{"componentChunkName":"component---src-templates-blog-list-template-js","path":"/identity/69","result":{"data":{"allMarkdownRemark":{"edges":[{"node":{"excerpt":"Improving quality of life for citizens is at the heart of many municipal digital initiatives. Even so, city leaders often choose to focus on…","fields":{"slug":"/identity/municipals-investing-citizen-engagement/"},"html":"<p>Improving quality of life for citizens is at the heart of many municipal digital initiatives. Even so, city leaders often choose to focus on improving their technology infrastructure without considering citizen engagement.</p>\n<p>A successful digital transformation can have many <a href=\"https://www.loginradius.com/resource/top-5-ways-to-improve-citizen-engagement-2/\">benefits for both citizens and municipalities</a>. But if cities do not put the energy into improving their citizen engagement, they will struggle to truly transform their communities.</p>\n<p>By investing in a well-designed and implemented citizen-centric solution, municipalities can achieve the following benefits.</p>\n<h3 id=\"1-increase-citizen-satisfaction-with-government-performance\" style=\"position:relative;\"><a href=\"#1-increase-citizen-satisfaction-with-government-performance\" aria-label=\"1 increase citizen satisfaction with government performance permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. Increase citizen satisfaction with government performance</h3>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 59.38461538461538%; position: relative; bottom: 0; left: 0; background-image: url('data:image/jpeg;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"collaboration colleagues community 2\"\n        title=\"collaboration colleagues community 2\"\n        src=\"/static/011dca7a3ebc224ea3322c2026a6e594/212bf/collaboration-colleagues-community-2.jpg\"\n        srcset=\"/static/011dca7a3ebc224ea3322c2026a6e594/6aca1/collaboration-colleagues-community-2.jpg 650w,\n/static/011dca7a3ebc224ea3322c2026a6e594/212bf/collaboration-colleagues-community-2.jpg 768w,\n/static/011dca7a3ebc224ea3322c2026a6e594/72e01/collaboration-colleagues-community-2.jpg 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>Citizens want to engage with their local government. They want to be able to share their views and access channels to participate in the decisions of government, connect with representatives, and be assured that their input has meaning and relevance.</p>\n<p>Citizens have been very vocal about these methods of engagement, so it should come as no surprise that communities are happiest when their citizens feel well-informed about the municipality's business and have opportunities to be part of policy formation.</p>\n<h3 id=\"2-enhance-citizen-trust-in-civic-institutions\" style=\"position:relative;\"><a href=\"#2-enhance-citizen-trust-in-civic-institutions\" aria-label=\"2 enhance citizen trust in civic institutions permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. Enhance citizen trust in civic institutions</h3>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 62.46153846153847%; position: relative; bottom: 0; left: 0; background-image: url('data:image/jpeg;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"berlin building business 3\"\n        title=\"berlin building business 3\"\n        src=\"/static/7794be27a1c56967117b85353278ad4c/212bf/berlin-building-business-3.jpg\"\n        srcset=\"/static/7794be27a1c56967117b85353278ad4c/6aca1/berlin-building-business-3.jpg 650w,\n/static/7794be27a1c56967117b85353278ad4c/212bf/berlin-building-business-3.jpg 768w,\n/static/7794be27a1c56967117b85353278ad4c/72e01/berlin-building-business-3.jpg 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>The public has been demanding more transparency and accountability from government for years. These demands are prompting municipalities to change how they engage with the public.</p>\n<p>Especially in the era of media and \"fake news,\" it has never been more important for municipalities to have a direct way of engaging their citizens. Organizations need to ensure that the facts are correctly communicated, but also need to listen carefully to the public's voices.</p>\n<p>Municipalities need to have a direct line of engagement between themselves and the community instead of relying on the media to connect them. Otherwise, they will struggle to build trust. The more involved and accurately informed a community is, the more likely citizens will trust the institution that is engaging with them. </p>\n<h3 id=\"3-get-the-most-out-of-your-digital-solutions-which-saves-an-enormous-amount-of-time-and-money\" style=\"position:relative;\"><a href=\"#3-get-the-most-out-of-your-digital-solutions-which-saves-an-enormous-amount-of-time-and-money\" aria-label=\"3 get the most out of your digital solutions which saves an enormous amount of time and money permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3. Get the most out of your digital solutions, which saves an enormous amount of time and money</h3>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 59.53846153846154%; position: relative; bottom: 0; left: 0; background-image: url('data:image/jpeg;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"advice advise advisor 4\"\n        title=\"advice advise advisor 4\"\n        src=\"/static/db6c3702f8cd7e87f43e1603883aa6b4/212bf/advice-advise-advisor-4.jpg\"\n        srcset=\"/static/db6c3702f8cd7e87f43e1603883aa6b4/6aca1/advice-advise-advisor-4.jpg 650w,\n/static/db6c3702f8cd7e87f43e1603883aa6b4/212bf/advice-advise-advisor-4.jpg 768w,\n/static/db6c3702f8cd7e87f43e1603883aa6b4/72e01/advice-advise-advisor-4.jpg 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>Engaging the community to keep them better informed about what is going on will only help in the long run. For example, instead of spending too much time and resources on projects that are only going to get protested, why not get community input from the beginning? If citizens are more involved in the process, municipalities can reduce lengthy and expensive legal appeals as well.</p>\n<h2 id=\"how-to-improve-citizen-engagement\" style=\"position:relative;\"><a href=\"#how-to-improve-citizen-engagement\" aria-label=\"how to improve citizen engagement permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How to Improve Citizen Engagement</h2>\n<p>Many municipalities are now undergoing <a href=\"https://www.loginradius.com/blog/identity/customer-experience-driving-digital-transformations/\">digital transformations</a> in order to improve transparency and communication. After all, with a more sophisticated digital ecosystem, you will be able to simplify how you interact with your citizens.</p>\n<p>Undergoing a digital transformation, however, is just one of the much-needed steps. In order to truly engage your citizens, you need to know who they are. To learn who they are, you have to incorporate digital identity into your transformation. </p>\n<p>How does digital identity help with engagement? In our new e-book, we have listed the top 5 ways to improve your citizen engagement, which include creating a seamless digital service by unifying citizen services and identity, as well as improving your privacy and security efforts. You can check out the new e-book <a href=\"https://www.loginradius.com/resource/top-5-ways-to-improve-citizen-engagement-2/\">here</a>. <span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 647px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 80.06182380216383%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"Ebook thumb\"\n        title=\"Ebook thumb\"\n        src=\"/static/5166427fe9fb6716cbe55193392872c8/ca12d/Ebook-thumb.png\"\n        srcset=\"/static/5166427fe9fb6716cbe55193392872c8/ca12d/Ebook-thumb.png 647w\"\n        sizes=\"(max-width: 647px) 100vw, 647px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"June 18, 2018","updated_date":null,"description":"Municipalities can achieve many benefits by investing in a well-designed and implemented citizen-centered approach, while enhancing the quality of life for people is at the core of many digital municipal initiatives.","title":"Why Municipalities Are Investing in Citizen Engagement","tags":["public-sector"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.4705882352941178,"src":"/static/874659827d8ecb2c62db8aa49308eae7/14b42/collaboration-colleagues-community-398532-1.jpg","srcSet":"/static/874659827d8ecb2c62db8aa49308eae7/f836f/collaboration-colleagues-community-398532-1.jpg 200w,\n/static/874659827d8ecb2c62db8aa49308eae7/2244e/collaboration-colleagues-community-398532-1.jpg 400w,\n/static/874659827d8ecb2c62db8aa49308eae7/14b42/collaboration-colleagues-community-398532-1.jpg 800w,\n/static/874659827d8ecb2c62db8aa49308eae7/47498/collaboration-colleagues-community-398532-1.jpg 1200w,\n/static/874659827d8ecb2c62db8aa49308eae7/37d86/collaboration-colleagues-community-398532-1.jpg 1500w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},{"node":{"excerpt":"Everywhere you look, companies are adopting digital transformations in the hopes of changing their business models and competing in the…","fields":{"slug":"/identity/customer-experience-driving-digital-transformations/"},"html":"<p>Everywhere you look, companies are adopting digital transformations in the hopes of changing their business models and competing in the reality of the new market.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 65.84615384615384%; position: relative; bottom: 0; left: 0; background-image: url('data:image/jpeg;base64,/9j/2wBDABALDA4MChAODQ4SERATGCgaGBYWGDEjJR0oOjM9PDkzODdASFxOQERXRTc4UG1RV19iZ2hnPk1xeXBkeFxlZ2P/2wBDARESEhgVGC8aGi9jQjhCY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2P/wgARCAANABQDASIAAhEBAxEB/8QAFwAAAwEAAAAAAAAAAAAAAAAAAAMEBf/EABYBAQEBAAAAAAAAAAAAAAAAAAIDBP/aAAwDAQACEAMQAAABbFrKzqQsKH//xAAaEAABBQEAAAAAAAAAAAAAAAACAAEDERMi/9oACAEBAAEFAowZHd5LXspWBbU//8QAFhEBAQEAAAAAAAAAAAAAAAAAAQAT/9oACAEDAQE/AULMb//EABcRAAMBAAAAAAAAAAAAAAAAAAACERP/2gAIAQIBAT8BW2mh/8QAHBAAAgICAwAAAAAAAAAAAAAAAAECERIyQnHh/9oACAEBAAY/ArcKfY0o8jwxxNEan//EABwQAAMAAQUAAAAAAAAAAAAAAAABESExQWFxkf/aAAgBAQABPyGZQ7u4R9ZMqRyMsbujVRlo7El9P//aAAwDAQACAAMAAAAQPA//xAAXEQADAQAAAAAAAAAAAAAAAAAAAREx/9oACAEDAQE/EIJglKj/xAAXEQEBAQEAAAAAAAAAAAAAAAABEQAx/9oACAECAQE/EJrq5Qzf/8QAGhABAQADAQEAAAAAAAAAAAAAAREAITHBYf/aAAgBAQABPxB3KEVEe3mB0YAtXw3moNU01tfkwM5bSfGEzlls5hkKtd9uf//Z'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"Digital Transformation\"\n        title=\"Digital Transformation\"\n        src=\"/static/3f7e1f76c1021be73ec2d9c17ca30f38/212bf/linkedin-sales-navigator-1.jpg\"\n        srcset=\"/static/3f7e1f76c1021be73ec2d9c17ca30f38/6aca1/linkedin-sales-navigator-1.jpg 650w,\n/static/3f7e1f76c1021be73ec2d9c17ca30f38/212bf/linkedin-sales-navigator-1.jpg 768w,\n/static/3f7e1f76c1021be73ec2d9c17ca30f38/72e01/linkedin-sales-navigator-1.jpg 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>What’s interesting in this new trend, is that the change is being driven by the customer.</p>\n<p>Today, customers expect relevant content that is based on their interests and habits. In order to deliver this connected customer experience, companies are having to embrace these digital transformations.</p>\n<h2 id=\"understanding-the-modern-customer\" style=\"position:relative;\"><a href=\"#understanding-the-modern-customer\" aria-label=\"understanding the modern customer permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Understanding the Modern Customer</h2>\n<p>Digital technology has transformed <a href=\"https://www.loginradius.com/resource/guide-to-modern-customer-identity/\">customers expectations</a>.</p>\n<p>It’s a big statement, but mobile devices, apps, machine learning, automation and more allow customers to get what they want, when they want it.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 66.61538461538463%; position: relative; bottom: 0; left: 0; background-image: url('data:image/jpeg;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"nordwood themes\"\n        title=\"nordwood themes\"\n        src=\"/static/513eb2808726833f72d684821b1c1b8b/212bf/nordwood-themes.jpg\"\n        srcset=\"/static/513eb2808726833f72d684821b1c1b8b/6aca1/nordwood-themes.jpg 650w,\n/static/513eb2808726833f72d684821b1c1b8b/212bf/nordwood-themes.jpg 768w,\n/static/513eb2808726833f72d684821b1c1b8b/27023/nordwood-themes.jpg 5032w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span>These new digital technologies have caused a shift in customer expectations, which has resulted in a new modern consumer - they are constantly connected, app-natives, and are very aware of what they can do with technology. </p>\n<p>Because of the opportunities that are available with modern technologies, customers are now judging companies on their digital customer experience first. Businesses are now having to rethink how they interact with their users, and are turning to these digital initiatives to help them transform how they engage their customers.</p>\n<h2 id=\"getting-started-with-a-digital-transformation\" style=\"position:relative;\"><a href=\"#getting-started-with-a-digital-transformation\" aria-label=\"getting started with a digital transformation permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Getting Started with a Digital Transformation</h2>\n<p>With a digital transformation, organizations are able to understand the modern customer, engage them, and deliver on the expected multi-channel experience. Here’s a few ways to get your business started with a digital transformation.</p>\n<h4 id=\"1-a-flexible-cloud-based-solution\" style=\"position:relative;\"><a href=\"#1-a-flexible-cloud-based-solution\" aria-label=\"1 a flexible cloud based solution permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. A Flexible, Cloud-Based Solution</h4>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 66.46153846153847%; position: relative; bottom: 0; left: 0; background-image: url('data:image/jpeg;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"cloud-based solution\"\n        title=\"cloud-based solution\"\n        src=\"/static/710b9082f75e8889e85dbd5704e730e7/212bf/rawpixel-369788-unsplash.jpg\"\n        srcset=\"/static/710b9082f75e8889e85dbd5704e730e7/6aca1/rawpixel-369788-unsplash.jpg 650w,\n/static/710b9082f75e8889e85dbd5704e730e7/212bf/rawpixel-369788-unsplash.jpg 768w,\n/static/710b9082f75e8889e85dbd5704e730e7/1a277/rawpixel-369788-unsplash.jpg 5615w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>Having the right technology to support your digital initiatives it essential. Many companies are recognizing this, and seeing the advantages to having a customer identity solution at the foundation of their digital transformation.</p>\n<p>With identity at the core, boosting your customers digital experience, gaining user insight, and improving security will be a sitch. What’s more, new solutions are cloud-based, which enables you to easily meet the demands of your customers.</p>\n<p>For example, with a customer identity solution, you can gather <a href=\"https://www.loginradius.com/data-management-and-governance/\">first-party customer data</a> and have it flow seamless with third-party solutions (i.e. CRM, DPM) in real-time. The data’s security is managed for you in centralized databases, which also enables you to build unified customer profiles. This will give you a full 360-degree view of your customer. You will be able to gain insights about how, when and why your customers do business with you, so you can provide a better digital experience.</p>\n<h4 id=\"2-personalizing-your-customers-digital-experience\" style=\"position:relative;\"><a href=\"#2-personalizing-your-customers-digital-experience\" aria-label=\"2 personalizing your customers digital experience permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. Personalizing your Customers Digital Experience</h4>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 66.61538461538463%; position: relative; bottom: 0; left: 0; background-image: url('data:image/jpeg;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"personalizing customer experience\"\n        title=\"personalizing customer experience\"\n        src=\"/static/16e506553b0b159f9e2804476ce6fae9/212bf/john-schnobrich-520023-unsplash-1.jpg\"\n        srcset=\"/static/16e506553b0b159f9e2804476ce6fae9/6aca1/john-schnobrich-520023-unsplash-1.jpg 650w,\n/static/16e506553b0b159f9e2804476ce6fae9/212bf/john-schnobrich-520023-unsplash-1.jpg 768w,\n/static/16e506553b0b159f9e2804476ce6fae9/500a0/john-schnobrich-520023-unsplash-1.jpg 4831w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>Modern customers that use your digital properties are looking for relevant content that is based on their interests and habits. They no longer have patients for ads that are not directly targeted towards them. This is why gathering customer data is so important in today’s market. With it, you can personalize the digital experience and paid advertisement towards the individual user.</p>\n<p>A customer identity solution allows you to track your users entire digital journey, seamlessly integrate that data with your current marketing digital tools, and then analyze the information in real-time. </p>\n<p>You’ll be able to make your advertising more effective as it will improve targeting and make the customer experience more valuable by personalizing it.</p>\n<p>But unfortunately, utilizing your customers data and personalizing the digital experience isn’t quite enough. To truly bring value to your current <a href=\"https://www.loginradius.com/\">marketing stack</a>, and engage your customers, you need to offer your users a connected multi-channel experience.</p>\n<h4 id=\"3-providing-a-seamless-multi-channel-experience\" style=\"position:relative;\"><a href=\"#3-providing-a-seamless-multi-channel-experience\" aria-label=\"3 providing a seamless multi channel experience permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3. Providing a Seamless Multi-channel Experience</h4>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 68.92307692307692%; position: relative; bottom: 0; left: 0; background-image: url('data:image/jpeg;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"multi-channel experience\"\n        title=\"multi-channel experience\"\n        src=\"/static/08092890e198050c4d2ee89cb4189ebf/212bf/rawpixel-660359-unsplash.jpg\"\n        srcset=\"/static/08092890e198050c4d2ee89cb4189ebf/6aca1/rawpixel-660359-unsplash.jpg 650w,\n/static/08092890e198050c4d2ee89cb4189ebf/212bf/rawpixel-660359-unsplash.jpg 768w,\n/static/08092890e198050c4d2ee89cb4189ebf/12609/rawpixel-660359-unsplash.jpg 3000w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>Today’s customers are not tied down to a single channel. They browse in-store, shop online, share feedback through mobile apps and ask questions to your support team on social media.</p>\n<p>To truly create a seamless <a href=\"https://www.loginradius.com/connected-customer-experience/\">multi-channel experience</a> for your users, your customers need to be able to access any of your digital properties without having to re-authenticating every time.</p>\n<p>A customer identity solution can help you enable <a href=\"https://www.loginradius.com/single-sign-on-overview/\">Single-Sign On (SSO)</a>, which allows your customers to create and use a single identity across your digital properties. The same identity can be used to log into multiple web and mobile properties so your customers won’t have to register separately for each.</p>\n<p>Tying all these interactions together allows you to create a <a href=\"https://www.loginradius.com/unify-customer-profiles/\">single profile</a> for each of your customers. This will help you eliminate identity silos, and enable you to get a single view of your customers. Building user insight, segmenting, targeting, and optimizing offers for specific customers will be a breeze.</p>\n<h2 id=\"the-next-steps\" style=\"position:relative;\"><a href=\"#the-next-steps\" aria-label=\"the next steps permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>The Next Steps</h2>\n<p>Accomplishing these three steps is a great start at improving your customers digital experience. If you get identity right from the start, you will really be able to enjoy the benefits of a digital transformation in terms of scalability, availability, and flexibility.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 647px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 128.28438948995364%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"Customer Identity - The Core of Digital Transformation\"\n        title=\"Customer Identity - The Core of Digital Transformation\"\n        src=\"/static/e78424e4eace76d9bfaddea3565a5bde/ca12d/guide-to-modern-cover.png\"\n        srcset=\"/static/e78424e4eace76d9bfaddea3565a5bde/ca12d/guide-to-modern-cover.png 647w\"\n        sizes=\"(max-width: 647px) 100vw, 647px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span>(<a href=\"https://www.loginradius.com/resource/customer-identity-the-core-of-digital-transformation/\">https://www.loginradius.com/resource/customer-identity-the-core-of-digital-transformation/</a>)</p>\n<p>By utilizing a customer identity solution, you will be able to build a great foundation to your digital transformation.</p>\n<p>But these three steps are just the start. We’ve created a free ebook where you can learn about all the benefits a customer identity solution can have for your business. Not only will you learn how to improve customer engagement and boost the value of your existing digital tools, but you will also be able to secure your customers identity to build trust, and leverage identity for growth.</p>\n<p>You can check out the <a href=\"https://www.loginradius.com/resource/guide-to-modern-customer-identity/\">ebook here</a>.</p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"May 18, 2018","updated_date":null,"description":"Customers today demand meaningful content which is based on their preferences and behaviours. Companies have to accept these digital transformations to offer this connected customer experience.","title":"Customer Experience is Driving Digital Transformation","tags":["digital transformation","modern customer identity","cx"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.3333333333333333,"src":"/static/c8f96905e5d8d9081f5fb091466f640b/14b42/linkedin-sales-navigator-402831-unsplash1-1.jpg","srcSet":"/static/c8f96905e5d8d9081f5fb091466f640b/f836f/linkedin-sales-navigator-402831-unsplash1-1.jpg 200w,\n/static/c8f96905e5d8d9081f5fb091466f640b/2244e/linkedin-sales-navigator-402831-unsplash1-1.jpg 400w,\n/static/c8f96905e5d8d9081f5fb091466f640b/14b42/linkedin-sales-navigator-402831-unsplash1-1.jpg 800w,\n/static/c8f96905e5d8d9081f5fb091466f640b/16310/linkedin-sales-navigator-402831-unsplash1-1.jpg 1024w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},{"node":{"excerpt":"Despite years of battling, and a massive change in the way American's use debit and credit cards, the rate of identity fraud has soared in…","fields":{"slug":"/identity/identity-fraud-hits-time-high-2017/"},"html":"<p>Despite years of battling, and a massive change in the way American's use debit and credit cards, the rate of identity fraud has soared in 2017.</p>\n<p>According to Javelin Strategy &#x26; Research's annual <a href=\"https://www.javelinstrategy.com/coverage-area/2018-identity-fraud-fraud-enters-new-era-complexity\">Identity Fraud Study</a>, the number of identity fraud victims in the United States has increased by 8%.</p>\n<h3 id=\"key-highlights-from-the-study\" style=\"position:relative;\"><a href=\"#key-highlights-from-the-study\" aria-label=\"key highlights from the study permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Key Highlights from the Study</h3>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 399.8461538461538%; position: relative; bottom: 0; left: 0; background-image: url('data:image/jpeg;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"infographic Final\"\n        title=\"infographic Final\"\n        src=\"/static/11b0b5d01c8069876bf81c96c26a4261/212bf/infographic-Final.jpg\"\n        srcset=\"/static/11b0b5d01c8069876bf81c96c26a4261/6aca1/infographic-Final.jpg 650w,\n/static/11b0b5d01c8069876bf81c96c26a4261/212bf/infographic-Final.jpg 768w,\n/static/11b0b5d01c8069876bf81c96c26a4261/7aec6/infographic-Final.jpg 2509w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p><a href=\"https://www.loginradius.com/customer-identity/\">Learn more</a> about how LoginRadius can help secure your customers data.</p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"February 20, 2018","updated_date":null,"description":"The rate of identity theft increased in 2017, amid years of fighting and a major shift in the way American debit and credit cards are used.","title":"Identity Fraud Hits All-Time High in 2017","tags":["security"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.408450704225352,"src":"/static/6cc2100b8314a62a057fdbf48b38a80d/c3e3a/identity-fraud-hits-time-high-2017.jpg","srcSet":"/static/6cc2100b8314a62a057fdbf48b38a80d/f836f/identity-fraud-hits-time-high-2017.jpg 200w,\n/static/6cc2100b8314a62a057fdbf48b38a80d/2244e/identity-fraud-hits-time-high-2017.jpg 400w,\n/static/6cc2100b8314a62a057fdbf48b38a80d/c3e3a/identity-fraud-hits-time-high-2017.jpg 769w","sizes":"(max-width: 769px) 100vw, 769px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},{"node":{"excerpt":"Phishing attacks are on the rise, and they are unfortunately more sophisticated than ever. In the past, identity theft could be seen as a…","fields":{"slug":"/identity/phishing-for-identity/"},"html":"<p>Phishing attacks are on the rise, and they are unfortunately more sophisticated than ever.</p>\n<p>In the past, identity theft could be seen as a common subject in blockbusters or police drama TV series. Today, however, phishing is a reality that could affect anyone. </p>\n<p>So why are these types of attacks on the rise? After all, phishing is not exactly a new concept. </p>\n<p>The reason is they are incredibly profitable for the attackers.</p>\n<p><strong>The average data breach costs organizations <a href=\"https://www.ibm.com/security/data-breach\">$3.92 million</a>.</strong></p>\n<p>A Phishing attack can be a death blow for businesses that don't take the necessary precautions. Not only is the top-line affected, but the brand's image and trust can be obliterated if news of a data breach reaches the public. </p>\n<ul>\n<li>The healthcare industry saw the most breaches accounting for <a href=\"https://www.ibm.com/security/data-breach\">USD 7.13 million in 2020</a>.</li>\n<li>Incidents involving payment and invoice <a href=\"https://info.abnormalsecurity.com/Q2-2020-Quarterly-BEC-Report.html\">fraud increased by 112%</a> between Q1 2020 and Q2 2020.</li>\n<li><a href=\"https://enterprise.verizon.com/en-gb/resources/reports/dbir/\">96% of phishing attacks</a> arrive by email, 3% are carried out through malicious websites, and just 1% via phone.</li>\n<li>86% of breaches were financially motivated in 2020.</li>\n<li>43% of breaches were attacks on web applications in 2020. That's more than double the results from 2019.</li>\n</ul>\n<h2 id=\"what-is-phishing\" style=\"position:relative;\"><a href=\"#what-is-phishing\" aria-label=\"what is phishing permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is Phishing</h2>\n<p>Let's jump back to the beginning and answer the obvious question: What is a Phishing attack? </p>\n<p>A Phishing attack or scam is when an attacker sends an email pretending to be someone (for example, the CEO of an organization) or something he's not (for example, poses as Google). The goal is to extract sensitive information out of the target.</p>\n<p>Essentially, the <a href=\"https://www.loginradius.com/blog/identity/2019/01/how-do-i-know-if-my-email-has-been-leaked-in-a-data-breach/\">attacker attempts to create fear</a>, curiosity, or a sense of urgency. When the target is prompted to open an attachment or fill in their sensitive information (i.e., username, password, or credit card number), they are likely to give in.</p>\n<p>A few examples of phishing attacks include:</p>\n<ul>\n<li>Emails that appear to come from a legitimate source, like Amazon customer support or your bank.</li>\n<li>Phone calls that force victims to act immediately. </li>\n<li>Emails that include links to fake websites and the victim <a href=\"https://www.loginradius.com/blog/identity/2019/09/prevent-credential-stuffing-attacks/\">enter their credentials</a>.</li>\n<li>Emails appear to come from the victim's organization's human resources department and ask to update your details or install a new app on their system. </li>\n<li>Online advertisements that force the victim to click on a valid-looking link that redirects to a malicious website.</li>\n</ul>\n<h2 id=\"7-ways-to-detect-a-phishing-email---heres-how\" style=\"position:relative;\"><a href=\"#7-ways-to-detect-a-phishing-email---heres-how\" aria-label=\"7 ways to detect a phishing email   heres how permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>7 Ways to Detect a Phishing Email - Here's How</h2>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 66.15384615384615%; position: relative; bottom: 0; left: 0; background-image: url('data:image/jpeg;base64,/9j/2wBDABALDA4MChAODQ4SERATGCgaGBYWGDEjJR0oOjM9PDkzODdASFxOQERXRTc4UG1RV19iZ2hnPk1xeXBkeFxlZ2P/2wBDARESEhgVGC8aGi9jQjhCY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2P/wgARCAANABQDASIAAhEBAxEB/8QAFgABAQEAAAAAAAAAAAAAAAAAAwAE/8QAFgEBAQEAAAAAAAAAAAAAAAAAAAEC/9oADAMBAAIQAxAAAAGDEY0dqf/EABoQAAIDAQEAAAAAAAAAAAAAAAECAAMREgT/2gAIAQEAAQUCrs7PqKmKr4bWYE7O2n//xAAVEQEBAAAAAAAAAAAAAAAAAAAAIf/aAAgBAwEBPwFX/8QAFREBAQAAAAAAAAAAAAAAAAAAACH/2gAIAQIBAT8BR//EABwQAAEEAwEAAAAAAAAAAAAAAAEAEBFBAhIhMf/aAAgBAQAGPwIY8AFIQNWE03q//8QAGhABAAIDAQAAAAAAAAAAAAAAAQAhETFhQf/aAAgBAQABPyFSPE1yS5oCuzQKEzCK4GILZ3z/2gAMAwEAAgADAAAAEGgP/8QAFREBAQAAAAAAAAAAAAAAAAAAARD/2gAIAQMBAT8QCP/EABURAQEAAAAAAAAAAAAAAAAAAAEQ/9oACAECAQE/EFn/xAAaEAEBAAMBAQAAAAAAAAAAAAABEQAhMWFB/9oACAEBAAE/EIXX1inD3D2wo197pdcxBXHCzN0icIpbvByyi993gQAAEM//2Q=='); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"ways-detect-phishing-email\"\n        title=\"ways-detect-phishing-email\"\n        src=\"/static/f13c531c014027fd6922bc39d0b5464b/212bf/ways-detect-phishing-email.jpg\"\n        srcset=\"/static/f13c531c014027fd6922bc39d0b5464b/6aca1/ways-detect-phishing-email.jpg 650w,\n/static/f13c531c014027fd6922bc39d0b5464b/212bf/ways-detect-phishing-email.jpg 768w,\n/static/f13c531c014027fd6922bc39d0b5464b/72e01/ways-detect-phishing-email.jpg 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<h3 id=\"1-the-email-is-sent-from-a-public-domain\" style=\"position:relative;\"><a href=\"#1-the-email-is-sent-from-a-public-domain\" aria-label=\"1 the email is sent from a public domain permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. The email is sent from a public domain.</h3>\n<p>No legitimate organization will send you an email from an address ending with '@gmail.com.' No! Not even Google. </p>\n<p>Almost all organizations have their own email domain and company accounts from where they send out official messages. </p>\n<p>Therefore, before opening an email, ensure that the domain name (what follows after @) matches the sender.</p>\n<p>There is a catch, though. Hackers may try to mimic a real email. For example, if an address looks like 'paypal@notice-access-273.com', that is a red flag. </p>\n<p>A genuine email from PayPal will have PayPal in the domain name, i.e., after the @ symbol.</p>\n<h3 id=\"2-the-email-requests-your-sensitive-information\" style=\"position:relative;\"><a href=\"#2-the-email-requests-your-sensitive-information\" aria-label=\"2 the email requests your sensitive information permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. The email requests your sensitive information.</h3>\n<p>If you receive an anonymous email asking for sensitive information, chances are it's a scam. No companies will send you an email requesting passwords, credit card data, tax numbers, nor will they send you a login link. </p>\n<h3 id=\"3-the-email-has-terrible-grammar\" style=\"position:relative;\"><a href=\"#3-the-email-has-terrible-grammar\" aria-label=\"3 the email has terrible grammar permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3. The email has terrible grammar.</h3>\n<p>Bad grammar is one of the easiest ways to recognize a phishing email. Because the legitimate ones are always well-written with no lousy syntax, they are often written by professional writers who exhaustively check for spelling before sending them out. </p>\n<p>So, the next time you receive an email with strange phrases and poor language in the body of the message, it is actually a phish. </p>\n<h3 id=\"4-the-email-has-a-suspicious-attachment\" style=\"position:relative;\"><a href=\"#4-the-email-has-a-suspicious-attachment\" aria-label=\"4 the email has a suspicious attachment permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>4. The email has a suspicious attachment.</h3>\n<p>You should be alarmed if you receive an email containing an attachment from a company that you do not recognize or that you weren't expecting. A malicious URL or trojan may be included in the attachment. </p>\n<p>It's good practice always to scan it using antivirus software first, even if you believe the attachment is real. </p>\n<p><a href=\"https://www.loginradius.com/resource/passwords-are-dead/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"passwords-are-dead-whitepaper\"\n        title=\"passwords-are-dead-whitepaper\"\n        src=\"/static/ec2ad56abd855186e940b7173ae2e12e/e5715/passwords-are-dead-whitepaper.png\"\n        srcset=\"/static/ec2ad56abd855186e940b7173ae2e12e/a6d36/passwords-are-dead-whitepaper.png 650w,\n/static/ec2ad56abd855186e940b7173ae2e12e/e5715/passwords-are-dead-whitepaper.png 768w,\n/static/ec2ad56abd855186e940b7173ae2e12e/63ff0/passwords-are-dead-whitepaper.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<h3 id=\"5-the-message-has-made-you-panic\" style=\"position:relative;\"><a href=\"#5-the-message-has-made-you-panic\" aria-label=\"5 the message has made you panic permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>5. The message has made you panic.</h3>\n<p>Phishing emails are popular to incite fear in the recipient. The email can say that your account may have been compromised, and entering your login details is the only way to verify it. Alternatively, the email will state that your account will be closed if you do not respond immediately.</p>\n<p>In any case, contact the company through other methods before committing any action. </p>\n<h3 id=\"6-the-email-says-you-have-won-a-lottery\" style=\"position:relative;\"><a href=\"#6-the-email-says-you-have-won-a-lottery\" aria-label=\"6 the email says you have won a lottery permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>6. The email says you have won a lottery.</h3>\n<p>So, you received an email about winning a lottery, gift cards, or some new gadgets, but you do not remember buying tickets for it—that's definitely a scam. </p>\n<p>And when you open the message and click on a link, you will be redirected to a malicious website. </p>\n<h3 id=\"7-the-email-is-from-a-government-agency\" style=\"position:relative;\"><a href=\"#7-the-email-is-from-a-government-agency\" aria-label=\"7 the email is from a government agency permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>7. The email is from a government agency.</h3>\n<p>The government will never contact you directly. And most definitely, they won't engage in email-based harassment. Scammers send messages to victims claiming to be the IRS or the FBI demanding their personal information. </p>\n<p>Most of the IRS sends direct official letters to home addresses and do not send you an email or call you until you receive an official letter.</p>\n<p>Moving on. </p>\n<p>Phishing attacks may have a variety of targets depending on the attacker. They could be as generic as email phishing, looking to scam anyone who has a Facebook account, or could be extreme as targeting literally one victim. </p>\n<p><a href=\"https://enterprise.verizon.com/resources/reports/2019-data-breach-investigations-report.pdf\">Verizon statistics</a> show that 94% of malware attacks begin with phishing via email. </p>\n<p>We have hashed out the different types of phishing attacks. </p>\n<h2 id=\"what-are-the-common-types-of-phishing-attacks-and-how-to-prevent-them\" style=\"position:relative;\"><a href=\"#what-are-the-common-types-of-phishing-attacks-and-how-to-prevent-them\" aria-label=\"what are the common types of phishing attacks and how to prevent them permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What Are the Common Types of Phishing Attacks and How To Prevent Them</h2>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 60.61538461538461%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"types-of-phishing-attacks\"\n        title=\"types-of-phishing-attacks\"\n        src=\"/static/43c7aa65a6ff8e0feeb98994e1db43bb/e5715/types-of-phishing-attacks.png\"\n        srcset=\"/static/43c7aa65a6ff8e0feeb98994e1db43bb/a6d36/types-of-phishing-attacks.png 650w,\n/static/43c7aa65a6ff8e0feeb98994e1db43bb/e5715/types-of-phishing-attacks.png 768w,\n/static/43c7aa65a6ff8e0feeb98994e1db43bb/2bef9/types-of-phishing-attacks.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<ul>\n<li>Spear Phishing</li>\n</ul>\n<p><a href=\"https://en.wikipedia.org/wiki/Phishing#Spear_phishing\">Spear phishing targets</a> a particular group or category of people, such as the organization's system administrators. Hackers customize their attack by sending emails with the target's name, work phone number, position, company, and other information to deceive the recipient and trick them into believing that the sender is genuine. </p>\n<p>They ask the victim to click on a malicious URL or email attachment and get hold of their sensitive data.</p>\n<p>Organizations should conduct employee security awareness training to defend against this type of scam. They should discourage employees from sharing personal or organizational details on social media. Companies should also invest in solutions that analyze identified malicious links/email attachments for inbound emails.</p>\n<ul>\n<li>Whaling</li>\n</ul>\n<p>Whaling is an even more focused form of phishing since it goes after the whales, the BIG fish within the <a href=\"https://www.loginradius.com/blog/identity/2020/09/consumer-identity-management-cmo-ciso-cio/\">industry like the CEO, CFO or CTO</a>. </p>\n<p>For example, c-suite executives might get an email stating that their company is being sued, and for more information, they need to click on the link. The link redirects them to a page where they enter all of their company's sensitive details like Social Security numbers, tax ID #, and bank account #s. </p>\n<p>Whaling attacks succeed because executives often do not engage with their staff in security awareness training. Organizations should mandate that all company employees, including executives, engage in safety awareness training on an ongoing basis to address the risks of CEO fraud and W-2 phishing.</p>\n<p>Organizations should also introduce multi-factor authentication (MFA) into their financial authorization processes so that no payment is authorized via email alone. </p>\n<ul>\n<li>Smishing and vishing</li>\n</ul>\n<p>Both smishing and vishing involve the use of phones instead of emails. Smishing involves sending text messages to the victim with messages to lure them in to share sensitive information. While hackers communicate via phone in vishing. </p>\n<p>A typical vishing scam involves a hacker posing as a fraud investigator telling the victim that their account has been compromised. The hacker would then ask the victim to provide their bank details to transfer money into a 'safer' account, the hacker's account. </p>\n<p>Stop answering calls from unknown phone numbers to defend against vishing attacks. Never give out private details over the phone and use a caller ID app. </p>\n<p>You can protect against smishing attacks by carefully observing <a href=\"https://www.loginradius.com/blog/identity/2020/12/how-to-stop-phone-hacking/\">unknown phone numbers</a> and if you have any doubt, reach out directly to the company that's mentioned in the message. </p>\n<ul>\n<li>Email phishing</li>\n</ul>\n<p>It is no secret that the majority of phishing attacks <a href=\"https://www.loginradius.com/blog/identity/2020/12/what-to-do-when-email-hacked/\">are sent by email</a>. Cybercriminals register fake domains that mimic a real organization and send out thousands of generic requests.</p>\n<p>They may use the name of the company in the email address like paypal@domainregistrar.com in the anticipation that the name of the sender would simply appear in the inbox of the recipient as 'PayPal'.</p>\n<p>There are many ways to spot a phishing email, but in general, always think before you click an email. Never click on suspicious links, download attachments, or share any sensitive information via email. </p>\n<ul>\n<li>Search engine phishing</li>\n</ul>\n<p>Also known as SEO poisoning or SEO trojans, search engine phishing is the type of phishing where hackers create a fake webpage by targeting specific keywords. When the victim lands on the webpage, they are redirected to the hacker's website.</p>\n<p>These websites could be anything. For example, if you are looking for a job, you may come across fake offers with non-existing companies. The application will require you to provide your personal data like bank details or insurance accounts. </p>\n<p>Remember, no company asks for personal details unless you are hired. Therefore, it is high time you start being cautious. </p>\n<p>Here are a few other guidelines to keep yourself safe from phishing attacks.</p>\n<ul>\n<li>New phishing attack methods are developed all the time. Therefore, keep yourself informed about the latest ones. </li>\n<li>Do not click on a link in an email or instant message unless you are sure that it is genuine.</li>\n<li>Download an anti-phishing toolbar that will alert you every time you are about to enter a known phishing site. </li>\n<li>Keep your browser up-to-date and check your online accounts regularly for traces of phishing attempts.</li>\n<li>Use high-quality firewalls as a shield between you, your computer, and outside intruders to reduce the odds of phishing attempts. </li>\n<li>Be cautious of pop-up windows as they often redirect to malicious websites. Do not click on the \"cancel\" button, as those buttons often lead to phishing sites. Click the tiny 'x' in the upper corner of the browser instead.</li>\n<li>Get into the habit of regularly <a href=\"https://www.loginradius.com/blog/identity/2021/01/how-to-choose-a-secure-password/\">changing your passwords</a> to lock out potential attackers.</li>\n<li>Do not share your personal information anywhere over the Internet. </li>\n<li>Train your employees to adopt the best anti-phishing practices.</li>\n</ul>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>Using the tips mentioned above, businesses will be able to identify some of the most common kinds of phishing attacks. But, that doesn't mean that you can spot every phish. It's a harsh reality that phishing is constantly evolving to adopt new techniques. </p>\n<p>With that in mind, you need to be on top of the game every single day. Keep on conducting <a href=\"https://www.loginradius.com/blog/identity/2019/10/cybersecurity-best-practices-for-enterprises/\">security awareness training</a> so that your employees and executives never fall prey. </p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-loginradius\"\n        title=\"book-a-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"February 13, 2018","updated_date":null,"description":"A Phishing attack can be a death blow for businesses that don't take the necessary precautions. Not only is the top-line affected, but the brand's image and trust can be obliterated if news of a data breach reaches the public. We have hashed out some of the most common types of phishing attacks and how to prevent them.","title":"Phishing Attacks: How to Identify & Avoid Phishing Scams","tags":["security"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.408450704225352,"src":"/static/95a76cd39013c99382f929d1f1187775/9a31d/phishing-for-identity.jpg","srcSet":"/static/95a76cd39013c99382f929d1f1187775/f836f/phishing-for-identity.jpg 200w,\n/static/95a76cd39013c99382f929d1f1187775/2244e/phishing-for-identity.jpg 400w,\n/static/95a76cd39013c99382f929d1f1187775/9a31d/phishing-for-identity.jpg 767w","sizes":"(max-width: 767px) 100vw, 767px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},{"node":{"excerpt":"The International Facility Management Association (IFMA) is the world’s largest international association and guidance body for facility…","fields":{"slug":"/identity/ifma-loginradius-customer-success-story/"},"html":"<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 556px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 34.352517985611506%; position: relative; bottom: 0; left: 0; background-image: url('data:image/jpeg;base64,/9j/2wBDABALDA4MChAODQ4SERATGCgaGBYWGDEjJR0oOjM9PDkzODdASFxOQERXRTc4UG1RV19iZ2hnPk1xeXBkeFxlZ2P/2wBDARESEhgVGC8aGi9jQjhCY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2P/wgARCAAHABQDASIAAhEBAxEB/8QAFwABAAMAAAAAAAAAAAAAAAAAAAIDBf/EABYBAQEBAAAAAAAAAAAAAAAAAAABAv/aAAwDAQACEAMQAAAB05BeLn//xAAYEAADAQEAAAAAAAAAAAAAAAAAAQISIv/aAAgBAQABBQJRSfRo/8QAFhEBAQEAAAAAAAAAAAAAAAAAABES/9oACAEDAQE/AdRX/8QAFREBAQAAAAAAAAAAAAAAAAAAEQD/2gAIAQIBAT8BGL//xAAaEAAABwAAAAAAAAAAAAAAAAAAAQIQETEy/9oACAEBAAY/AlnNjTf/xAAXEAADAQAAAAAAAAAAAAAAAAAAARFB/9oACAEBAAE/IX4jDJh4Qf/aAAwDAQACAAMAAAAQ/wDv/8QAFxEBAQEBAAAAAAAAAAAAAAAAAQARIf/aAAgBAwEBPxAfJbv/xAAXEQADAQAAAAAAAAAAAAAAAAAAAREh/9oACAECAQE/EI0yD//EABoQAQEAAwEBAAAAAAAAAAAAAAERACExodH/2gAIAQEAAT8QLCYg1d9xslTgjTnz1wM3bn//2Q=='); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"IFMAlogo\"\n        title=\"IFMAlogo\"\n        src=\"/static/0e14e0f71e9794fba3f39738e1906d33/7892a/IFMAlogo.jpg\"\n        srcset=\"/static/0e14e0f71e9794fba3f39738e1906d33/7892a/IFMAlogo.jpg 556w\"\n        sizes=\"(max-width: 556px) 100vw, 556px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>The <a href=\"https://www.ifma.org/\">International Facility Management Association (IFMA)</a> is the world’s largest international association and guidance body for facility management professionals. Founded in 1980, IFMA provides credentialing, education programs, and guidance to facility management professionals. Headquartered in Houston (USA), IFMA is a not-for-profit organization supporting professionals in 104 countries.</p>\n<h3 id=\"the-situation\" style=\"position:relative;\"><a href=\"#the-situation\" aria-label=\"the situation permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>The Situation</h3>\n<p>With registered members in more than 100 countries worldwide, IFMA intended to take as much of the member interaction online as possible. This meant that many of its services would be extended to members through their community websites. With the goal of providing a well-rounded online experience, they also wished to collect more information about its members.</p>\n<p>IFMA decided, however, that its members should not be forced to perform unproductive tasks such as completing long registration forms, or remembering multiple login credentials for the various websites. IFMA wanted a seamless user experience for its members so that they would not be distracted or repelled by the different stages in the workflow.</p>\n<h3 id=\"the-challenges\" style=\"position:relative;\"><a href=\"#the-challenges\" aria-label=\"the challenges permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>The Challenges</h3>\n<p>Some of the challenges that IFMA was experiencing included: </p>\n<ul>\n<li>Integrating a social layer into each of IFMA’s websites, and linking each social identity with the IFMA issued membership identity.</li>\n<li>Capturing and store its members’ basic and extended social profile data points, and assigning specific roles to each members after registration.</li>\n<li>Allowing for seamless access between multiple IFMA websites without having to re-authenticate the same member’s identity multiple times. </li>\n<li>Creating a single identity associated with each membership regardless of the number of websites operated by IFMA.</li>\n</ul>\n<h3 id=\"loginradius-solution\" style=\"position:relative;\"><a href=\"#loginradius-solution\" aria-label=\"loginradius solution permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>LoginRadius’ Solution</h3>\n<p>After the deployment of LoginRadius <a href=\"https://www.loginradius.com/blog/identity/customer-identity-and-access-management/\">customer identity and access management solution</a>, IFMA was able to simplify the member sign-up and engagement process. In addition to fulfilling its core objectives, IFMA was able to build rich member profiles with the obtained social profile data. Specifically, LoginRadius helped IFMA achieve its goals in the following ways:  </p>\n<p><strong>1. Introduce Social Login in the Authentication Layer</strong><br>\nIFMA wanted LoginRadius to remove the clunky and time consuming registration form in favour of a <a href=\"https://www.loginradius.com/social-login/\">seamless social login process</a> would increase members’ activities. IFMA opted for Google, Facebook, Twitter, and LinkedIn as the four social networks whose identities its members can utilize to signup and login to the community site. As expected, IFMA experienced a significant increase in member engagement, as well as the number of daily and monthly active users.  </p>\n<p><strong>2. Capture Social Profile Data and Assign Roles</strong><br>\nWith the help of LoginRadius, they were able to obtain the missing <a href=\"https://www.loginradius.com/\">data points via social login</a>. This allowed IFMA to capture the basic and extended data points from the member’s social profile that they have chosen to log in with. Alongside building rich profiles, LoginRadius also provided IFMA with a role management function. This allowed IFMA to assign hierarchical roles to each member upon registration, enabling them to increase website engagement.  </p>\n<p><strong>3. Single Sign-On on Multiple IFMA Websites</strong><br>\nIn preparation for future site additions, IFMA asked LoginRadius to implement <a href=\"https://www.loginradius.com/single-sign-on/\">Single Sign-On</a> for its properties in such a way that new websites can be added to the Single Sign-On grouping on a plug and play basis.  </p>\n<p><strong>4. A Unified Profile for Each Member</strong><br>\nLoginRadius’ cIAM solution ensured that while an individual member can be associated with a number of social profiles, in addition to the official IFMA profile, all of the data associated with the single member is centralized, with only one record created per user. The same convention would also be followed for any prospective IFMA websites as desired by the organization.</p>\n<iframe width=\"770\" height=\"480\" src=\"https://www.youtube.com/embed/p6hyCKXDsic\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen></iframe>\n<p>IFMA - LoginRadius Customer Success Story</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-free-demo-loginradius\"\n        title=\"book-free-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"January 15, 2018","updated_date":null,"description":"The International Facility Management Association (IFMA) is the largest global association and advisory body for professionals in facility management in the world. IFMA was established in 1980 and offers credentialing, education services, and guidance to professionals in facility management.","title":"IFMA, a LoginRadius Customer Success Story","tags":["other"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":0.975609756097561,"src":"/static/ec64af7089941a1be7adfede203955a2/ddac6/ifma-loginradius-customer-success-story.png","srcSet":"/static/ec64af7089941a1be7adfede203955a2/69585/ifma-loginradius-customer-success-story.png 200w,\n/static/ec64af7089941a1be7adfede203955a2/ddac6/ifma-loginradius-customer-success-story.png 208w","sizes":"(max-width: 208px) 100vw, 208px"}}},"author":{"id":"Karl Wittig","github":null,"avatar":null}}}},{"node":{"excerpt":"On Sept. 2, the Canadian Government announced an update to the Digital Privacy Act (June 2015) that will make it mandatory for all Canadian…","fields":{"slug":"/identity/canada-to-fine-companies-for-not-reporting-data-breaches/"},"html":"<p>On Sept. 2, the Canadian Government announced an update to the <a href=\"https://laws-lois.justice.gc.ca/eng/annualstatutes/2015_32/page-1.html\">Digital Privacy Act (June 2015)</a> that will make it mandatory for all Canadian companies to report if their data has been breached. Currently, Alberta is the only province where companies are required to report breaches by law. This change makes this a requirement across the country.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 700px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 75.07692307692308%; position: relative; bottom: 0; left: 0; background-image: url('data:image/jpeg;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"Data Breach\"\n        title=\"Data Breach\"\n        src=\"/static/cc5bf441279823ec0b9cf145d6200a7c/29d31/05_aftermath-100703535-large.jpg\"\n        srcset=\"/static/cc5bf441279823ec0b9cf145d6200a7c/6aca1/05_aftermath-100703535-large.jpg 650w,\n/static/cc5bf441279823ec0b9cf145d6200a7c/29d31/05_aftermath-100703535-large.jpg 700w\"\n        sizes=\"(max-width: 700px) 100vw, 700px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span>Under the new proposed rules, any company that has a data breach will be required to do a risk assessment to determine if the breach poses a “Risk of significant harm”. If so, they’re required to notify all individuals that are affected and also report the breach to the Canadian Privacy Commissioner’s Office. </p>\n<p>A 2017 study by the Ponemon Institute found data breaches are most expensive in the United States and Canada. The average per capita cost of a data breach was $225 in the United States and $190 in Canada. However, because breach reporting is not mandatory, it’s difficult to get a full picture of the number of breaches. Still, over the last few years there have been a number of high profile <a href=\"https://www.loginradius.com/blog/identity/how-do-i-know-if-my-email-has-been-leaked-in-a-data-breach/\">data breaches</a> where the personal information of Canadians was stolen. It’s hoped that mandatory reporting will create an incentive for organizations to take information security more seriously.</p>\n<p><a href=\"https://www.loginradius.com/resource/the-ccpa-and-customer-identity\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"ccpa-customer-identity\"\n        title=\"ccpa-customer-identity\"\n        src=\"/static/277eebfdb42ba7a9547788e0c4bc7ae6/e5715/ccpa-customer-identity.png\"\n        srcset=\"/static/277eebfdb42ba7a9547788e0c4bc7ae6/a6d36/ccpa-customer-identity.png 650w,\n/static/277eebfdb42ba7a9547788e0c4bc7ae6/e5715/ccpa-customer-identity.png 768w,\n/static/277eebfdb42ba7a9547788e0c4bc7ae6/63ff0/ccpa-customer-identity.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<p>The consequences for organizations that decide not to comply with the new rules are two-fold. First of all is the public relations nightmare that occurs when knowledge of the breach eventually becomes public. Typically this comes in the form of loss of confidence in the brand and will result in loss of customers; up to a third of customers will leave after a breach. Second, are the fines for non-compliance under the proposed new rules; up to $10,000 for a summary offence and up to $100,000 for an indictable offence. </p>\n<p>To learn more about how LoginRadius can help you manage and secure your customer profile data, <a href=\"https://www.loginradius.com/contact-sales/\">contact us</a> to chat with a product specialist about your specific data security needs or visit our <a href=\"https://www.loginradius.com/data-management-and-governance/\">Data Management</a> page to learn more about how we secure your data.</p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"September 07, 2017","updated_date":null,"description":"The news of Canada to fine companies for not reporting data breaches is making headlines these days. Know what it means for your business.","title":"Canada To Fine Companies For Not Reporting Data Breaches","tags":["security"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.3333333333333333,"src":"/static/cc5bf441279823ec0b9cf145d6200a7c/9a128/canada-to-fine-companies.jpg","srcSet":"/static/cc5bf441279823ec0b9cf145d6200a7c/f836f/canada-to-fine-companies.jpg 200w,\n/static/cc5bf441279823ec0b9cf145d6200a7c/2244e/canada-to-fine-companies.jpg 400w,\n/static/cc5bf441279823ec0b9cf145d6200a7c/9a128/canada-to-fine-companies.jpg 700w","sizes":"(max-width: 700px) 100vw, 700px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}}]},"markdownRemark":{"excerpt":"Identity is evolving, and developers are at the forefront of this transformation. Every day brings a new learning—adapting to new standards…","fields":{"slug":"/identity/developer-first-identity-provider-loginradius/"},"html":"<p>Identity is evolving, and developers are at the forefront of this transformation. Every day brings a new learning—adapting to new standards and refining approaches to building secure, seamless experiences.</p>\n<p>We’re here to support developers on that journey. We know how important simplicity, efficiency, and well-structured documentation are when working with identity and access management solutions. That’s why we’ve redesigned the <a href=\"https://www.loginradius.com/\">LoginRadius website</a>—to be faster, more intuitive, and developer-first in every way.</p>\n<p>The goal? Having them spend less time searching and more time building.</p>\n<h2 id=\"whats-new-and-improved-on-the-loginradius-website\" style=\"position:relative;\"><a href=\"#whats-new-and-improved-on-the-loginradius-website\" aria-label=\"whats new and improved on the loginradius website permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What’s New and Improved on the LoginRadius Website?</h2>\n<p>LoginRadius’ vision is to give developers a product that simplifies identity management so they can focus on building, deploying, and scaling their applications. To enhance this experience, we’ve spent the last few months redesigning our interface— making navigation more intuitive and reassuring that essential resources are easily accessible.</p>\n<p>Here’s a closer look at what’s new and why it’s important:</p>\n<h3 id=\"a-developer-friendly-dark-theme\" style=\"position:relative;\"><a href=\"#a-developer-friendly-dark-theme\" aria-label=\"a developer friendly dark theme permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>A Developer-Friendly Dark Theme</h3>\n<p><img src=\"/f46881583c7518a93bb24e94c32320de/a-developer-friendly-dark-theme.webp\" alt=\"This image shows how LoginRadius offers several authentication methods like traditional login, social login, passwordless login, passkeys and more in a dark mode.\">    </p>\n<p>Developers spend long hours working in dark-themed IDEs and terminals, so we’ve designed the LoginRadius experience to be developer-friendly and align with that preference.</p>\n<p>The new dark mode reduces eye strain, enhances readability, and provides a seamless transition between a coding environment and our platform. Our new design features a clean, modern aesthetic with a consistent color scheme and Barlow typography, ensuring better readability. High-quality graphics and icons are thoughtfully placed to enhance the content without adding visual clutter.</p>\n<p>So, whether you’re navigating our API docs or configuring authentication into your system, our improved interface will make those extended development hours more comfortable and efficient.</p>\n<h3 id=\"clear-categorization-for-loginradius-capabilities\" style=\"position:relative;\"><a href=\"#clear-categorization-for-loginradius-capabilities\" aria-label=\"clear categorization for loginradius capabilities permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Clear Categorization for LoginRadius Capabilities</h3>\n<p><img src=\"/e5358b82be414940f3fb146013845933/capabilities.webp\" alt=\"This image shows a breakdown of all the LoginRadius CIAM capabilities, including authentication, security, UX, scalability and multi-brand management.\"></p>\n<p>We’ve restructured our website to provide a straightforward breakdown of our customer identity and access management platform capabilities, helping you quickly find what you need:</p>\n<ul>\n<li>Authentication: Easily understand <a href=\"https://www.loginradius.com/blog/identity/authentication-option-for-your-product/\">how to choose the right login method</a>, from traditional passwords and OTPs to social login, federated SSO, and passkeys with few lines of code.</li>\n<li>Security: Implement no-code security features like bot detection, IP throttling, breached password alerts, DDoS protection, and adaptive MFA to safeguard user accounts.</li>\n<li>User Experience: Leverage AI builder, hosted pages, and drag-and-drop workflows to create smooth, branded sign-up and login experiences.</li>\n<li>High Performance &#x26; Scalability: Confidently scale with sub-100ms API response times, 100% uptime, 240K+ RPS, and 28+ global data center regions.</li>\n<li>Multi-Brand Management: Efficiently manage multiple identity apps, choosing isolated or shared data stores based on your brand’s unique needs.</li>\n</ul>\n<p>This structured layout ensures you can quickly understand each capability and how it integrates into your identity ecosystem.</p>\n<h3 id=\"developer-first-navigation\" style=\"position:relative;\"><a href=\"#developer-first-navigation\" aria-label=\"developer first navigation permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Developer-First Navigation</h3>\n<p><img src=\"/a8c155c2b6faf3d5f4b4de4e2b14d763/developers-menu.webp\" alt=\"This image shows the LoginRadius menu bar, highlighting the developer dropdown.\">   </p>\n<p>We’ve been analyzing developer workflows to identify how you access key resources. That’s why we redesigned our navigation with one goal in mind: to reduce clicks and make essential resources readily available.</p>\n<p>The new LoginRadius structure puts APIs, SDKs, and integration guides right at the menu bar under the Developers dropdown so you can get started faster. Our Products, Solutions, and Customer Services are also clearly categorized, helping development teams quickly find the right tools and make informed decisions.</p>\n<h3 id=\"quick-understanding-of-integration-benefits\" style=\"position:relative;\"><a href=\"#quick-understanding-of-integration-benefits\" aria-label=\"quick understanding of integration benefits permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Quick Understanding of Integration Benefits</h3>\n<p><img src=\"/b2f9a964a2da0ea83e2f8596b833bba7/we-support-your-tech-stack.webp\" alt=\"This image shows a list of popular programming languages and frameworks offered by LoginRadius.\"></p>\n<p>Developers now have a clear view of the tech stack available with LoginRadius, designed to support diverse business needs.</p>\n<p>Our platform offers pre-built SDKs for Node.js, Python, Java, and more, making CIAM integration seamless across popular programming languages and frameworks.</p>\n<h2 id=\"over-to-you-now\" style=\"position:relative;\"><a href=\"#over-to-you-now\" aria-label=\"over to you now permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Over to You Now!</h2>\n<p>Check out our <a href=\"https://www.loginradius.com/\">revamped LoginRadius website</a> and see how the improved experience makes it easier to build, scale, and secure your applications.</p>\n<p>Do not forget to explore the improved navigation and API documentation, and get started with our free trial today. We’re excited to see what you’ll build with LoginRadius!</p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"February 21, 2025","updated_date":null,"description":"LoginRadius’ vision is to give developers a product that simplifies identity management so they can focus on building, deploying, and scaling their applications. To enhance this experience, we’ve redesigned our website interface, making navigation more intuitive and reassuring that essential resources are easily accessible.","title":"Revamped & Ready: Introducing the New Developer-First LoginRadius Website","tags":["Developer tools","API","Identity Management","User Authentication"],"pinned":true,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.7857142857142858,"src":"/static/80b4e4fbe176a10a327d273504607f32/58556/hero-section.webp","srcSet":"/static/80b4e4fbe176a10a327d273504607f32/61e93/hero-section.webp 200w,\n/static/80b4e4fbe176a10a327d273504607f32/1f5c5/hero-section.webp 400w,\n/static/80b4e4fbe176a10a327d273504607f32/58556/hero-section.webp 800w,\n/static/80b4e4fbe176a10a327d273504607f32/99238/hero-section.webp 1200w,\n/static/80b4e4fbe176a10a327d273504607f32/7c22d/hero-section.webp 1600w,\n/static/80b4e4fbe176a10a327d273504607f32/1258b/hero-section.webp 2732w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},"pageContext":{"limit":6,"skip":408,"currentPage":69,"type":"//identity//","numPages":70,"pinned":"ee8a4479-3471-53b1-bf62-d0d8dc3faaeb"}},"staticQueryHashes":["1171199041","1384082988","2100481360","23180105","528864852"]}