155c2b6faf3d5f4b4de4e2b14d763/developers-menu.webp\" alt=\"This image shows the LoginRadius menu bar, highlighting the developer dropdown.\">   </p>\n<p>We’ve been analyzing developer workflows to identify how you access key resources. That’s why we redesigned our navigation with one goal in mind: to reduce clicks and make essential resources readily available.</p>\n<p>The new LoginRadius structure puts APIs, SDKs, and integration guides right at the menu bar under the Developers dropdown so you can get started faster. Our Products, Solutions, and Customer Services are also clearly categorized, helping development teams quickly find the right tools and make informed decisions.</p>\n<h3 id=\"quick-understanding-of-integration-benefits\" style=\"position:relative;\"><a href=\"#quick-understanding-of-integration-benefits\" aria-label=\"quick understanding of integration benefits permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Quick Understanding of Integration Benefits</h3>\n<p><img src=\"/b2f9a964a2da0ea83e2f8596b833bba7/we-support-your-tech-stack.webp\" alt=\"This image shows a list of popular programming languages and frameworks offered by LoginRadius.\"></p>\n<p>Developers now have a clear view of the tech stack available with LoginRadius, designed to support diverse business needs.</p>\n<p>Our platform offers pre-built SDKs for Node.js, Python, Java, and more, making CIAM integration seamless across popular programming languages and frameworks.</p>\n<h2 id=\"over-to-you-now\" style=\"position:relative;\"><a href=\"#over-to-you-now\" aria-label=\"over to you now permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Over to You Now!</h2>\n<p>Check out our <a href=\"https://www.loginradius.com/\">revamped LoginRadius website</a> and see how the improved experience makes it easier to build, scale, and secure your applications.</p>\n<p>Do not forget to explore the improved navigation and API documentation, and get started with our free trial today. We’re excited to see what you’ll build with LoginRadius!</p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"February 21, 2025","updated_date":null,"description":"LoginRadius’ vision is to give developers a product that simplifies identity management so they can focus on building, deploying, and scaling their applications. To enhance this experience, we’ve redesigned our website interface, making navigation more intuitive and reassuring that essential resources are easily accessible.","title":"Revamped & Ready: Introducing the New Developer-First LoginRadius Website","tags":["Developer tools","API","Identity Management","User Authentication"],"pinned":true,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.7857142857142858,"src":"/static/80b4e4fbe176a10a327d273504607f32/58556/hero-section.webp","srcSet":"/static/80b4e4fbe176a10a327d273504607f32/61e93/hero-section.webp 200w,\n/static/80b4e4fbe176a10a327d273504607f32/1f5c5/hero-section.webp 400w,\n/static/80b4e4fbe176a10a327d273504607f32/58556/hero-section.webp 800w,\n/static/80b4e4fbe176a10a327d273504607f32/99238/hero-section.webp 1200w,\n/static/80b4e4fbe176a10a327d273504607f32/7c22d/hero-section.webp 1600w,\n/static/80b4e4fbe176a10a327d273504607f32/1258b/hero-section.webp 2732w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},"pageContext":{"limit":6,"skip":390,"currentPage":66,"type":"//identity//","numPages":70,"pinned":"ee8a4479-3471-53b1-bf62-d0d8dc3faaeb"}},"staticQueryHashes":["1171199041","1384082988","2100481360","23180105","528864852"]}