{"componentChunkName":"component---src-templates-tag-js","path":"/tags/enterprises/","result":{"data":{"site":{"siteMetadata":{"title":"LoginRadius Blog"}},"allMarkdownRemark":{"totalCount":3,"edges":[{"node":{"fields":{"slug":"/identity/data-privacy-compliance-future/"},"html":"<h2 id=\"introduction\" style=\"position:relative;\"><a href=\"#introduction\" aria-label=\"introduction permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Introduction</h2>\n<p>Data compliance is swiftly becoming the need of the hour for businesses thinking to step ahead of the competition. However, building the future of data compliance requires stringent <a href=\"https://www.loginradius.com/blog/identity/consumer-data-privacy-security/\">data privacy and security policies</a> and best practices. </p>\n<p>We live in a digital-first era where data is the fuel to keep businesses up and running. But the way brands use this data makes all the difference. </p>\n<p>Unlike the conventional times when brands used to collect heaps of customer data without their consent, organizations must first build trust in clients before expecting even a bit of detail. </p>\n<p>Customers are already interacting with brands like Google, Amazon, and Apple, so they know what a great user experience is. Also, they’re aware of their privacy rights since global data and privacy regulations are becoming increasingly stringent. </p>\n<p>So, if a business isn’t building trust in potential clients by offering reliable data security and privacy, it would lag behind its competitors. </p>\n<p>Let’s look at some aspects that can help organizations stay ahead of the curve by leveraging digital privacy for compliance management. </p>\n<h2 id=\"what-is-data-compliance-why-must-businesses-adhere-to-data-compliance\" style=\"position:relative;\"><a href=\"#what-is-data-compliance-why-must-businesses-adhere-to-data-compliance\" aria-label=\"what is data compliance why must businesses adhere to data compliance permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is Data Compliance? Why Must Businesses Adhere to Data Compliance?</h2>\n<p>Data compliance could be defined as identifying the applicable governance for customer/user data security, protection, management, storage, etc., and helps establish strategies with protocols to ensure data is secure from unauthorized access and usage. </p>\n<p>In a nutshell, data compliance law states how organizations (regardless of their industry) meet regulatory and legal requirements for collecting, processing, and maintaining personal information.</p>\n<p>A breach in data privacy can lead to legal consequences and may be followed by investigations and fines. </p>\n<p>But why do organizations need to immediately think about invoking the <a href=\"https://www.loginradius.com/compliances/\">true potential of data compliance</a> and privacy? </p>\n<p>Well, consumers or employees can respond with civil lawsuits whenever their privacy is compromised while an organization collects and processes personal information.</p>\n<p>Apart from this, data and privacy compliance laws and regulations help protect consumers in different countries by ensuring data is handled appropriately.</p>\n<h2 id=\"why-is-dataprivacy-compliance-crucial-today\" style=\"position:relative;\"><a href=\"#why-is-dataprivacy-compliance-crucial-today\" aria-label=\"why is dataprivacy compliance crucial today permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Why is Data/Privacy Compliance Crucial Today?</h2>\n<p>One of the biggest reasons organizations must comply with privacy regulations is to avoid heavy fines. The ones that don’t implement the privacy regulations could be fined up to millions of dollars and face penalties for years.</p>\n<p>Due to increased regulations, including the EU’s GDPR and the United States’ CCPA, that protects unauthorized access to crucial data, privacy compliance is now crucial for every business.  </p>\n<p>Also, the increased number of cybersecurity threats pertaining to customers’ crucial information has impacted businesses; businesses must incorporate a robust security mechanism for better protection. </p>\n<p><a href=\"https://www.loginradius.com/resource/loginradius-and-ccpa-compliance\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"ccpa-ds\"\n        title=\"ccpa-ds\"\n        src=\"/static/1b4c890938c2e43d6067ee716ec32ffc/e5715/ccpa-ds.png\"\n        srcset=\"/static/1b4c890938c2e43d6067ee716ec32ffc/a6d36/ccpa-ds.png 650w,\n/static/1b4c890938c2e43d6067ee716ec32ffc/e5715/ccpa-ds.png 768w,\n/static/1b4c890938c2e43d6067ee716ec32ffc/63ff0/ccpa-ds.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<h2 id=\"incorporating-a-customer-iam-for-quickly-adhering-to-global-compliances\" style=\"position:relative;\"><a href=\"#incorporating-a-customer-iam-for-quickly-adhering-to-global-compliances\" aria-label=\"incorporating a customer iam for quickly adhering to global compliances permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Incorporating a Customer IAM For Quickly Adhering to Global Compliances</h2>\n<p>A <a href=\"https://www.loginradius.com/blog/identity/customer-identity-and-access-management/\">customer identity and access management</a> (CIAM) platform help businesses comply with every data regulation and privacy compliance, including the GDPR and the CCPA. </p>\n<p>A CIAM could be the best way to stay ahead of the competition since it offers endless business opportunities that help enhance leads and eventually improve conversion rates. </p>\n<p>As a leading GDPR-compliance-ready CIAM platform, <a href=\"https://www.loginradius.com/\">LoginRadius</a> works seamlessly for any business model.</p>\n<p>LoginRadius simplifies data compliance by bringing all the consumer data under a single roof, which enables complete profile management of an individual consumer in a single intuitive admin console.</p>\n<p>Our platform ensures you remain compliant with GDPR and stay ahead of your competitors when it comes to securing essential consumer data.</p>\n<h2 id=\"in-conclusion\" style=\"position:relative;\"><a href=\"#in-conclusion\" aria-label=\"in conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>In Conclusion</h2>\n<p>The surging number of data breaches and customer identity thefts have given rise to the need for a more robust compliance management system. </p>\n<p>Incorporating a customer identity and access management solution can be a game-changer for businesses striving for digital excellence by adhering to all the legal compliance requirements. </p>\n<p>And with LoginRadius CIAM, businesses need not worry about getting compliant with global data and privacy regulations, including the GDPR and the CCPA. The cutting-edge CIAM offers a seamless user experience reinforced by robust security and privacy. </p>\n<p>Need help in getting compliance-ready? <a href=\"https://www.loginradius.com/contact-sales/\">Reach us</a> for a free consultation today. </p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-loginradius\"\n        title=\"book-a-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"August 31, 2022","updated_date":null,"title":"What Brands Need to Know for Building the Future of Data Compliance?","tags":["data privacy","enterprises","compliance"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.8518518518518519,"src":"/static/e2f2d0b221e8e5132eca8a7d9f821762/33aa5/compliance.jpg","srcSet":"/static/e2f2d0b221e8e5132eca8a7d9f821762/f836f/compliance.jpg 200w,\n/static/e2f2d0b221e8e5132eca8a7d9f821762/2244e/compliance.jpg 400w,\n/static/e2f2d0b221e8e5132eca8a7d9f821762/33aa5/compliance.jpg 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},{"node":{"fields":{"slug":"/identity/data-privacy-immediate-enterprise-priority/"},"html":"<h2 id=\"introduction\" style=\"position:relative;\"><a href=\"#introduction\" aria-label=\"introduction permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Introduction</h2>\n<p>Amazon’s sub-par data management story about its retail platform, if anything, is <a rel=\"nofollow\" href=\"https://www.wired.com/story/amazon-failed-to-protect-your-data-investigation/\"> a cautionary tale </a>. The lapses in understanding how and where data is stored had severely affected how information is managed and secured. In turn, it caused security shortfalls and unnecessary privileged access that rogue employees and sellers had exploited.</p>\n<h2 id=\"privacy-and-security-programs-are-not-just-cost-centers\" style=\"position:relative;\"><a href=\"#privacy-and-security-programs-are-not-just-cost-centers\" aria-label=\"privacy and security programs are not just cost centers permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Privacy and Security Programs Are Not Just Cost Centers</h2>\n<p>The opinionated notion of thinking of <a href=\"https://www.loginradius.com/security/\">data security</a> and privacy programs as cost centers has to be questioned and rethought. While such programs do not seemingly contribute to the profits generated by an enterprise, the adverse effects on the topline when such programs fail are visible in too many examples, mostly in terms of lost consumer loyalty and revenue growth. Inversely, data privacy and security today are fundamental to building and operating a successful enterprise that is sustainable in the long term.</p>\n<p>Overall, security and privacy are interdependent. Accordingly, enterprise leaders should support such programs as not something to be performed but a priority to be managed with appropriate investments of capital and resources.</p>\n<p>An enterprise’s good track record with information security and <a href=\"https://www.loginradius.com/blog/identity/digital-privacy-best-practices/\">consumer-focused privacy management</a> can heighten brand value and strengthen market positioning in the current business landscape. Consumers, who have significantly been affected by data breaches, are concerned about what data they share and with whom, as data — either personal or transactional — is ever becoming critical to how consumers live and businesses operate.</p>\n<p>In this new paradigm, the amount of data is also growing exponentially. This phenomenon is making the data management practices and technologies that was widely used a few years ago ineffective, necessitating enterprises to rethink data management strategies and deploy emerging technologies to prepare for and overcome challenges.</p>\n<h2 id=\"in-conclusion\" style=\"position:relative;\"><a href=\"#in-conclusion\" aria-label=\"in conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>In Conclusion</h2>\n<p>All this implies that data management programs have to consider information security and consumer data privacy as fundamental to their success and contribute to an enterprise's topline.</p>\n<p>But, how can enterprise leaders navigate this paradigm shift?</p>\n<p>In my short yet insightful eBook on data privacy, enterprise leaders will get in-depth insights and much-needed perspectives on managing data security and privacy.</p>\n<iframe type=\"text/html\" sandbox=\"allow-scripts allow-same-origin allow-popups\" width=\"336\" height=\"550\" frameborder=\"0\" allowfullscreen style=\"max-width:100%\" src=\"https://read.amazon.in/kp/card?asin=B0B5XPD468&preview=inline&linkCode=kpe&ref_=cm_sw_r_kb_dp_0DF4A46STSXK732QTDAE\" ></iframe>\n<p>The chapters are as follows:</p>\n<ul>\n<li><strong>Chapter I</strong> examines the evolutions of the data economy and how it's affecting business operations, growth, and sustainability</li>\n<li><strong>Chapter II</strong> explains the importance of data privacy and why enterprises need to rethink their approach to data management</li>\n<li><strong>Chapter III</strong> discusses how enterprises can effectively tackle compliance challenges with emerging data regulations</li>\n<li><strong>Chapter IV</strong> helps enterprise leaders understand the future of enterprises dealing with more and more data</li>\n</ul>\n<p>In detail, I have organized the eBook into chapters mentioned above in addition to an Executive Summary intended for senior executives for a brief overview.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-loginradius\"\n        title=\"book-a-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"July 27, 2022","updated_date":null,"title":"Why is Data Privacy an Immediate Enterprise Priority?","tags":["data privacy","enterprises","regulations"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.342281879194631,"src":"/static/77d3a9854f69435d10d4960b59e05fbd/33aa5/dg-privacy.jpg","srcSet":"/static/77d3a9854f69435d10d4960b59e05fbd/f836f/dg-privacy.jpg 200w,\n/static/77d3a9854f69435d10d4960b59e05fbd/2244e/dg-privacy.jpg 400w,\n/static/77d3a9854f69435d10d4960b59e05fbd/33aa5/dg-privacy.jpg 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},{"node":{"fields":{"slug":"/growth/digital-trust-business-invest-2022/"},"html":"<h2 id=\"introduction\" style=\"position:relative;\"><a href=\"#introduction\" aria-label=\"introduction permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Introduction</h2>\n<p>The modern digital business landscape ensures a rich consumer experience that keeps customers loyal. However, that’s not the only way to earn trust; the critical role of digital trust in adequate security can’t be overlooked. </p>\n<p><a href=\"https://www.statista.com/statistics/587351/indentity-theft-complaints-frequency-in-the-us/\">Statistics</a> reveal that around 1,387,615 identity theft complaints were filed in the United States in 2020. And these numbers are rising exponentially every year. </p>\n<p>Businesses must reinforce their overall <a href=\"https://www.loginradius.com/blog/identity/strategies-secure-cloud-operations/\">information security infrastructure</a>, ensuring that crucial business information and customer details are secure.</p>\n<p>Whether we discuss securing access control or rethinking privacy policies, businesses skipping a small step in protecting customer information could lead to losses worth millions of dollars and reputational damages.</p>\n<p>Apart from this, cybercriminals are hunting for customer identities that can be impersonated to steal sensitive business information, which can be further exploited for financial benefits. </p>\n<p>Undoubtedly, investing in secure experiences isn’t a luxury anymore; it’s necessary for businesses offering online services through a website or a mobile application. </p>\n<p>Let’s uncover aspects of digital trust and where businesses need to invest to <a href=\"https://www.loginradius.com/blog/identity/loginradius-creates-trusted-digital-experience/\">earn digital trust</a> in 2022 and beyond. </p>\n<h2 id=\"why-does-digital-trust-matter-now-more-than-ever-before\" style=\"position:relative;\"><a href=\"#why-does-digital-trust-matter-now-more-than-ever-before\" aria-label=\"why does digital trust matter now more than ever before permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Why Does Digital Trust Matter Now More than Ever Before?</h2>\n<p>Today, the competition in every niche is neck-to-neck. And customers have endless options to choose from. Hence, businesses must ensure they aren’t losing a single potential customer because of poor information security hygiene. </p>\n<p>Besides, <a href=\"https://www.loginradius.com/blog/identity/data-governance-best-practices/\">global data privacy</a> and security regulations are becoming more stringent. If an organization isn’t complying with privacy and security regulations, including the GDPR and the CCPA, it’ll have to face penalties and reputational damages. </p>\n<p>Also, if a business faces any kind of data breach or customer identity theft, they’ll lose trust in their clients and potential clients. And this isn’t good from a business growth perspective. </p>\n<p>In a nutshell, any loophole in managing customer information can adversely impact customer loyalty, brand equity, and financial performance. </p>\n<p>Hence, it is essential to ensure digital trust in customers/users sharing their details. </p>\n<h2 id=\"how-can-businesses-earn-digital-trust\" style=\"position:relative;\"><a href=\"#how-can-businesses-earn-digital-trust\" aria-label=\"how can businesses earn digital trust permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How Can Businesses Earn Digital Trust?</h2>\n<p>Earning digital trust isn’t a piece of cake. Businesses should understand that their customers always expect a great user experience coupled with the assurance of robust security to their personal information. </p>\n<p>Here are some information security best practices that can be incorporated into a business to build trust in customers and potential customers. </p>\n<h3 id=\"1-multi-factor-authentication\" style=\"position:relative;\"><a href=\"#1-multi-factor-authentication\" aria-label=\"1 multi factor authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>#1. Multi-factor authentication</h3>\n<p><a href=\"https://www.loginradius.com/blog/identity/benefits-of-mfa/\">Multi-factor authentication</a> (or MFA)  is a multi-layered security system that verifies the identity of users for login or other transactions.</p>\n<p>The user account will remain secure by leveraging multiple authentication layers, even if one element is damaged or disabled. </p>\n<p>Codes generated by smartphone apps, answers to personal security questions, codes sent to an email address, fingerprints, etc., are a few examples of multi-factor authentication implemented in day-to-day scenarios.</p>\n<p>On the other hand, multi-factor authentication is considered one of the most efficient ways of providing improved security in recent times. The multiple layers ensure that users demanding access are who they claim to be. Even if cyber criminals steal one credential, they'll be forced to verify identities in another way. </p>\n<p>With the world heading toward more criminal sensitivities, using multi-factor authentication as part of your consumer identity and access management (CIAM) platform helps you build and maintain solid consumer trust.</p>\n<h3 id=\"2-single-sign-on-sso\" style=\"position:relative;\"><a href=\"#2-single-sign-on-sso\" aria-label=\"2 single sign on sso permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>#2. Single sign-on (SSO)</h3>\n<p>Introducing Single Sign-On (SSO) to your customers can offer greater security and improved usability, which are two of the many critical benefits of SSO.</p>\n<p>No one likes remembering credentials. Many use the same username and password, irrespective of the application. They exert a lot of pressure on the memory.</p>\n<p>This is where the Single Sign-On technology comes into focus and works like a breeze. </p>\n<p>Single Sign-On (SSO)  is a method of authentication that allows websites to use other trustworthy sites to verify users. Single sign-on enables users to log in to any independent application with a single ID and password.</p>\n<p>SSO is an essential feature of an Identity and Access Management (IAM) platform for controlling access. Verifying user identity is vital when it comes to knowing which permissions a user will have. </p>\n<p>The LoginRadius Identity platform is one example of managing access that combines user identity management solutions with <a href=\"https://www.loginradius.com/blog/identity/best-sso-providers-loginradius/\">SSO solutions</a>.</p>\n<h3 id=\"3-risk-based-authentication-rba\" style=\"position:relative;\"><a href=\"#3-risk-based-authentication-rba\" aria-label=\"3 risk based authentication rba permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>#3. Risk-Based Authentication (RBA)</h3>\n<p>Risk-based authentication is a non-static authentication system that considers the profile(IP address, Browser, physical Location, and so on) of a consumer requesting access to the system to determine the risk profile associated with that action. </p>\n<p>The risk-based implementation allows your application to challenge the consumer for additional credentials only when the risk level is appropriate.</p>\n<p>It is a method of applying various levels of stringency to authentication processes based on the likelihood that access to a given system could result in compromise. As the level of risk increases, the authentication process becomes more complicated and restrictive.</p>\n<p><a href=\"https://www.loginradius.com/resource/an-enterprises-guide-to-risk-based-authentication/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"GD-to-RBA\"\n        title=\"GD-to-RBA\"\n        src=\"/static/d57f9c65049003fa8427fb6d0893f180/e5715/GD-to-RBA.png\"\n        srcset=\"/static/d57f9c65049003fa8427fb6d0893f180/a6d36/GD-to-RBA.png 650w,\n/static/d57f9c65049003fa8427fb6d0893f180/e5715/GD-to-RBA.png 768w,\n/static/d57f9c65049003fa8427fb6d0893f180/81501/GD-to-RBA.png 2886w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<p>Risk-based authentication is an essential security feature because it works in real-time to prevent cyber frauds like accounts from getting compromised without causing an inconvenience for legitimate consumers. And thus building digital trust. </p>\n<h2 id=\"in-conclusion\" style=\"position:relative;\"><a href=\"#in-conclusion\" aria-label=\"in conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>In Conclusion</h2>\n<p>In a modern digital world, customers always expect great brand experiences, but that doesn’t mean they’re ready to compromise their sensitive information. </p>\n<p>Brands offering robust security mechanisms to protect their customers and sensitive information are always ahead of their competitors. </p>\n<p>Hence, businesses embarking on a digital transformation journey shouldn’t underestimate the true potential of a secure platform that promotes digital trust. </p>\n<p>The aspects mentioned above could help businesses build digital trust that further fosters growth in the future. </p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-Consultation\"\n        title=\"book-a-demo-Consultation\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"June 28, 2022","updated_date":null,"title":"Earning Digital Trust in 2022: Where Should Businesses Invest?","tags":["digital transformation","customer trust","enterprises"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.408450704225352,"src":"/static/941cb63b5638ac5547f7f78216540fb8/33aa5/digital-trust.jpg","srcSet":"/static/941cb63b5638ac5547f7f78216540fb8/f836f/digital-trust.jpg 200w,\n/static/941cb63b5638ac5547f7f78216540fb8/2244e/digital-trust.jpg 400w,\n/static/941cb63b5638ac5547f7f78216540fb8/33aa5/digital-trust.jpg 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}}]}},"pageContext":{"tag":"enterprises"}},"staticQueryHashes":["1171199041","1384082988","2100481360","23180105","528864852"]}