{"componentChunkName":"component---src-templates-tag-js","path":"/tags/consumer-experience/","result":{"data":{"site":{"siteMetadata":{"title":"LoginRadius Blog"}},"allMarkdownRemark":{"totalCount":2,"edges":[{"node":{"fields":{"slug":"/identity/is-password-reset-ruining-cx/"},"html":"<h2 id=\"introduction\" style=\"position:relative;\"><a href=\"#introduction\" aria-label=\"introduction permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Introduction</h2>\n<p>It's happened to all of us: we've forgotten our password and need to reset it (especially after summer vacation).</p>\n<p>While this should be a <a href=\"https://www.loginradius.com/blog/identity/how-to-improve-customer-verification-process/\">simple process</a> for most websites, it can be a total nightmare for the customer if it's not done right. In fact, password resets are one of the most common customer service complaints. So, what can enterprises do to make sure this process is as smooth and painless as possible?</p>\n<p>We'll be discussing some of the best practices for a password reset, as well as ways to avoid ruining the customer experience!</p>\n<h2 id=\"why-is-the-process-of-a-password-reset-important\" style=\"position:relative;\"><a href=\"#why-is-the-process-of-a-password-reset-important\" aria-label=\"why is the process of a password reset important permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Why is the Process of a Password Reset Important?</h2>\n<p>Password reset is an important process for both customers and businesses. Customers need access to their accounts as quickly as possible when they've forgotten their password (which – they will), and businesses need to make sure that the process is quick and easy for them (which is – inevitable).</p>\n<p>And with the average web user having multiple online accounts, with accounts doubling every 5 years, this becomes a real issue both for enterprises and personal security.</p>\n<p>With information and account overload, user behavior such as using the same password for multiple accounts invites security breaches, making authentication a top priority for enterprises.</p>\n<p><a href=\"https://www.loginradius.com/resource/adding-salt-to-hashing-a-step-by-step-guide-to-store-passwords/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"GD-salt-to-hash\"\n        title=\"GD-salt-to-hash\"\n        src=\"/static/75d07d36528b68501e972fe56628d7f3/e5715/GD-salt-to-hash.png\"\n        srcset=\"/static/75d07d36528b68501e972fe56628d7f3/a6d36/GD-salt-to-hash.png 650w,\n/static/75d07d36528b68501e972fe56628d7f3/e5715/GD-salt-to-hash.png 768w,\n/static/75d07d36528b68501e972fe56628d7f3/81501/GD-salt-to-hash.png 2886w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<h2 id=\"how-can-a-password-reset-negatively-affect-the-customer-experience\" style=\"position:relative;\"><a href=\"#how-can-a-password-reset-negatively-affect-the-customer-experience\" aria-label=\"how can a password reset negatively affect the customer experience permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How Can a Password Reset Negatively Affect the Customer Experience?</h2>\n<p>If the password reset process is lengthy or difficult, customers will inevitably be frustrated which can lead to a number of customer service issues. </p>\n<p>For starters, the customer might not be able to get back into their account, and if this drags on for any length of time causes major inconveniences. If the frustration builds up with a poorly executed process for resetting a password and authenticating the user can lead to negative word-of-mouth advertising and even lost business.</p>\n<p>In addition, a <a href=\"https://www.loginradius.com/blog/identity/common-vulnerabilities-password-based-login/\">botched password reset</a> can also lead to customer data being compromised. This could potentially expose the customer to identity theft or fraud due to the sheer amount of accounts that the average user has. </p>\n<p>Finally, if the password reset process is too difficult or complicated, the customer might be less likely to try again in the future.</p>\n<p>All of these scenarios have a negative impact on the customer experience and ultimately damage the relationship with them. It's way easier for a customer to abandon ship at switch over to another business that handles onboarding and customer support excellently. </p>\n<p>There is simply no room for mistakes in a globally competitive market in order to both acquire and retain customers for the long haul.</p>\n<h2 id=\"how-to-make-a-password-reset-as-seamless-as-possible\" style=\"position:relative;\"><a href=\"#how-to-make-a-password-reset-as-seamless-as-possible\" aria-label=\"how to make a password reset as seamless as possible permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How to Make a Password Reset as Seamless as Possible?</h2>\n<p>When it comes to password resets, enterprises need to be careful about how they go about it. If it's too complicated, customers will inevitably get frustrated. Here are a few tips for making a password reset as seamless as possible:</p>\n<h3 id=\"1-keep-the-process-short\" style=\"position:relative;\"><a href=\"#1-keep-the-process-short\" aria-label=\"1 keep the process short permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. Keep the process short.</h3>\n<p>The key to keeping the process as painless as possible is to keep it short and simple. The last thing you want to do is force your customer to jump through hoops in order to reset their password. Make the process easy to follow, keep it under a minute, and don't require too much information. Entering an email address should be a good sweet spot. </p>\n<h3 id=\"2-make-sure-the-customer-has-all-the-necessary-information-before-starting\" style=\"position:relative;\"><a href=\"#2-make-sure-the-customer-has-all-the-necessary-information-before-starting\" aria-label=\"2 make sure the customer has all the necessary information before starting permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. Make sure the customer has all the necessary information before starting.</h3>\n<p>Password resets can be a huge pain for customers, but with the right preparation, they can be as seamless as possible. Make sure the customer has all the necessary information before starting. The customer should also be aware of the reset process and what to expect. The last thing you want is for them to be confused during the process.</p>\n<h3 id=\"3-make-sure-the-information-is-secure\" style=\"position:relative;\"><a href=\"#3-make-sure-the-information-is-secure\" aria-label=\"3 make sure the information is secure permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3. Make sure the information is secure.</h3>\n<p>One of the most important aspects of a customer's experience is feeling safe and secure. When it comes to resetting passwords, enterprises need to take extra precautions to make sure customer data is secure as well. This means instituting safeguards against things like multiple failed logins and only sending information via secure channels. </p>\n<p>It's also important to make sure that the customer service representatives who are handling password resets are adequately trained in data security. </p>\n<p>By following these simple steps, companies can help ensure that their customers have a positive experience, even in the face of a password reset.</p>\n<h2 id=\"what-are-some-best-practices-for-resetting-passwords\" style=\"position:relative;\"><a href=\"#what-are-some-best-practices-for-resetting-passwords\" aria-label=\"what are some best practices for resetting passwords permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What are Some Best Practices for Resetting Passwords?</h2>\n<p>When resetting a customer's password, it's important to keep a few things in mind. Here are some best practices to ensure a positive customer experience:</p>\n<h3 id=\"1-reset-passwords-in-a-secure-environment\" style=\"position:relative;\"><a href=\"#1-reset-passwords-in-a-secure-environment\" aria-label=\"1 reset passwords in a secure environment permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. Reset passwords in a secure environment.</h3>\n<p>When it comes to resetting passwords, enterprises have a delicate balance to strike between security and customer experience. </p>\n<p>The system needs to <a href=\"https://www.loginradius.com/blog/growth/best-practices-verification-emails-effective/\">verify the identity</a> of the user and this can be done through methods such as asking for personal information like SSN/date of birth or sending a reset link to an email address. </p>\n<p>If your system is compromised and user data is leaked, you could put your customers at risk. Make sure you use a reputable authentication vendor to help keep your system secure.</p>\n<h3 id=\"2-send-password-reset-emails-from-a-recognizable-address\" style=\"position:relative;\"><a href=\"#2-send-password-reset-emails-from-a-recognizable-address\" aria-label=\"2 send password reset emails from a recognizable address permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. Send password reset emails from a recognizable address.</h3>\n<p>One way to ensure a good customer experience is to use recognizable email addresses for password reset communications. </p>\n<p>When a user receives an email from, say, support@company.com for a password reset, they are likely to experience less confusion and frustration than if the email is from an address they don't know. </p>\n<p>This small detail can make all the difference in the world when it comes to resetting passwords. </p>\n<h3 id=\"3-use-a-personalized-message-in-the-email\" style=\"position:relative;\"><a href=\"#3-use-a-personalized-message-in-the-email\" aria-label=\"3 use a personalized message in the email permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3. Use a personalized message in the email.</h3>\n<p>When a customer needs to reset their password, they generally expect a standardized email message from the company. </p>\n<p>However, you can make the experience more personal for your customer by <a href=\"https://chrisstarkhagen.com/blog/ai-writer-ai-content-generator\">writing personalized copy</a> in the email sequence. This small gesture can make the customer feel appreciated and more likely to continue using your service.</p>\n<h3 id=\"4-make-the-reset-process-easy-to-follow\" style=\"position:relative;\"><a href=\"#4-make-the-reset-process-easy-to-follow\" aria-label=\"4 make the reset process easy to follow permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>4. Make the reset process easy to follow.</h3>\n<p>Instructions should be clear and concise, without any complicated steps. If possible, the reset process should not require the customer to call customer service or go through a long series of prompts. The easier the reset process is, the better.</p>\n<h2 id=\"wrap-up\" style=\"position:relative;\"><a href=\"#wrap-up\" aria-label=\"wrap up permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Wrap up</h2>\n<p>No company wants a disgruntled customer, but all too often password resets – a necessary evil – lead to just that. </p>\n<p>When done correctly, though, password resets can be easy and relatively painless for both the customer and the enterprise. By following these tips that we went through, enterprises can ensure that the customers have a positive experience when resetting their passwords.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-loginradius\"\n        title=\"book-a-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"May 17, 2022","updated_date":null,"title":"How a Simple Password Reset Can Ruin Your Customer's Experience","tags":["data security","consumer-experience","authentication","identity-verification"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.4705882352941178,"src":"/static/9e11e96e8a392b09bd5623f2e5369b9a/33aa5/paswd-reset.jpg","srcSet":"/static/9e11e96e8a392b09bd5623f2e5369b9a/f836f/paswd-reset.jpg 200w,\n/static/9e11e96e8a392b09bd5623f2e5369b9a/2244e/paswd-reset.jpg 400w,\n/static/9e11e96e8a392b09bd5623f2e5369b9a/33aa5/paswd-reset.jpg 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"Chris Starkhagen","github":null,"avatar":null}}}},{"node":{"fields":{"slug":"/identity/govtech-shaping-future-gov-services/"},"html":"<h2 id=\"introduction\" style=\"position:relative;\"><a href=\"#introduction\" aria-label=\"introduction permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Introduction</h2>\n<p>The modern digital landscape has offered plenty of opportunities to both government and the public sector to jump on the <a href=\"https://www.loginradius.com/blog/identity/what-is-digital-transformation/\">digital transformation</a> bandwagon.</p>\n<p>Whether we talk about municipalities or government banking institutions, every organization can leverage the true potential of technology, data, and centralized identity to deliver unified and seamless digital experiences. </p>\n<p>Various technology organizations and government bodies work together as a part of GovTech to ensure the citizens can reap the maximum benefit through an interconnected network. </p>\n<p>GovTech refers to the efforts to digitally transform public administrations and various government and public sector organizations through innovative technological solutions. </p>\n<p>Let’s understand the aspects of GovTech and how it’s offering endless opportunities for the sake of citizens’ benefits. </p>\n<h2 id=\"what-is-govtech\" style=\"position:relative;\"><a href=\"#what-is-govtech\" aria-label=\"what is govtech permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is GovTech?</h2>\n<p>Every enterprise is putting every effort into getting maximum user engagement, and users already have up to snuff digital experiences from these enterprises; the public sector still lags. </p>\n<p>The private sector has taken a giant leap in digital transformation and user experience. However, the same is missing in the case of public sector and government organizations. </p>\n<p>To overcome the issues about standards that most leading organizations in the private sector have already set, GovTech was introduced to respond to the evident gap between the citizens and the public sector. </p>\n<p>GovTech, the word itself is made from two individual terms-Government and Technology. Considering all the private sector's transformations, GovTech emphasizes incorporating technological innovations to digitize the relationship between various administrations and citizens smartly. </p>\n<p>GovTech, in a nutshell, refers to the technological infrastructure that a government uses to modernize its public sector for better citizen engagement. </p>\n<p>Since we’ve gained enough knowledge about GovTech and its role, let’s understand its advantages for the public sector. </p>\n<h2 id=\"what-are-its-advantages\" style=\"position:relative;\"><a href=\"#what-are-its-advantages\" aria-label=\"what are its advantages permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What are its Advantages?</h2>\n<h3 id=\"1-centralizing-online-services\" style=\"position:relative;\"><a href=\"#1-centralizing-online-services\" aria-label=\"1 centralizing online services permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. Centralizing online services.</h3>\n<p>Cities need one unified self-service portal so that their constituents have a seamless, efficient experience as they access the services they need. The GovTech infrastructure lets cities centralize their customer-facing digital applications into one portal.</p>\n<p> <br>\nThis single locus of access delivers a connected experience across multiple touchpoints and channels. This infrastructure supports account summary, customer profiles, permit applications, bill payments, etc. </p>\n<h3 id=\"2-helping-maintain-one-digital-identity-across-all-customer-service\" style=\"position:relative;\"><a href=\"#2-helping-maintain-one-digital-identity-across-all-customer-service\" aria-label=\"2 helping maintain one digital identity across all customer service permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. Helping maintain one digital identity across all customer service.</h3>\n<p>What good is a centralized portal if citizens have to create multiple identities for individual web and mobile applications? Operating in this way creates identity silos that prevent a complete view of the customer’s journey and preferences, which means the customer experience can’t be optimized for each individual.</p>\n<p> <br>\nWithout a seamless user experience, engagement rates drop. But with GovTech incorporating <a href=\"https://www.loginradius.com/single-sign-on/\">Single Sign-On</a> (SSO),  cities and companies can allow customers to access all applications within their platform with a single set of unified credentials rather than register and log in to each service separately. </p>\n<p><a href=\"https://www.loginradius.com/resource/how-public-sector-companies-use-the-loginradius-identity-platform/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"public-sector-ds\"\n        title=\"public-sector-ds\"\n        src=\"/static/9bf345eb654ad0555d320005047c6c10/e5715/public-sector-ds.png\"\n        srcset=\"/static/9bf345eb654ad0555d320005047c6c10/a6d36/public-sector-ds.png 650w,\n/static/9bf345eb654ad0555d320005047c6c10/e5715/public-sector-ds.png 768w,\n/static/9bf345eb654ad0555d320005047c6c10/63ff0/public-sector-ds.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<h3 id=\"3-integrating-with-third-party-applications\" style=\"position:relative;\"><a href=\"#3-integrating-with-third-party-applications\" aria-label=\"3 integrating with third party applications permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3. Integrating with third-party applications.</h3>\n<p>Many public sector organizations have difficulty using customer data to improve the digital experience.  With GovTech offering third-party applications such as CRM, email marketing tools, online communities, payment systems and more, citizens can leverage the interconnected experience. They can quickly utilize any such integration for convenience in a single platform.  </p>\n<p> <br>\nMoreover, third-party integrations enable organizations to use that customer data to understand their customers better, offer more helpful information and deliver that information more directly.</p>\n<h3 id=\"4-risk-based-authentication-and-mfa-for-another-stringent-layer-of-security\" style=\"position:relative;\"><a href=\"#4-risk-based-authentication-and-mfa-for-another-stringent-layer-of-security\" aria-label=\"4 risk based authentication and mfa for another stringent layer of security permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>4. Risk-based authentication and MFA for another stringent layer of security.</h3>\n<p>Authentication in the public sector is crucial, which eventually requires a robust mechanism to ensure that user identities remain secured.</p>\n<p>GovTech can leverage multi-factor authentication through SMS, automated phone calls, email, security questions, and authenticator apps, allowing them to customize the citizen experience. Depending on the diverse public sector needs, they can also opt to turn on Multi-Factor Authentication across all customer accounts.</p>\n<p>On the other hand, GovTech can leverage Risk-based authentication as a non-static authentication system that considers the profile (IP address, Browser, physical Location, and so on) of a citizen requesting access to the system to determine the risk profile associated with that action.</p>\n<p>The risk-based implementation allows diverse web applications to challenge the user for additional credentials only when the risk level is appropriate, <a href=\"https://www.loginradius.com/blog/identity/improving-customer-experience-public-sector/\">improving customer experience</a>. </p>\n<h2 id=\"the-bottom-line\" style=\"position:relative;\"><a href=\"#the-bottom-line\" aria-label=\"the bottom line permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>The Bottom Line</h2>\n<p>The public sector is an integral part of any state’s overall development since much good work depends on these public sector organizations. </p>\n<p>Until now, most government bodies aren’t utilizing GovTech, but the trend is soon changing. Many public sector organizations and government bodies are already putting their best foot forward in adopting GovTech for digital transformation. </p>\n<p>Whether it’s authentication or delivering a consistent omnichannel experience, GovTech can help the public sector build a flawless citizen experience coupled with enhanced security that ensures the overall digital transformation of the public sector.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-loginradius-banner\"\n        title=\"book-a-demo-loginradius-banner\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"May 13, 2022","updated_date":null,"title":"GovTech is On The Rise: How Can This Technology Improve Government Services?","tags":["govtech","digital-transformation","consumer-experience"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.6260162601626016,"src":"/static/16685f8fdc70502c2c3320918e4886a5/33aa5/govtech.jpg","srcSet":"/static/16685f8fdc70502c2c3320918e4886a5/f836f/govtech.jpg 200w,\n/static/16685f8fdc70502c2c3320918e4886a5/2244e/govtech.jpg 400w,\n/static/16685f8fdc70502c2c3320918e4886a5/33aa5/govtech.jpg 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}}]}},"pageContext":{"tag":"consumer-experience"}},"staticQueryHashes":["1171199041","1384082988","2100481360","23180105","528864852"]}