{"componentChunkName":"component---src-templates-tag-js","path":"/tags/online-security/","result":{"data":{"site":{"siteMetadata":{"title":"LoginRadius Blog"}},"allMarkdownRemark":{"totalCount":2,"edges":[{"node":{"fields":{"slug":"/identity/online-security-passkeys/"},"html":"<h2 id=\"why-passkeys\" style=\"position:relative;\"><a href=\"#why-passkeys\" aria-label=\"why passkeys permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Why Passkeys?</h2>\n<p>Passkeys are transforming the way we approach authentication by providing a future-proof alternative to traditional password systems. Why passkeys? They offer significant passkey benefits, such as reducing the risk of phishing, eliminating password reuse, and utilizing cryptographic keys that can't be easily stolen or hacked. Unlike passwords, passkeys use a public-private key pair, with the private key securely stored on the user’s device and never exposed to external threats.</p>\n<p>For developers, implementing passkey login across your applications not only simplifies the user experience but also enhances security. The shift towards Google passkey login and Microsoft passkey login showcases how maj=or tech platforms are leading the way in adopting passwordless authentication. Developers can leverage these systems to integrate passkeys seamlessly into their existing infrastructure, offering a consistent and secure authentication method across different ecosystems.</p>\n<p>Passkeys also align with modern privacy standards and regulations, making it easier for developers to build apps that meet compliance requirements such as GDPR and CCPA. The reduced friction in how to sign in with a passkey can result in better user retention, as users no longer need to worry about managing complex passwords or resetting credentials frequently.</p>\n<h2 id=\"introduction\" style=\"position:relative;\"><a href=\"#introduction\" aria-label=\"introduction permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Introduction</h2>\n<p>In the ever-evolving cybersecurity landscape, traditional passwords are rapidly becoming a tradition of the past. As we step into a new era of digital security, passkeys are emerging as a revolutionary solution. </p>\n<p>Imagine a world where you no longer need to remember countless complex passwords, where the frustration of password resets is a distant memory, and where your online accounts are protected by an impenetrable shield of advanced cryptographic technology. This is not a far-off dream but a reality made possible by passkeys. </p>\n<p>Passkeys promise a future where our digital lives are secured with the highest level of protection, ensuring that only you have access to your personal information. </p>\n<p>Let’s explore passkeys' transformative power and how they <a href=\"https://www.loginradius.com/blog/identity/login-security/\">redefine online security</a>. From understanding what passkeys are and how they reinforce authentication security to discussing their critical importance in today's threat landscape, and finally, examining how they lay the foundation for a robust security infrastructure through Multi-Factor Authentication (MFA), this blog will explain why passkeys are the key to unlocking the future of digital security.</p>\n<h2 id=\"passkey-authentication-vs-passwords\" style=\"position:relative;\"><a href=\"#passkey-authentication-vs-passwords\" aria-label=\"passkey authentication vs passwords permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Passkey Authentication vs. Passwords</h2>\n<p>The contrast between passkeys vs passwords highlights the limitations of traditional authentication methods. Passwords are often reused across multiple services, making them vulnerable to breaches and cyberattacks. Moreover, password management tools, while helpful, introduce additional layers of complexity for users and potential security risks if compromised. Passkeys, on the other hand, provide a cryptographically secure solution where users no longer need to remember or manage multiple passwords.</p>\n<p>For developers, the shift from passwords to passkeys means rethinking how authentication is handled. Passkeys introduce an entirely new way of securing user identities by using public and private key pairs. When a user signs in with a passkey, the service requests the public key, and only the private key stored securely on the device can respond to the challenge. This makes passkey login resistant to phishing and man-in-the-middle attacks, which are common with passwords.</p>\n<p>Passkeys also enhance the user experience across different platforms. With passkeys Apple and passkeys Android, users can authenticate using biometrics like Face ID or fingerprint recognition, adding a second layer of security. For developers, this means integrating passkey benefits directly into their apps and services, ensuring stronger protection without sacrificing convenience. The reduction in password-related support issues, such as password resets or account recovery, is another significant advantage for development teams.</p>\n<h2 id=\"is-passkey-authentication-the-same-as-passwordless-authentication\" style=\"position:relative;\"><a href=\"#is-passkey-authentication-the-same-as-passwordless-authentication\" aria-label=\"is passkey authentication the same as passwordless authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Is Passkey Authentication the Same as Passwordless Authentication?</h2>\n<p>While passkey authentication and passwordless authentication share similarities, it's essential to understand the distinction. Passwordless authentication simply means the user is not required to enter a traditional password; however, it can still involve less secure methods like magic links or one-time codes. Passkey login, by contrast, utilizes cryptographic methods, ensuring that authentication is not just passwordless but also far more secure.</p>\n<p>For example, in a Google passkey login scenario, when a user tries to sign in, they don’t enter a password. Instead, the service sends a challenge to the user's device, which is signed using the private key stored on the device. This signed response is sent back, verifying the user's identity. The same process happens with Microsoft Passkey login.</p>\n<p>Developers implementing passkeys in their applications should note the ease of adoption. How to sign in with a passkey is simplified, especially when coupled with biometrics or hardware security keys. Users on passkeys Apple or passkeys Android devices can authenticate through familiar and secure means, such as facial recognition or fingerprint scanning. For developers, integrating this technology means building more secure apps that protect users' identities without requiring passwords, reducing the attack surface for potential breaches.</p>\n<p>Adopting passkeys also strengthens Multi-Factor Authentication (MFA) strategies. Passkeys serve as one of the strongest factors in MFA, reducing the need for additional steps like SMS or email codes, which can be vulnerable to interception. By combining passkeys with biometrics or device-based authentication, developers can create robust, future-proof authentication systems that are both highly secure and user-friendly.</p>\n<h2 id=\"what-are-passkeys\" style=\"position:relative;\"><a href=\"#what-are-passkeys\" aria-label=\"what are passkeys permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What are Passkeys?</h2>\n<p>Passkeys, also known as cryptographic keys or security keys, are a modern alternative to traditional passwords. Unlike passwords, which are often reused, weak, or easily compromised, passkeys provide higher security through advanced cryptographic techniques.</p>\n<h3 id=\"how-passkeys-work\" style=\"position:relative;\"><a href=\"#how-passkeys-work\" aria-label=\"how passkeys work permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How Passkeys Work</h3>\n<p>Passkeys function by using public and private key pairs. When you register a device or an account with a service, a unique pair of keys is generated:</p>\n<ul>\n<li><strong>Public Key:</strong> Stored on the server and used to verify your identity.</li>\n<li><strong>Private Key:</strong> Stored securely on your device and never shared.</li>\n</ul>\n<p>When you attempt to log in, the service sends a challenge that can only be answered correctly with your private key. This ensures that only you can authenticate, as the private key never leaves your device and is <a href=\"https://www.loginradius.com/blog/identity/phishing-resistant-mfa-login-mobile-apps/\">protected from phishing </a>and other attacks.</p>\n<h3 id=\"reinforcing-authentication-security\" style=\"position:relative;\"><a href=\"#reinforcing-authentication-security\" aria-label=\"reinforcing authentication security permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Reinforcing Authentication Security</h3>\n<p>Passkeys eliminate many vulnerabilities associated with passwords:</p>\n<ul>\n<li><strong>No Password Reuse:</strong> Since there are no passwords, the risk of reusing weak or compromised passwords across multiple sites is eradicated.</li>\n<li><strong>Resistant to Phishing:</strong> Phishing attacks are ineffective because there is no password to steal.</li>\n<li><strong>Strong Cryptography:</strong> Passkeys use robust cryptographic algorithms, making them difficult to crack.</li>\n</ul>\n<h2 id=\"why-passkeys-are-now-crucial-more-than-ever-before\" style=\"position:relative;\"><a href=\"#why-passkeys-are-now-crucial-more-than-ever-before\" aria-label=\"why passkeys are now crucial more than ever before permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Why Passkeys Are Now Crucial More Than Ever Before</h2>\n<p>The need for passkeys has never been more urgent. The digital world is expanding rapidly, and with it, the threats to online security are becoming more sophisticated.</p>\n<h3 id=\"increasing-cyber-threats\" style=\"position:relative;\"><a href=\"#increasing-cyber-threats\" aria-label=\"increasing cyber threats permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Increasing Cyber Threats</h3>\n<p>Cybercriminals are continuously developing new methods to breach security systems. Traditional passwords, even with complexity requirements, are often not enough to protect against these evolving threats. Data breaches, phishing attacks, and credential stuffing are becoming more common, highlighting the need for a more secure authentication method.</p>\n<h3 id=\"regulatory-compliance\" style=\"position:relative;\"><a href=\"#regulatory-compliance\" aria-label=\"regulatory compliance permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Regulatory Compliance</h3>\n<p>Regulatory bodies worldwide are enforcing stricter data protection laws. Compliance with regulations like <a href=\"https://www.loginradius.com/customer-privacy/\">GDPR and CCPA</a> often requires implementing stronger security measures, including advanced authentication methods. Passkeys align well with these requirements, providing a robust solution that helps organizations meet compliance standards.</p>\n<h3 id=\"user-convenience\" style=\"position:relative;\"><a href=\"#user-convenience\" aria-label=\"user convenience permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>User Convenience</h3>\n<p>In addition to enhanced security, passkeys offer greater convenience for users. The need to remember and manage multiple passwords is eliminated, leading to a smoother and more user-friendly authentication experience. This ease of use encourages adoption and helps maintain high-security standards without compromising user experience.</p>\n<p><a href=\"https://www.loginradius.com/resource/datasheet/passwordless-login-magic-link-otp/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"DS-pswrdless-login-magic-link\"\n        title=\"DS-pswrdless-login-magic-link\"\n        src=\"/static/080d729534ed7c510139db40ae1aefa4/e5715/DS-pswrdless-login-magic-link.png\"\n        srcset=\"/static/080d729534ed7c510139db40ae1aefa4/a6d36/DS-pswrdless-login-magic-link.png 650w,\n/static/080d729534ed7c510139db40ae1aefa4/e5715/DS-pswrdless-login-magic-link.png 768w,\n/static/080d729534ed7c510139db40ae1aefa4/81501/DS-pswrdless-login-magic-link.png 2886w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<h2 id=\"how-mfa-with-passkeys-helps-lay-the-foundation-of-a-robust-security-infrastructure\" style=\"position:relative;\"><a href=\"#how-mfa-with-passkeys-helps-lay-the-foundation-of-a-robust-security-infrastructure\" aria-label=\"how mfa with passkeys helps lay the foundation of a robust security infrastructure permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How MFA with Passkeys Helps Lay the Foundation of a Robust Security Infrastructure</h2>\n<p>Multi-factor authentication (MFA) has long been a cornerstone of strong security practices. <a href=\"https://www.loginradius.com/multi-factor-authentication/\">Integrating passkeys into MFA</a> frameworks further enhances their effectiveness.</p>\n<h3 id=\"strengthening-mfa\" style=\"position:relative;\"><a href=\"#strengthening-mfa\" aria-label=\"strengthening mfa permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Strengthening MFA</h3>\n<p>Passkeys add an extra layer of security to MFA by providing a secure and seamless authentication factor. When combined with other factors such as biometrics (fingerprint or facial recognition) or a secondary device, passkeys significantly reduce the risk of unauthorized access.</p>\n<h3 id=\"example-of-passkey-enabled-mfa\" style=\"position:relative;\"><a href=\"#example-of-passkey-enabled-mfa\" aria-label=\"example of passkey enabled mfa permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Example of Passkey-Enabled MFA</h3>\n<p>Consider a scenario where you are logging into a sensitive application:</p>\n<ol>\n<li><strong>First Factor:</strong> Enter your username.</li>\n<li><strong>Second Factor:</strong> Use a <a href=\"https://www.loginradius.com/blog/identity/biometric-multi-factor-authentication/\">biometric scan</a> (fingerprint or facial recognition) on your device.</li>\n<li><strong>Third Factor:</strong> The application sends a challenge to your device, which is signed using your private key (passkey).</li>\n</ol>\n<p>This multi-layered approach ensures that only you can access your account, even if one factor is compromised.</p>\n<h3 id=\"future-proof-security\" style=\"position:relative;\"><a href=\"#future-proof-security\" aria-label=\"future proof security permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Future-Proof Security</h3>\n<p>Adopting passkeys as part of your MFA strategy ensures your security infrastructure is prepared for future threats. </p>\n<p>As cyber-attacks become more sophisticated, having a <a href=\"loginradius.com\">robust and adaptable authentication system</a> in place is critical. Passkeys provide the flexibility and strength needed to withstand these challenges, making them a key component of any forward-looking security strategy.</p>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>Passkeys are paving the way for a more secure and user-friendly digital world as we move away from traditional passwords. </p>\n<p>Organizations and individuals alike can embrace this revolutionary technology by understanding passkeys, why they are crucial, and how they can be integrated into a robust security infrastructure. Say goodbye to passwords and hello to a safer, more secure online experience.</p>\n<h2 id=\"faqs\" style=\"position:relative;\"><a href=\"#faqs\" aria-label=\"faqs permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>FAQs</h2>\n<p><strong>1. What is a passkey?</strong></p>\n<p>A passkey is a cryptographic key pair used for secure authentication, replacing traditional passwords. It ensures only the device with the private key can verify a user's identity.</p>\n<p><strong>2. What are the use cases for passkeys?</strong></p>\n<p>Passkeys are ideal for securing online accounts, enhancing app authentication, and improving the login process for web services across platforms like Google, Apple, and Microsoft.</p>\n<p><strong>3. How does a user experience passkeys?</strong></p>\n<p>Users experience passkeys by signing in without passwords, typically using biometrics (fingerprint or facial recognition) on devices like smartphones or laptops for seamless authentication.</p>\n<p><strong>4. Why are passkeys better than passwords?</strong></p>\n<p>Passkeys eliminate common password vulnerabilities, such as reuse and phishing, by using cryptographic keys that never leave the user’s device, making them far more secure.</p>\n<p><strong>5. Are passkeys considered MFA?</strong></p>\n<p>Yes, passkeys can be part of Multi-Factor Authentication (MFA) when combined with another factor, such as biometrics or a security token, for added security.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-free-demo-loginradius\"\n        title=\"book-a-free-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"June 20, 2024","updated_date":null,"title":"Say Goodbye to Passwords: How Passkeys Are Reinventing Online Security","tags":["online security","passwordless login","compliance"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5037593984962405,"src":"/static/a348165602ba419acb5957b3e69ff8fc/33aa5/passkey.jpg","srcSet":"/static/a348165602ba419acb5957b3e69ff8fc/f836f/passkey.jpg 200w,\n/static/a348165602ba419acb5957b3e69ff8fc/2244e/passkey.jpg 400w,\n/static/a348165602ba419acb5957b3e69ff8fc/33aa5/passkey.jpg 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"Kundan Singh","github":null,"avatar":null}}}},{"node":{"fields":{"slug":"/identity/10-black-friday-cyber-monday-tips-for-businesses/"},"html":"<h2 id=\"introduction\" style=\"position:relative;\"><a href=\"#introduction\" aria-label=\"introduction permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Introduction</h2>\n<p>As we head into the Cyber Monday and Black Friday holiday shopping season, it is no secret that hackers are on the prowl during this time of year.</p>\n<p>2023 has already witnessed several <a href=\"https://blog.loginradius.com/identity/cybersecurity-attacks-business/\">high-profile breaches</a> at major retailers like Shein and Morinaga. It's imperative that you take every step possible to protect your company and your customers from falling victim to these attacks. </p>\n<p>Here is a list of top security tips to keep your business safe on Black Friday and Cyber Monday. </p>\n<h2 id=\"how-to-stay-safe-as-you-navigate-through-the-holiday-shopping-season\" style=\"position:relative;\"><a href=\"#how-to-stay-safe-as-you-navigate-through-the-holiday-shopping-season\" aria-label=\"how to stay safe as you navigate through the holiday shopping season permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How To Stay Safe As You Navigate Through The Holiday Shopping Season?</h2>\n<h3 id=\"1-order-management-system-oms-to-simplify-e-commerce-business\" style=\"position:relative;\"><a href=\"#1-order-management-system-oms-to-simplify-e-commerce-business\" aria-label=\"1 order management system oms to simplify e commerce business permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. Order Management System (OMS) to simplify e-Commerce business</h3>\n<p>Retailers everywhere are getting ready for the busiest time of the year. But with that busyness comes added security concerns, and there are several ways having a good quality Order Management System (OMS) in place can help retailers manage the chaos more profitably and efficiently. </p>\n<p>This includes fulfilling from the best location based on sell-through rate or markdown price, including location capacity for online orders in your sourcing logic, or using third-party logistics (3PL) or drop-ship vendors (DSV) to expand their range and availability.</p>\n<h3 id=\"2-partnering-with-a-comprehensive-cloud-hosting-solution\" style=\"position:relative;\"><a href=\"#2-partnering-with-a-comprehensive-cloud-hosting-solution\" aria-label=\"2 partnering with a comprehensive cloud hosting solution permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. Partnering with a comprehensive cloud-hosting solution.</h3>\n<p>Black Friday is a busy time for retailers, and it's hard to keep up with the demands of your customers. But one thing that's essential and often overlooked is ensuring you have a comprehensive security solution to keep everyone safe. </p>\n<p>One of the most important steps a retailer can take is to partner with a comprehensive cloud hosting solution that includes hybrid-ready product portfolios, core uptime, iron-clad security solutions, and an extensive network that addresses industry-specific requirements and can be trusted in times of high traffic to deliver a quality experience for customers.</p>\n<h3 id=\"3-maintain-vigilance-and-follow-established-security-best-practices\" style=\"position:relative;\"><a href=\"#3-maintain-vigilance-and-follow-established-security-best-practices\" aria-label=\"3 maintain vigilance and follow established security best practices permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3. Maintain vigilance and follow established security best practices.</h3>\n<p>Black Friday is the most exciting time of year for many people, but it can also bring stress for those who work in retail and delivery. While there are many reasons why certain products may not be on store shelves or deliveries may be delayed, <a href=\"https://blog.loginradius.com/identity/loginradius-ciam-retail-ecommerce-business/\">cybersecurity in retail</a> should not be overlooked as a factor. </p>\n<p>As the retail supply chain becomes increasingly digital and interconnected, a single cyberattack on one company along the chain can quickly impact the entire chain. To ensure the security of their sensitive data, businesses must maintain vigilance while following their established security best practices. </p>\n<p>Businesses must be able to protect sensitive data, maintain secure access points, and interact with other companies through the cloud. However, they must also be wary of how interwoven their supply chains are as they interact with other companies through the cloud.</p>\n<h3 id=\"4-the-right-email-personalization-can-lead-to-increased-revenue\" style=\"position:relative;\"><a href=\"#4-the-right-email-personalization-can-lead-to-increased-revenue\" aria-label=\"4 the right email personalization can lead to increased revenue permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>4. The right email personalization can lead to increased revenue.</h3>\n<p>For email marketers, the weeks leading up to Black Friday can be just as chaotic. As online shopping continues to grow in popularity, email inboxes are packed with promotional offers from all types of businesses.</p>\n<p>With so much to do, how can you ensure you maximize your revenue opportunity? One way is to focus on deliverability is are your messages landing in the inbox. Once that's addressed, the other key is to target audiences based on each individual's interests.</p>\n<p>The e-commerce business tends to peak around this time of year, so companies must get ahead of the competition when building advanced personalization into their email strategies. The right email program will attract new customers and keep them coming back.</p>\n<h3 id=\"5-a-pragmatic-and-strategic-approach-to-security\" style=\"position:relative;\"><a href=\"#5-a-pragmatic-and-strategic-approach-to-security\" aria-label=\"5 a pragmatic and strategic approach to security permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>5. A pragmatic and strategic approach to security.</h3>\n<p>Black Friday is an excellent opportunity for retailers to make lots of money before the end of the year. While we all know this event's importance, some retailers may have already been exploited by hackers holding off and the ransomware lying dormant until it can do maximum damage. </p>\n<p>As a retailer, your organization will likely experience a significant increase in traffic and activity. This can be a blessing as well as a curse, meaning more people are visiting your website or brick-and-mortar store. Still, it also means that you must be extra vigilant about security to keep customers from being exposed to malicious activity.</p>\n<p>To avoid this, retailers need to shift to a more pragmatic and strategic security approach to ensure the organization can recover quickly from a cybersecurity event and get back to business with zero data loss.</p>\n<p><a href=\"https://www.loginradius.com/resource/zero-trust-security/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAGCAYAAADDl76dAAAACXBIWXMAAAsSAAALEgHS3X78AAABqElEQVQY0z2R20tUURTGD1p5zpnTMKCRtyRv42V0vNKZi6WOM0zghVHE0GIYDEQKHZDqwdSKHirBDJ+CEEGRDCR0IrwhCaKoUMxbL4F/yq81c7KHDzZ7re+3vr22ojlbSEmvbMVW3Y5R3Yatqg1DZJO7i3pKapkP3RUgx9NLtrsDrSaIKj1quR/1X4+ShpX7cAzPoT3bIHNkmczoJ9SBBeyRN9gbegTktaBiNGpDFAUGcQXvoZt9qO4wutNvDZS6Yk32UvRkCffHX7jeHVDxYourD1dQut9jb4xI3SPNLeTUBclvvkt+U5hr9SEKmsPkyfl6YxhbxW0LmIqqC1CPL6LN/0Sb2UedSHA5JkkjH7A39aKlE1oGXYyFZieFtzq54enCURvgSqn3/1rSCTXZTf/sF1oX9nHPHXBz/oyMyV2U0TUMcwDD6UPJa+Dx9Cy//5zzdesHnzd3WEvscniWZO/wFEeNgIWj6AK8VOpj+/s3jrcTrCSOeLV+QujlKoOrSXIDUbJKTDKKPZg9MR49f8v9+DRDY1MMjU8x/PQ1D+Iz8ol3yJIX/AWAmtsQou9SjQAAAABJRU5ErkJggg=='); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"WP-Zero-Trust-Security-1\"\n        title=\"WP-Zero-Trust-Security-1\"\n        src=\"/static/1899738346b212558cc624397cb31d32/e5715/WP-Zero-Trust-Security-1.png\"\n        srcset=\"/static/1899738346b212558cc624397cb31d32/a6d36/WP-Zero-Trust-Security-1.png 650w,\n/static/1899738346b212558cc624397cb31d32/e5715/WP-Zero-Trust-Security-1.png 768w,\n/static/1899738346b212558cc624397cb31d32/81501/WP-Zero-Trust-Security-1.png 2886w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<h3 id=\"6-think-of-uptime-as-an-opportunity-to-maximize-efficiency\" style=\"position:relative;\"><a href=\"#6-think-of-uptime-as-an-opportunity-to-maximize-efficiency\" aria-label=\"6 think of uptime as an opportunity to maximize efficiency permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>6. Think of uptime as an opportunity to maximize efficiency.</h3>\n<p>As consumers go online in huge numbers to look for bargains, many retailers will be taking steps to ensure their sites can <a href=\"https://blog.loginradius.com/identity/scale-business-with-identity-management/\">handle the increase in traffic</a> and deliver a seamless experience. Retailers can stay up and running during the Black-Friday Cyber-Monday weekend by controlling their updates to key systems. </p>\n<p>Make sure your site can handle an influx of visitors. You should test your site before Black Friday to see how it's performing under heavy load. </p>\n<p>Make sure there's an immediate response for any hotfixes required for any issues that crop up. Once the weekend is over, and ideally, lots of sales have come through, release managers can get back to scheduling regular updates to improve the website and improve customer experience.</p>\n<h3 id=\"7-avoid-the-use-of-links-in-emails-to-avoid-phishing-scams\" style=\"position:relative;\"><a href=\"#7-avoid-the-use-of-links-in-emails-to-avoid-phishing-scams\" aria-label=\"7 avoid the use of links in emails to avoid phishing scams permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>7. Avoid the use of links in emails to avoid phishing scams.</h3>\n<p>Cybercriminals also use Black Friday as an opportunity to target companies and their employees with phishing emails. These emails appear to be from a legitimate retailer, but they are actually a way for malicious actors to infiltrate your business and steal your customer's data. </p>\n<p>Links included in emails from retailers can direct you to scam sites, which can lead to stealing your login credentials, your payment info, or even funds when you are trying to place an order through them. Rather than clicking on email links, you can shop directly from the retailer’s website.</p>\n<h3 id=\"8-ensure-your-data-privacy-practices-are-in-check\" style=\"position:relative;\"><a href=\"#8-ensure-your-data-privacy-practices-are-in-check\" aria-label=\"8 ensure your data privacy practices are in check permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>8. Ensure your data privacy practices are in check.</h3>\n<p>It's essential that you follow <a href=\"https://blog.loginradius.com/identity/data-security-best-practices/\">good data privacy practices</a> as outlined in the EU's General Data Protection Regulation (GDPR) and Canada's Personal Information Protection and Electronic Documents Act (PIPEDA).</p>\n<h3 id=\"9-regularly-scan-your-site-for-malware-infection\" style=\"position:relative;\"><a href=\"#9-regularly-scan-your-site-for-malware-infection\" aria-label=\"9 regularly scan your site for malware infection permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>9. Regularly scan your site for malware infection.</h3>\n<p>The holiday season is a time for relaxing, spending time with family and friends, and giving back. But it's also the perfect opportunity to hop on your favorite shopping site, grab some great deals, and get in some last-minute gift buying. Unfortunately, as you're browsing for those perfect presents for your loved ones, cybercriminals are doing the same thing: looking for new victims to steal from.</p>\n<p>In fact, studies show that many hackers will launch their attacks during the holiday season to take advantage of people's busy schedules and distractions with family gatherings. That's why it's time to start thinking about how to protect yourself against these attacks and what steps your company should take to keep employees and customers safe during the busy time of the year.</p>\n<h3 id=\"10-increase-your-cyber-security-by-using-two-factor-authentication\" style=\"position:relative;\"><a href=\"#10-increase-your-cyber-security-by-using-two-factor-authentication\" aria-label=\"10 increase your cyber security by using two factor authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>10. Increase your cyber security by using two-factor authentication.</h3>\n<p>Black Friday is a great time to get deals on the products you want and need, but it's also a prime time for cybercriminals to try to get their hands on your personal information. </p>\n<p>Two-factor authentication (2FA) or <a href=\"https://www.loginradius.com/multi-factor-authentication/\">multi-factor authentication</a> (MFA) is designed to help stop cybercriminals from accessing accounts even if they obtain your passwords. It's critical to ensure that any new device trying to log in or make account changes needs a second layer of security before access is given. Some standard methods of 2FA include a single-use code being sent via SMS, email, phone, or smartphone application.</p>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>When you take some time to craft a post-purchase journey tailored to your customer's needs, you not only control how they engage with your brand, you build trust and prove that you're invested in a relationship with them. And by keeping your best customers happy and coming back again and again, you'll see your customer lifetime value grow.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAGCAYAAADDl76dAAAACXBIWXMAAAsSAAALEgHS3X78AAABdElEQVQY002RO0/CUBzFG6PtbZWHCAmRmBB5P8vDII9SSC0omog4oAEGjZMO6OKEuLjoJ2Fx0cSBwUQnXZxcHPwux38LJA7nNvfec8+5v1tOCCiwpbbhye2BxbYgBMtgIRVioDRRsARGXxZUzLlEHmehBaesQ4rrEMPViYf2DR9nDGKkChbVICVqsMt1WJI1sHCFwhUsUIFohJH49TxECvRUjhDW2mAbB5iP6hB8hUkhiRPN5KIZYJdrsEYrcCSpmQqMm6/m9ylUhSulY7N5ivROB3L9GOlGF3Ktbc4zuz341UPw/uIk0ESbBjoSGlYIx8BfzjSwVmyCEYEUUmCPa3Bnd+hwC75yC95S05SxbolU/iEbOCFCpDexEfIioTNCNd6Tp6IlMnNuGeeDe3z//OLx5RWj5zFGT2O8fXxh/P4Ja6w6vSEFCnTIlW2YiDzhzX7ATFKojDlvjpBPcDF4QPdyiG5/iE7/BmfXd+hd3VKpCoG8fzxWw2+c+yTpAAAAAElFTkSuQmCC'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-free-demo-loginradius\"\n        title=\"book-a-free-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"November 23, 2022","updated_date":null,"title":"10 Ways To Keep Your Business Safe On Black Friday and Cyber Monday","tags":["online shopping","online security","cx"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.834862385321101,"src":"/static/423f683b956f4f54a721ad0f32f9a33b/33aa5/cyber-monday.jpg","srcSet":"/static/423f683b956f4f54a721ad0f32f9a33b/f836f/cyber-monday.jpg 200w,\n/static/423f683b956f4f54a721ad0f32f9a33b/2244e/cyber-monday.jpg 400w,\n/static/423f683b956f4f54a721ad0f32f9a33b/33aa5/cyber-monday.jpg 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"Navanita Devi","github":null,"avatar":null}}}}]}},"pageContext":{"tag":"online security"}},"staticQueryHashes":["1171199041","1384082988","2100481360","23180105","528864852"]}