{"componentChunkName":"component---src-templates-tag-js","path":"/tags/security/","result":{"data":{"site":{"siteMetadata":{"title":"LoginRadius Blog"}},"allMarkdownRemark":{"totalCount":32,"edges":[{"node":{"fields":{"slug":"/identity/security-ux-can-coexist/"},"html":"<h2 id=\"introduction\" style=\"position:relative;\"><a href=\"#introduction\" aria-label=\"introduction permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Introduction</h2>\n<p>The modern digital landscape is about delivering customers the best user experience at every touch point. However, it doesn’t mean that security could be compromised while crafting the best user experiences. </p>\n<p>However, many organizations catering to clients online strongly believe that either they could deliver a great user experience or add multiple layers of security that would add more friction while users interact with their platform. </p>\n<p>So, does it mean that renowned brands that have established their business over the years aren’t concerned with the security and privacy of their customers? And do they have an excellent fortune in <a href=\"https://www.loginradius.com/security/\">safeguarding their customers’ identities</a>? </p>\n<p>Unfortunately, that is not true! </p>\n<p>Businesses have leveraged a robust customer identity and access management (CIAM) solution for years to secure customer identities and eventually deliver a seamless user experience across multiple touchpoints. </p>\n<p>Let’s figure out how a CIAM does wonders for a business while creating a perfect user experience and security harmony. </p>\n<h2 id=\"how-ciam-offers-a-great-user-experience-and-robust-security\" style=\"position:relative;\"><a href=\"#how-ciam-offers-a-great-user-experience-and-robust-security\" aria-label=\"how ciam offers a great user experience and robust security permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How CIAM Offers a Great User Experience and Robust Security?</h2>\n<p>With a customer identity and access management solution, businesses could leverage the true potential of <a href=\"https://www.loginradius.com/authentication/\">seamless authentication</a> in a number of ways. For example, users can sign in or sign up through their email, social media, or phone. And this gives them a seamless experience since the old-school user id password method doesn't work in today's era. </p>\n<p>On the other hand, when it comes to security, a cloud-based CIAM like LoginRadius offers MFA and RBA to ensure the highest level of customer data security, even in high-risk situations.</p>\n<p>In a nutshell, businesses need not compromise security while crafting the best user experience for their customers when they choose a reliable CIAM. </p>\n<p>Aside from playing a vital role in enhancing consumers' experience as they interact with brands, CIAM is also a seamless business enabler. The best CIAM platforms deliver seamless registration, secure consumer identity management, and control of consumer access to applications, systems, and services.</p>\n<p>Being a solution that simplifies the entire consumer experience - CIAM is now seen as a business enabler. It allows consumers to connect across devices and touchpoints in a way that suits them best.</p>\n<h2 id=\"what-if-a-business-is-already-using-a-legacy-iam-solution\" style=\"position:relative;\"><a href=\"#what-if-a-business-is-already-using-a-legacy-iam-solution\" aria-label=\"what if a business is already using a legacy iam solution permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What if a Business is Already Using a Legacy IAM Solution?</h2>\n<p>Many enterprises aren’t aware of the fact that most of the legacy IAM systems may support customer identity management but aren’t designed in a way to deliver security and user experience. </p>\n<p>As a result, most businesses fall prey to various data breaches leading to compromised customers’ identities and crucial business information. </p>\n<p>They have to understand that the conventional IAM systems were designed to function within an organization with a limited number of user identities. And thus, its security aspects were limited, and the user experience part was never emphasized. </p>\n<p>Hence, the one’s still relying on the conventional IAMs should immediately think about switching to a robust CIAM like LoginRadius if they wish to manage heaps of customer identities securely without compromising user experience. </p>\n<p><strong>Read More: Is Buying a CIAM Solution Better Than Building Your Own? <a href=\"https://www.loginradius.com/resource/ciam-build-vs-buy/\">Try Our Calculator</a></strong></p>\n<h2 id=\"why-choose-loginradius-ciam-for-seamless-and-secure-authentication-and-authorization\" style=\"position:relative;\"><a href=\"#why-choose-loginradius-ciam-for-seamless-and-secure-authentication-and-authorization\" aria-label=\"why choose loginradius ciam for seamless and secure authentication and authorization permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Why Choose LoginRadius CIAM for Seamless and Secure Authentication and Authorization?</h2>\n<p><a href=\"https://www.loginradius.com/\">LoginRadius' modern CIAM solution</a> is designed to be more flexible and intuitive. It addresses every subtle component that can improve consumers' experience while providing an unmatched safeguard for private data.</p>\n<p>What puts LoginRadius ahead of the curve are the three most fundamental aspects:</p>\n<ul>\n<li><strong>Seamless security:</strong> Strengthened security doesn't have to come at the cost of convenience. LoginRadius' modern CIAM solution, like MFA RBA, <a href=\"https://www.loginradius.com/passwordless-login/\">passwordless login</a>, phone login, social login, etc., ensures there is no friction while authenticating.</li>\n<li><strong>Privacy management:</strong> Proficient privacy management is the key to winning the trust of consumers. Our new-age CIAM solution considers every subtle privacy concern related to international regulations like the GDPR and the CCPA.</li>\n<li><strong>Flawless integration:</strong> Another feature that sets LoginRadius' new-age CIAM apart from the rest is the flawless integration with modern tools that are geared to offer smooth and secure access.</li>\n</ul>\n<h2 id=\"final-thoughts\" style=\"position:relative;\"><a href=\"#final-thoughts\" aria-label=\"final thoughts permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Final Thoughts</h2>\n<p>User experience plays a vital role in enhancing overall business growth in the digital landscape. However, security for customer identities and business data matters equally.</p>\n<p>Security is critical to any enterprise and an essential component of protecting data transmitted over the internet. This includes personal information such as credit card numbers and social security numbers and business data such as intellectual property or financial records.</p>\n<p>User experience is equally important to ensure users are comfortable and engaged while using your product or service. When it comes to authentication and authorization, this means being able to provide an intuitive user experience in which customers can easily sign up for an account or access their accounts on mobile devices without needing assistance from support staff members.</p>\n<p>With a new-age CIAM solution like LoginRadius CIAM, balancing security with user experience is a breeze. </p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"LoginRadius Book a Demo\"\n        title=\"LoginRadius Book a Demo\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"January 12, 2023","updated_date":null,"title":"Can Security and User Experience Co-Exist in the Authenticating and Authorizing Space?","tags":["security","user experience","customer identity"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.834862385321101,"src":"/static/041285e0d5185bcdd4190e836604b909/49b36/ux-security.jpg","srcSet":"/static/041285e0d5185bcdd4190e836604b909/f836f/ux-security.jpg 200w,\n/static/041285e0d5185bcdd4190e836604b909/2244e/ux-security.jpg 400w,\n/static/041285e0d5185bcdd4190e836604b909/49b36/ux-security.jpg 512w","sizes":"(max-width: 512px) 100vw, 512px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},{"node":{"fields":{"slug":"/identity/how-ciam-helps-ott-platforms-scale-million-viewers/"},"html":"<h2 id=\"introduction\" style=\"position:relative;\"><a href=\"#introduction\" aria-label=\"introduction permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Introduction</h2>\n<p>The last couple of years have been great for OTT (over the top) platforms since the global entertainment and content distribution industry witnessed a paradigm shift. </p>\n<p>Admit it, the craze for going out for a movie on the weekend is fading out and is being swiftly replaced by enjoying your favorite series and movies at the comfort of your recliner or even your bed! </p>\n<p>Yes, OTT platforms have revolutionized the entire entertainment industry for good. However, specific challenges pertaining to consumer experience are still the bottlenecks of various OTT service providers.</p>\n<p>One such major challenge among the content distribution channel is to manage the ever-surging demands of the viewers on multiple platforms. </p>\n<p>Today, <a href=\"https://www.loginradius.com/scalability/\">handling billions of identities</a> is a steep climb for media businesses, especially when every viewer demands an omnichannel experience. </p>\n<p>Here’s where an identity management solution can be a game-changer.</p>\n<p>Let’s understand how a consumer identity and access management (CIAM) solution could help OTT platforms to handle scalability-related dilemmas like a breeze. </p>\n<h2 id=\"ciam-and-ott--meant-for-each-other\" style=\"position:relative;\"><a href=\"#ciam-and-ott--meant-for-each-other\" aria-label=\"ciam and ott  meant for each other permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>CIAM and OTT — Meant for Each Other</h2>\n<p>No OTT business can give precise predictions regarding the upsurge in the number of daily signups or subscriptions in today’s era when the internet has become the second home for most of us.</p>\n<p>Thus, businesses need to understand the importance of a robust and scalable CIAM solution that can handle a sudden rush in the number of logins or sign-ups without hampering the user experience.</p>\n<p>With a <a href=\"https://www.loginradius.com/blog/identity/customer-identity-and-access-management/#:~:text=Customer%20identity%20and%20access%20management%20(CIAM)%20is%20a%20digital%20identity,while%20securely%20managing%20customer%20identities.\">CIAM solution</a> like LoginRadius, you can be sure enough to deliver the best user experience to your existing clients and potential subscribers as our cloud infrastructure automatically scales to accommodate swiftly changing loads of data storage, account creation, consumer authentication, new application deployment, and more.</p>\n<p>What’s more? You get the highest level of security through <a href=\"https://www.loginradius.com/blog/identity/assess-improve-your-authentication-system/\">robust authentication</a> mechanisms, including multi-factor authentication, risk-based authentication, and more. </p>\n<h2 id=\"security-isnt-a-luxury-anymore-its-the-absolute-necessity\" style=\"position:relative;\"><a href=\"#security-isnt-a-luxury-anymore-its-the-absolute-necessity\" aria-label=\"security isnt a luxury anymore its the absolute necessity permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Security Isn’t a Luxury Anymore; It’s the Absolute Necessity!</h2>\n<p>Media businesses should understand that offering a great user experience through a highly-scalable infrastructure is crucial but not at the expense of <a href=\"https://www.loginradius.com/blog/identity/poor-login-concurrency-impact-ott-platforms/\">poor login</a> and security. </p>\n<p>Balancing user experience with robust security is the need for OTT platforms since cybercriminals are already targeting consumer identities by exploiting weak layers of security. </p>\n<p>As we know, every OTT platform is handling peak loads as the number of viewers and subscribers is swiftly increasing; stringent security layers should be the top priority. </p>\n<p>Hence, to avoid losses worth millions of dollars and prevent brand tarnishing in the global markets, OTT vendors should immediately consider incorporating smart security mechanisms through a reliable CIAM solution.  </p>\n<h2 id=\"why-is-loginradius-the-perfect-companion-for-ott-platforms\" style=\"position:relative;\"><a href=\"#why-is-loginradius-the-perfect-companion-for-ott-platforms\" aria-label=\"why is loginradius the perfect companion for ott platforms permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Why is LoginRadius the Perfect Companion for OTT Platforms?</h2>\n<p>Our infrastructure auto-scales to accommodate the rapid growth of your customer base. LoginRadius ensures that your expansion has no limitations with no cap on users.</p>\n<p>Moreover, the <a href=\"https://www.loginradius.com/\">LoginRadius Identity Platform</a> auto-scales to handle hundreds of applications, whether web, mobile, smart TV, gaming console—and the list goes on.</p>\n<p>Here are some reasons why OTT platforms must choose LoginRadius as their identity provider: </p>\n<ul>\n<li><strong>Auto-scalable infrastructure:</strong>  LoginRadius empowers businesses to deliver a secure and delightful user experience to their clients through its comprehensive and scalable consumer identity and secure access management platform. With 100% uptime and 35 data centers across the globe, LoginRadius’ cloud-based platform can <a href=\"https://www.loginradius.com/blog/identity/handling-scalability-security-loginradius/\">scale to 100s of millions of users</a> in a couple of seconds.</li>\n<li><strong>Low-friction user registration:</strong> LoginRadius offers flexible account setup choices like standard login, social login, and self-serve registration for hassle-free entry into your web or mobile application.</li>\n<li><strong>Multi-factor authentication (MFA):</strong> LoginRadius offers identity management for developers by making it easier to safeguard consumer data with extra protection layers. The CIAM provider allows a plethora of authentication methods, including phone calls, SMS/text messages, email verification, time-based code, hardware token, security questions, biometrics, Google Authenticator, etc., each time they want to access their accounts.</li>\n<li><strong>Single sign-on (SSO):</strong> SSO can provide easy access to multiple websites or applications using a single set of credentials. Developers can connect with external identity providers by implementing OAuth 2.0, SAML, or OpenID Connect standards. LoginRadius offers different ways to integrate web, mobile, and <a href=\"https://www.loginradius.com/federated-sso/\">federated SSO</a>.</li>\n<li><strong>Compliance management:</strong> Developers can add authorization policies through LoginRadius. The CIAM provider is well compliant with formal data protection regulations across the globe, like the EU's GDPR and California's CCPA.</li>\n</ul>\n<h2 id=\"final-thoughts\" style=\"position:relative;\"><a href=\"#final-thoughts\" aria-label=\"final thoughts permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Final Thoughts</h2>\n<p>OTT platforms have witnessed a tremendous increase in the number of users and subscribers in the past couple of years, and hence, securing massive user information becomes an uphill battle for vendors. </p>\n<p>Moreover, the ever-expanding demands of subscribers can only be fulfilled through an auto-scalable infrastructure that guarantees security and manages peak loads without any hassle. </p>\n<p>The LoginRadius CIAM offers robust security and a rich user experience to OTT platforms with real-time auto-scalable infrastructure that automatically scales depending on the users’ demands. </p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAGCAYAAADDl76dAAAACXBIWXMAAAsSAAALEgHS3X78AAABdElEQVQY002RO0/CUBzFG6PtbZWHCAmRmBB5P8vDII9SSC0omog4oAEGjZMO6OKEuLjoJ2Fx0cSBwUQnXZxcHPwux38LJA7nNvfec8+5v1tOCCiwpbbhye2BxbYgBMtgIRVioDRRsARGXxZUzLlEHmehBaesQ4rrEMPViYf2DR9nDGKkChbVICVqsMt1WJI1sHCFwhUsUIFohJH49TxECvRUjhDW2mAbB5iP6hB8hUkhiRPN5KIZYJdrsEYrcCSpmQqMm6/m9ylUhSulY7N5ivROB3L9GOlGF3Ktbc4zuz341UPw/uIk0ESbBjoSGlYIx8BfzjSwVmyCEYEUUmCPa3Bnd+hwC75yC95S05SxbolU/iEbOCFCpDexEfIioTNCNd6Tp6IlMnNuGeeDe3z//OLx5RWj5zFGT2O8fXxh/P4Ja6w6vSEFCnTIlW2YiDzhzX7ATFKojDlvjpBPcDF4QPdyiG5/iE7/BmfXd+hd3VKpCoG8fzxWw2+c+yTpAAAAAElFTkSuQmCC'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-loginradius\"\n        title=\"book-a-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"March 07, 2022","updated_date":null,"title":"OTT Platforms and CIAM: How Identity Management Ensures Millions of Viewers to Scale with Ease","tags":["security"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5625,"src":"/static/19efd284c4e1d8497f857ad6f665a66d/33aa5/ciam-ott.jpg","srcSet":"/static/19efd284c4e1d8497f857ad6f665a66d/f836f/ciam-ott.jpg 200w,\n/static/19efd284c4e1d8497f857ad6f665a66d/2244e/ciam-ott.jpg 400w,\n/static/19efd284c4e1d8497f857ad6f665a66d/33aa5/ciam-ott.jpg 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},{"node":{"fields":{"slug":"/identity/loginradius-creates-trusted-digital-experience/"},"html":"<h2 id=\"introduction\" style=\"position:relative;\"><a href=\"#introduction\" aria-label=\"introduction permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Introduction</h2>\n<p>In a modern digital world where competition is neck-and-neck, creating a frictionless consumer experience should be the top priority of every business striving for success.</p>\n<p>Brands that are delivering trusted digital experiences without compromising overall security are the ones that are highly preferred by consumers worldwide. </p>\n<p>Moreover, amid the global pandemic, the way brands incorporated technology into their business and established frictionless interactions with consumers, the role of a robust consumer identity and access management (CIAM) solution can’t be overlooked. </p>\n<p>Today, enterprises must be aware that the secret to success lies in quickly identifying and eliminating any troubles and pain points that occur when consumers interact with their organization (whether through website or application).</p>\n<p>Here’s where the role of a cutting-edge CIAM solution like <a href=\"https://www.loginradius.com/\">LoginRadius</a> comes into play. </p>\n<p>Let’s understand how LoginRadius paves the way for brands to deliver trusted digital experiences. </p>\n<h2 id=\"security-is-essential-consumer-experience-is-good---loginradius-gives-you-both\" style=\"position:relative;\"><a href=\"#security-is-essential-consumer-experience-is-good---loginradius-gives-you-both\" aria-label=\"security is essential consumer experience is good   loginradius gives you both permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Security is Essential, Consumer Experience is Good - LoginRadius Gives You Both!</h2>\n<p>Adding stringent layers of security seems pretty unfair in a digital world where consumers are always on a hunt for a personalized and flawless user experience.</p>\n<p>But that doesn’t mean that security can be compromised to deliver a rich user experience on a web application or a website.</p>\n<p>Statistics show that<a href=\"https://www.statista.com/statistics/1172265/biggest-cloud-security-concerns-in-2020/\"> 69% of internet users</a> are concerned about data loss/leakage and 66% are worried about their data privacy and confidentiality.</p>\n<p>On the other hand,<a href=\"https://www.huffpost.com/entry/50-important-customer-exp_b_8295772?ec_carp=6823990201176436044\"> 67% of consumers</a> mentioned terrible experiences as a big reason for churn, but only a few complained. </p>\n<p>Many people think that adding a robust layer of security would certainly hamper consumer experience and negatively impact the overall consumer onboarding journey.</p>\n<p>So, what’s the trick that helps market leaders stay ahead of the curve? How do they secure consumer data without affecting the consumer experience?</p>\n<p>Well, the key lies in creating a perfect harmony of security and user experience through a CIAM (<a href=\"https://www.loginradius.com/blog/identity/customer-identity-and-access-management/\">Consumer Identity and Access Management</a>) solution that helps scale business growth.</p>\n<p>Yes, here’s the point where LoginRadius comes into action!</p>\n<p>With industry-standard robust security, LoginRadius ensures your consumers are always catered with a trusted digital experience whether they’re interacting with your brand for the first time or the 100th time. </p>\n<h2 id=\"user-experience-backed-with-security---the-key-to-success-in-2022-and-beyond\" style=\"position:relative;\"><a href=\"#user-experience-backed-with-security---the-key-to-success-in-2022-and-beyond\" aria-label=\"user experience backed with security   the key to success in 2022 and beyond permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>User Experience Backed with Security - The Key to Success in 2022 and Beyond</h2>\n<p>To keep pace with the ever-growing digital world, enterprises need to create a perfect harmony of a great user experience and robust security.</p>\n<p>This can be achieved by leveraging a consumer identity and access management (CIAM) solution like LoginRadius.</p>\n<p>The cutting-edge technology coupled with excellent user experience when your consumers first interact with your brand helps build consumer trust that guarantees conversion.</p>\n<p>Whether you’re greeting your users with a personalized message or leveraging user data for product suggestions, every feature of the new-age CIAM helps your brand win consumer trust. </p>\n<p>Moreover, the best-in-class security that comes with the LoginRadius Identity Platform assures your consumers of how vigilant you are about data privacy and security.</p>\n<h2 id=\"how-loginradius-bridges-the-gap-between-consumer-experience-and-security\" style=\"position:relative;\"><a href=\"#how-loginradius-bridges-the-gap-between-consumer-experience-and-security\" aria-label=\"how loginradius bridges the gap between consumer experience and security permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How LoginRadius Bridges the Gap Between Consumer Experience and Security?</h2>\n<p>At LoginRadius, we understand the importance of delivering <a href=\"https://www.loginradius.com/blog/identity/balancing-security-cx/\">user experience and security</a> to our clients to ensure their clients and potential customers enjoy a frictionless experience while navigating their platform. </p>\n<p>Here’s the list of our security features that reinforces consumer trust:</p>\n<ul>\n<li><strong>End-to-end SSL encryption</strong>: Protects data from unauthorized access and rogue attacks.</li>\n<li><strong>Automated security monitoring audits</strong>: Member use to prevent unwanted activity. </li>\n<li><strong>Advanced password security</strong>: Secures web and mobile applications with one-way hashing. </li>\n<li><strong>Multi-factor authentication:</strong> Strengthens account security and protects against system attacks.</li>\n<li><strong>Risk-based authentication</strong>: Strengthens account security in high-risk situations and automatically kicks a suspicious case. </li>\n</ul>\n<p>Apart from this, the LoginRadius’ APIs use OpenID Connect (OAuth 2.0 protocol) technology—the same industry standard used by Google and LinkedIn. </p>\n<p>Our legal team ensures that the LoginRadius Identity Platform adheres to strict and updated government regulations, compliances, and policies regarding information security. </p>\n<p><strong>Also Read</strong>: <a href=\"https://www.loginradius.com/blog/identity/oauth2-0-guide/\">Working With Industry Authorization: A Beginner's Guide to OAuth 2.0</a></p>\n<p>At the same time, we also ensure delivering the finest consumer experience by: </p>\n<ul>\n<li><strong>Designing the ideal customer journey:</strong> From the first step of onboarding to the thousandth login, create a welcoming and intelligent process to foster excellent customer relationships.</li>\n<li><strong>Unifying the login process with single sign-on:</strong> Easily connect your websites, mobile apps, and third-party services so that customers can interact with you everywhere using a single identity.</li>\n<li><strong>Leveraging social login:</strong> Social Login with LoginRadius supports over 40 of the most popular social ID providers globally.</li>\n</ul>\n<h2 id=\"is-your-digital-experience-keeping-pace-with-customer-expectations\" style=\"position:relative;\"><a href=\"#is-your-digital-experience-keeping-pace-with-customer-expectations\" aria-label=\"is your digital experience keeping pace with customer expectations permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Is Your Digital Experience Keeping Pace With Customer Expectations?</h2>\n<p>If you’re not delivering adequate security to your customers and your users face friction while exploring your online platform, you should rethink your overall digital experience. </p>\n<p>Incorporating a robust CIAM solution like LoginRadius reinforces consumer information security and helps deliver a flawless user experience each time a user interacts with your brand. </p>\n<p>Learn more about the LoginRadius Identity Platform, starting with a <a href=\"https://www.loginradius.com/contact-sales/\">Quick Personalized Call</a> with our sales team. </p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-loginradius\"\n        title=\"book-a-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"February 04, 2022","updated_date":null,"title":"How LoginRadius Creates a Perfect Harmony of UX and Security","tags":["security"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.680672268907563,"src":"/static/48e81df029cf661c97f8b257dc832eca/33aa5/digital-exp.jpg","srcSet":"/static/48e81df029cf661c97f8b257dc832eca/f836f/digital-exp.jpg 200w,\n/static/48e81df029cf661c97f8b257dc832eca/2244e/digital-exp.jpg 400w,\n/static/48e81df029cf661c97f8b257dc832eca/33aa5/digital-exp.jpg 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},{"node":{"fields":{"slug":"/identity/smart-citiy-cybersecurity-trends-2022/"},"html":"<h2 id=\"introduction\" style=\"position:relative;\"><a href=\"#introduction\" aria-label=\"introduction permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Introduction</h2>\n<p>The past two years were full of uncertainties amid the global pandemic and have been highly disruptive in terms of economy, human lives, and rising cybersecurity threats. </p>\n<p>Yes, for a couple of years, the way we use technology has taken a paradigm shift since the remote working ecosystem, and remote access became the new normal. </p>\n<p>Talking about the cybersecurity threats, the attackers explored new ways to exploit organizations by targeting their employees and users by surpassing frail security mechanisms in the past few years. </p>\n<p>However, the new year’s projections can’t be the same, just as similar to the previous year; the challenges in the upcoming years could be even worse. </p>\n<p>As the idea of smart cities comes into existence and more and more cities jump on the technology bandwagon to enhance experiences, the risks from security threats increase. </p>\n<p>Here’s a list of potential security trends that every individual, business, or organization must keep in mind and ensure they remain safe by adopting <a href=\"https://www.loginradius.com/blog/identity/maintaining-quality-data-security-practices/\">appropriate security measures</a>. </p>\n<h3 id=\"1-supply-chain-cyber-attacks-will-continue-to-surge\" style=\"position:relative;\"><a href=\"#1-supply-chain-cyber-attacks-will-continue-to-surge\" aria-label=\"1 supply chain cyber attacks will continue to surge permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. Supply chain cyber attacks will continue to surge</h3>\n<p>We’ve witnessed a substantial increase in the number of cyberattacks that mainly targeted software supply chains. These kinds of attacks are proven to be highly destructive since they can quickly take down an organization’s overall software supply chain coupled with services. </p>\n<p>Unfortunately, in the New Year 2022, these kinds of supply chain attacks will become even more common since attackers are now considering these attacks as an effective mode of mass disruption within an organization. </p>\n<h3 id=\"2-smart-devices-and-nagging-risks\" style=\"position:relative;\"><a href=\"#2-smart-devices-and-nagging-risks\" aria-label=\"2 smart devices and nagging risks permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. Smart devices and nagging risks</h3>\n<p>The idea of smart cities is incomplete without the intervention of IoT devices that create an interconnected network of smart devices. </p>\n<p>However, the Internet of Things is inevitably a swiftly growing trend associated with many cybersecurity threats. </p>\n<p>In the past year, several instances of data breaches through IoT networks have been reported in the past year. The incidents mostly took place because of the inadequate machine-to-machine access control. </p>\n<p>Hackers can quickly attack through several vulnerable devices, including security cameras, smart DVRs, or smart home assistants. </p>\n<p>The same or even worse is expected in the year 2022 and beyond. </p>\n<p>Also Download: <a href=\"https://www.loginradius.com/resource/smart-iot-authentication-datasheet\">Smart and IoT Authentication</a></p>\n<h3 id=\"3-the-rise-of-tractor-hackers\" style=\"position:relative;\"><a href=\"#3-the-rise-of-tractor-hackers\" aria-label=\"3 the rise of tractor hackers permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3. The rise of tractor hackers</h3>\n<p>The advancement of technology has undoubtedly offered endless possibilities and has exposed every industry to significant cyber threats. </p>\n<p>Farming is also one of the most vulnerable industries facing numerous challenges for the past couple of years, and in 2022, it will surely be under the spotlight for cyberattackers.</p>\n<p>Many modern tractors now run software just like cars and are more susceptible to attacks that can cause financial losses. </p>\n<p>Also, remote farming and automation in this industry have posed severe challenges and threats, including disruption of food supply chains. </p>\n<h3 id=\"4-shareware-attack\" style=\"position:relative;\"><a href=\"#4-shareware-attack\" aria-label=\"4 shareware attack permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>#4. Shareware attack</h3>\n<p>Shareware is commercial software that is distributed to consumers for free. It is usually handed out as complimentary software to encourage users to pay for the parent software. Mostly, shareware is safe, but it can be risky at times.</p>\n<p>Many organizations have fallen prey to these kinds of shareware attacks in the past couple of years, and the numbers are increasing swiftly. </p>\n<p>In 2022, cybercriminals may use it to distribute malware that could lead to malicious attacks. Organizations may put themselves at risk of unwanted exposure.</p>\n<h3 id=\"5-ransomware-will-continue-to-exploit-organizations-and-individuals\" style=\"position:relative;\"><a href=\"#5-ransomware-will-continue-to-exploit-organizations-and-individuals\" aria-label=\"5 ransomware will continue to exploit organizations and individuals permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>5. Ransomware will continue to exploit organizations and individuals</h3>\n<p>When it comes to cybersecurity threats, ransomware attacks are undeniably at the forefront of cybercriminals since they provide hefty monetary benefits. </p>\n<p>Last year, ransomware was the most significant concern among cybersecurity leaders to protect their organizations, employees, and clients. </p>\n<p>With the frequency of ransomware attacks increasing swiftly, <a href=\"https://www.loginradius.com/blog/identity/tips-from-loginradius-security-expert-2022/\">cybersecurity leaders predict</a> that organizations need to gear up since these kinds of threats quickly would surely rise. </p>\n<h2 id=\"the-bottom-line\" style=\"position:relative;\"><a href=\"#the-bottom-line\" aria-label=\"the bottom line permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>The Bottom Line</h2>\n<p>There has been a substantial increase in the number of cybersecurity threats in the past couple of years, especially after the global pandemic outbreak in 2019. </p>\n<p>Though it’s challenging to deal with any cybersecurity threat, cybersecurity experts always advise every organization, individual, and private sector organization to strengthen their first line of defense for maximum safety. </p>\n<p>The threats mentioned above would continue to rise in the new year. Everyone must put their best foot forward well in advance to avoid tarnishing their market image and mitigate the risk of hefty financial losses. </p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAGCAYAAADDl76dAAAACXBIWXMAAAsSAAALEgHS3X78AAABdElEQVQY002RO0/CUBzFG6PtbZWHCAmRmBB5P8vDII9SSC0omog4oAEGjZMO6OKEuLjoJ2Fx0cSBwUQnXZxcHPwux38LJA7nNvfec8+5v1tOCCiwpbbhye2BxbYgBMtgIRVioDRRsARGXxZUzLlEHmehBaesQ4rrEMPViYf2DR9nDGKkChbVICVqsMt1WJI1sHCFwhUsUIFohJH49TxECvRUjhDW2mAbB5iP6hB8hUkhiRPN5KIZYJdrsEYrcCSpmQqMm6/m9ylUhSulY7N5ivROB3L9GOlGF3Ktbc4zuz341UPw/uIk0ESbBjoSGlYIx8BfzjSwVmyCEYEUUmCPa3Bnd+hwC75yC95S05SxbolU/iEbOCFCpDexEfIioTNCNd6Tp6IlMnNuGeeDe3z//OLx5RWj5zFGT2O8fXxh/P4Ja6w6vSEFCnTIlW2YiDzhzX7ATFKojDlvjpBPcDF4QPdyiG5/iE7/BmfXd+hd3VKpCoG8fzxWw2+c+yTpAAAAAElFTkSuQmCC'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"LoginRadius Book a Demo\"\n        title=\"LoginRadius Book a Demo\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"February 02, 2022","updated_date":null,"title":"Smart Cities and Cyber Security Trends to Watch Out in 2022","tags":["security"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":2.127659574468085,"src":"/static/550735f1581f1cf725c74bc7cea1ddf1/33aa5/smart-cities.jpg","srcSet":"/static/550735f1581f1cf725c74bc7cea1ddf1/f836f/smart-cities.jpg 200w,\n/static/550735f1581f1cf725c74bc7cea1ddf1/2244e/smart-cities.jpg 400w,\n/static/550735f1581f1cf725c74bc7cea1ddf1/33aa5/smart-cities.jpg 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},{"node":{"fields":{"slug":"/identity/govt-access-control-challenges-2022/"},"html":"<h2 id=\"introduction\" style=\"position:relative;\"><a href=\"#introduction\" aria-label=\"introduction permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Introduction</h2>\n<p>We’re in a digitally advanced modern world that’s swiftly heading towards adopting technology in every space that creates a flawless experience for everyone. </p>\n<p>Whether we talk about private enterprises or government agencies in the public sector, every organization is putting its best foot forward to leverage technology to deliver rich consumer experiences. </p>\n<p>However, specific challenges related to different aspects may come across the government agencies while they craft the best experiences for the citizens. </p>\n<p>One such aspect is the citizens’ access control for various services in a state. </p>\n<p>Government agencies deploy new inter-connected platforms to help their citizens smoothly access the services by invoking technology's true potential. There remain specific challenges that require immediate attention. </p>\n<p>Let’s learn more about <a href=\"https://www.loginradius.com/blog/fuel/loginradius-digital-identity-to-build-the-public-sector-of-the-future/\">access control in government agencies</a> and the challenges hindering an excellent consumer experience. </p>\n<h3 id=\"1-user-experience\" style=\"position:relative;\"><a href=\"#1-user-experience\" aria-label=\"1 user experience permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. User experience</h3>\n<p>Delivering a flawless user experience is perhaps the most crucial challenge among government agencies working to bridge the gap between citizens and various government platforms. </p>\n<p>Almost everyone interacts with huge brands online and is well-aware of a <a href=\"https://www.loginradius.com/blog/fuel/4-tips-secure-frictionless-ux/\">great user experience</a>. Hence they expect the same level from government agencies’ online portals. </p>\n<p>This becomes quite a big challenge since these agencies are continuously operating on peak loads, and it isn’t possible to manage such enormous demands and maintain a great user experience. </p>\n<p>Reliable consumer identity and access management solution (CIAM) here can be a game-changer since it supports millions of users with auto-scale capabilities. This means every user enjoys a seamless user experience even in the peak loads. </p>\n<h3 id=\"2-outdated-infrastructure\" style=\"position:relative;\"><a href=\"#2-outdated-infrastructure\" aria-label=\"2 outdated infrastructure permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. Outdated infrastructure</h3>\n<p>Since government platforms aren’t regularly updated, they become increasingly vulnerable to several new attacks. Whether it’s outdated software or poor security mechanisms, both can lead to diverse issues that may grant unauthorized users quick back door access. </p>\n<p>Hence, updating the overall IT infrastructure and deploying adequate security mechanisms in government agencies’ platforms are significant challenges that require immediate attention. </p>\n<p><strong>Also Download</strong>: <a href=\"https://www.loginradius.com/resource/how-government-agencies-are-modernizing-citizen-experiences-with-ciam/\">How Government Agencies Are Modernizing Citizen Experiences With CIAM</a> </p>\n<h3 id=\"3-security\" style=\"position:relative;\"><a href=\"#3-security\" aria-label=\"3 security permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3. Security</h3>\n<p>Poor security and inadequate data management are the most overlooked aspects that are increasingly becoming the bottlenecks of the current modern sectors backed by government agencies.</p>\n<p>Agencies that cannot protect consumer identity and personal information are prone to losing trust over citizens and would undoubtedly fail to bridge the gap between the government and </p>\n<p>Adding stringent layers of security is a must for any retailer seeking substantial growth in the ever-expanding competitive business landscape.</p>\n<p>Whether it’s <a href=\"https://www.loginradius.com/multi-factor-authentication/\">multi-factor authentication</a> (MFA) or <a href=\"https://www.loginradius.com/blog/identity/risk-based-authentication/\">risk-based authentication</a> (RBA), enterprises need to quickly put their best foot forward in adopting advanced security measures to safeguard consumer information to prevent financial and reputational losses.</p>\n<h3 id=\"4-engagement\" style=\"position:relative;\"><a href=\"#4-engagement\" aria-label=\"4 engagement permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>4. Engagement</h3>\n<p>Engaging citizens to keep coming back is pretty complicated regarding the challenges of government agencies working to build the public sector. </p>\n<p>Building trust over citizens is quite daunting but can do wonders for agencies if done correctly by leveraging perfect harmony of personalization and a seamless user experience.</p>\n<p>LoginRadius simplifies the user registration process through a seamless experience with social sign-in and single sign-on.</p>\n<ul>\n<li><strong>Social Sign-In:</strong> Customers tend to remember the credentials of their frequently used network. Social sign-in is the method of one-click authentication with a social media account. It reduces the hassles of the registration process and helps a great deal in converting a random user to a value-added customer.</li>\n<li><strong>Single Sign-On:</strong> It means a user can access multiple accounts with a single set of credentials. It offers ease of authentication and reduces the risk of minimizing poor password habits.</li>\n</ul>\n<p>When citizens are offered frictionless onboarding coupled with quick login options, they eventually build trust and become frequent visitors, ultimately improving overall engagement. </p>\n<h3 id=\"5-underfunding\" style=\"position:relative;\"><a href=\"#5-underfunding\" aria-label=\"5 underfunding permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>5. Underfunding</h3>\n<p>Another critical challenge among the government agencies is that they cannot spend enough on their overall IT infrastructure. </p>\n<p>Since the government platforms also require adequate infrastructure and updated security mechanisms, the limited budget allocated by the local governments hinders their ability to attract citizens as their website/app lacks basic security features. </p>\n<p>More and more citizens demand intelligent and intuitive online services from government agencies, which means more funds are required from the government to meet the surging demands. </p>\n<h2 id=\"final-thoughts\" style=\"position:relative;\"><a href=\"#final-thoughts\" aria-label=\"final thoughts permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Final Thoughts</h2>\n<p>Government agencies must incorporate technology to embark on a digital transformation journey that enhances the consumer experience and strengthens overall security. </p>\n<p>When it comes to adopting citizen access control, government agencies should incorporate a <a href=\"https://www.loginradius.com/blog/identity/customer-identity-and-access-management/\">consumer identity and access management (CIAM) </a>system that helps manage millions of consumer identities and reinforces overall security. </p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-free-demo-loginradius\"\n        title=\"book-a-free-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"January 06, 2022","updated_date":null,"title":"5 Challenges for Government Adoption of Citizens’ Access Control","tags":["security"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.8018018018018018,"src":"/static/903762b375d8441af76707bd6ea543d5/33aa5/govt-access.jpg","srcSet":"/static/903762b375d8441af76707bd6ea543d5/f836f/govt-access.jpg 200w,\n/static/903762b375d8441af76707bd6ea543d5/2244e/govt-access.jpg 400w,\n/static/903762b375d8441af76707bd6ea543d5/33aa5/govt-access.jpg 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"Yash Rathi","github":"yashrathi29","avatar":null}}}},{"node":{"fields":{"slug":"/identity/token-management-api-product-jwt/"},"html":"<h2 id=\"introduction\" style=\"position:relative;\"><a href=\"#introduction\" aria-label=\"introduction permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Introduction</h2>\n<p>A token plays a crucial role in enhancing the overall security mechanism of an organization that helps to deliver flawless and secure authentication and authorization on their website or application. </p>\n<p>However, there’s much confusion regarding relying on access tokens. Businesses find it challenging to choose between <a href=\"https://www.loginradius.com/blog/identity/what-is-openid-connect/\">OpenID Connect</a> and OAuth 2.0. </p>\n<p>As a result, many organizations deploy insecure web applications that compromise their consumers’ identities and crucial business information. </p>\n<p>It’s always better to learn about the aspects of tokens and leverage the best token management mechanism that offers robust security. </p>\n<p>This post will help you better understand what a token is, what is a JWT, and its pros that will help you decide why you need to invoke the potential of JWT for your API product. </p>\n<h2 id=\"what-is-a-token\" style=\"position:relative;\"><a href=\"#what-is-a-token\" aria-label=\"what is a token permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is a Token?</h2>\n<p>A token is a digitally encoded signature used to authenticate and authorize a user to access specific resources on a network.</p>\n<p>A token is always generated in the form of an OTP (One-Time Password), which depicts that it could only be used once and is generated randomly for every transaction.</p>\n<p>The token-based authentication allows users to verify their unique identity, and in return, they receive a unique token that provides access to specific resources for a particular time frame.</p>\n<p>Users can easily access the website or network for which the token is issued and need not enter the credentials again and again until the permit expires.</p>\n<p>Tokens are widely used for regular online transactions for enhancing overall security and accuracy.</p>\n<p><a href=\"https://www.loginradius.com/resource/passwordless-login-magic-link-otp-datasheet\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"DS-pass-magic-link\"\n        title=\"DS-pass-magic-link\"\n        src=\"/static/080d729534ed7c510139db40ae1aefa4/e5715/DS-pass-magic-link.png\"\n        srcset=\"/static/080d729534ed7c510139db40ae1aefa4/a6d36/DS-pass-magic-link.png 650w,\n/static/080d729534ed7c510139db40ae1aefa4/e5715/DS-pass-magic-link.png 768w,\n/static/080d729534ed7c510139db40ae1aefa4/81501/DS-pass-magic-link.png 2886w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<h2 id=\"what-is-jwt-what-is-oauth-20\" style=\"position:relative;\"><a href=\"#what-is-jwt-what-is-oauth-20\" aria-label=\"what is jwt what is oauth 20 permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is JWT? What is OAuth 2.0?</h2>\n<p>JWT (JSON Web Token) is a token format. It is digitally signed, self-contained, and compact. It provides a convenient mechanism for transferring data. </p>\n<p>JWT is not inherently secure, but the use of JWT can ensure the authenticity of the message so long as the signature is verified and the integrity of the payload can be guaranteed. JWT is often used for stateless authentication in simple use cases involving non-complex systems. </p>\n<p>On the other hand, <a href=\"/blog/identity/oauth2-0-guide/\">OAuth 2.0</a> is an authorization protocol that builds upon the original OAuth protocol created in 2006, arising out of a need for authorization flows serving different applications from the web and mobile apps to IoT.</p>\n<p>OAuth 2.0 specifies the flows and standards under which authorization token exchanges should occur. OAuth 2.0 does not encompass authentication, only authorization. </p>\n<h2 id=\"jwt-use-cases\" style=\"position:relative;\"><a href=\"#jwt-use-cases\" aria-label=\"jwt use cases permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>JWT Use Cases</h2>\n<ul>\n<li><strong>Information Exchange</strong> - JWT can be used between two parties to exchange information. JWT is digitally signed and can be used in a secure public/private key pair. Data is verified using the public key on the other end.</li>\n<li><strong>Authentication</strong>- JWT can contain user information in the payload and be used in the session to authenticate the user. Once authenticated, users can access protected applications using the JWT included in the request. So, every request will be authenticated by verifying the JWT.</li>\n</ul>\n<h2 id=\"advantages-of-using-jwt-for-your-api-product\" style=\"position:relative;\"><a href=\"#advantages-of-using-jwt-for-your-api-product\" aria-label=\"advantages of using jwt for your api product permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Advantages of Using JWT for Your API Product</h2>\n<h3 id=\"1-jwt-offers-robust-security\" style=\"position:relative;\"><a href=\"#1-jwt-offers-robust-security\" aria-label=\"1 jwt offers robust security permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. JWT offers robust security</h3>\n<p>Since tokens like JWT are stateless, only a secret key can validate it when received at a server-side application, which was used to create it. Hence they’re considered the best and the most secure way of offering authentication.</p>\n<p>Tokens act as a storage for the user’s credentials, and when the token travels between the server or the web browser, the stored credentials are never compromised.</p>\n<h3 id=\"2--jwt-based-authentication-is-more-scalable-and-efficient\" style=\"position:relative;\"><a href=\"#2--jwt-based-authentication-is-more-scalable-and-efficient\" aria-label=\"2  jwt based authentication is more scalable and efficient permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2.  JWT-based authentication is more scalable and efficient</h3>\n<p>As we know that tokens must be stored on the user’s end, they offer a scalable solution.</p>\n<p>Moreover, the server just needs to create and verify the tokens and the information, which means that maintaining more users on a website or application at once is possible without any hassle.</p>\n<h3 id=\"3--jwt-offers-flexibility-and-performance\" style=\"position:relative;\"><a href=\"#3--jwt-offers-flexibility-and-performance\" aria-label=\"3  jwt offers flexibility and performance permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3.  JWT offers flexibility and performance</h3>\n<p>Flexibility and enhanced overall performance are other vital aspects of <a href=\"https://www.loginradius.com/blog/engineering/guest-post/jwt-authentication-best-practices-and-when-to-use/\">JWT-based authentication</a>. They can be used across multiple servers and can offer authentication for various websites and applications at once.</p>\n<p>This helps in encouraging more collaboration opportunities between enterprises and platforms for a flawless experience.</p>\n<h2 id=\"the-bottom-line\" style=\"position:relative;\"><a href=\"#the-bottom-line\" aria-label=\"the bottom line permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>The Bottom Line</h2>\n<p>The security of consumer identity is becoming a significant challenge for online platforms collecting consumer information.  </p>\n<p>JWT can be a game-changer when it comes to performing secure authentication. </p>\n<p>The precise use of secure token management through a robust <a href=\"https://www.loginradius.com/\">consumer identity and access management</a> (CIAM) solution can help businesses secure consumer information without hampering the overall user experience. </p>\n<p>JWT can be the right option in most scenarios if implemented correctly and securely by following the proper security measures. </p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-loginradius\"\n        title=\"book-a-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"January 04, 2022","updated_date":null,"title":"Are You Thinking of Token Management for Your API Product? Think about JWT!","tags":["security"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.7241379310344827,"src":"/static/72f18d6005ea105c39c7326447f82250/33aa5/token-managmt.jpg","srcSet":"/static/72f18d6005ea105c39c7326447f82250/f836f/token-managmt.jpg 200w,\n/static/72f18d6005ea105c39c7326447f82250/2244e/token-managmt.jpg 400w,\n/static/72f18d6005ea105c39c7326447f82250/33aa5/token-managmt.jpg 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},{"node":{"fields":{"slug":"/identity/pros-cons-open-source-project/"},"html":"<p>Open source projects are intended to be freely available to the developer community and are easy to modify. In fact, many open-source developers believe that by enabling modifications to their software, they receive constructive criticism.</p>\n<p>Developers also frequently learn new techniques by trying to integrate open-source software into their own programs. Others can then take this new code and incorporate it into their projects if they find it useful. </p>\n<p>No wonder, the adoption of third-party open-source software is getting popular. What's more is it allows companies to produce software faster than developing from scratch.</p>\n<p>While <a href=\"https://www.loginradius.com/open-source/\">open-source projects</a> have several advantages over proprietary software, they also bring in some challenges that you need to consider. Let's discuss the pros first. </p>\n<h2 id=\"advantages-of-open-source-software\" style=\"position:relative;\"><a href=\"#advantages-of-open-source-software\" aria-label=\"advantages of open source software permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Advantages of Open-Source Software</h2>\n<p>Here are some of the fundamental advantages that open-source software offers: </p>\n<h3 id=\"1-agility\" style=\"position:relative;\"><a href=\"#1-agility\" aria-label=\"1 agility permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. Agility</h3>\n<p>The development or customization of proprietary solutions depends on the availability and ability of the vendor's development team to solve the problem. </p>\n<p>Since open-source solutions are developed by contributions from various community members, they typically offer multiple ways to solve a problem. Hence, you can get the job done faster using an open-sourcing project. </p>\n<h3 id=\"2-cost\" style=\"position:relative;\"><a href=\"#2-cost\" aria-label=\"2 cost permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. Cost</h3>\n<p>As community members develop and maintain open-source solutions, they generally cost less than a proprietary solution. </p>\n<h3 id=\"3-scalability\" style=\"position:relative;\"><a href=\"#3-scalability\" aria-label=\"3 scalability permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3. Scalability</h3>\n<p>You can start small by updating the community versions of the open-source project to meet your business requirements. But later, <a href=\"https://www.loginradius.com/blog/identity/handling-scalability-security-loginradius/\">as your business requirements grow</a>, you can leverage commercially supported solutions too.</p>\n<h3 id=\"4-community-engagement\" style=\"position:relative;\"><a href=\"#4-community-engagement\" aria-label=\"4 community engagement permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>4. Community Engagement</h3>\n<p>Open-source projects allow developers to create projects and get a platform to interact with other developers outside their organizations. </p>\n<h2 id=\"disadvantages-of-open-source-software\" style=\"position:relative;\"><a href=\"#disadvantages-of-open-source-software\" aria-label=\"disadvantages of open source software permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Disadvantages of Open-Source Software</h2>\n<p>An open-source project approach can be a great way to collaborate with other talented engineers. But when you're building something critical to your business, you need more than a supporting cast of thousands of developers from across the globe. Here are some of the risks observed with open-source software: </p>\n<h3 id=\"1-vulnerabilities-exposure\" style=\"position:relative;\"><a href=\"#1-vulnerabilities-exposure\" aria-label=\"1 vulnerabilities exposure permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. Vulnerabilities Exposure</h3>\n<p>The source code is available for everyone, cybercriminals can also <a href=\"https://www.loginradius.com/resource/owasp-top-10-web-application-vulnerabilities-list-for-every-developer/\">easily find vulnerabilities</a> in the code. For example, they can extract sensitive information or damage the systems leveraging the open-source software.Here are a few examples of the vulnerabilities found in some common open-source software recently: </p>\n<ul>\n<li>Severe security flaws were found in the open-source identity and access management solution, <strong>Keycloak</strong>, which cybercriminals can exploit to gain access to sensitive information in systems leveraging the platform. </li>\n<li>Certain <a href=\"https://www.cvedetails.com/vulnerability-list/vendor_id-3496/Joomla.html\">XSS and CSRF</a> vulnerabilities were found in <strong>Joomla</strong>, an open-source content management solution that cybercriminals can exploit. </li>\n<li>Prior to<span style=\"text-decoration:underline;\"> <a href=\"https://www.cvedetails.com/cve/CVE-2021-39165/\">Cachet version 2.5.1</a></span>, authenticated users, regardless of their privileges (User or Admin), can trick Cachet and install the instance again, leading to arbitrary code execution on the server.</li>\n<li>An issue was discovered in **Xen **through 4.12.x allowing x86 PV guest OS users to cause a denial of service via a VCPUOP_initialise hypercall. </li>\n</ul>\n<h3 id=\"2-security\" style=\"position:relative;\"><a href=\"#2-security\" aria-label=\"2 security permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. Security</h3>\n<p>Open-source project contributors are generally developers who are not security experts. They contribute to the product primarily to support the functionality and may not consider the security aspects. Hence, the open-source product may pose <a href=\"https://www.loginradius.com/blog/identity/consumer-data-privacy-security/\">security risks</a> that cybercriminals can easily exploit. </p>\n<h3 id=\"3-warranty\" style=\"position:relative;\"><a href=\"#3-warranty\" aria-label=\"3 warranty permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3. Warranty</h3>\n<p>Open-source software does not provide any warranty for its security and support as these products are developed and managed by volunteers.</p>\n<p>The developer community members typically test the software for security issues and provide suggestions/recommendations on the public forums, but they are not liable for faulty guidance.</p>\n<h3 id=\"4-security-audit-process\" style=\"position:relative;\"><a href=\"#4-security-audit-process\" aria-label=\"4 security audit process permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>4. Security Audit Process</h3>\n<p>Open-source project contributions are generally managed by a small team to reduce cost. They may not perform proper testing/QA or have a security auditing process at all due to a lack of expertise or workforce. </p>\n<p>The testing team may not be familiar with the open-source change requests or test the code properly by considering crucial aspects. </p>\n<h3 id=\"5-copyright\" style=\"position:relative;\"><a href=\"#5-copyright\" aria-label=\"5 copyright permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>5. Copyright</h3>\n<p>Anonymous developers sometimes develop open-source software. Therefore, it is pretty likely that they may copy from third-party sources without understanding the copyright issues. </p>\n<p>As a result, companies leveraging the particular open-source software can be held responsible for Copyright infringement.</p>\n<p>For example, <a href=\"https://arstechnica.co.uk/tech-policy/2017/10/appeals-court-keeps-alive-the-never-ending-linux-case-sco-v-ibm/\">SCO Group</a> contended IBM stole part of the UnixWare source code and used it for their Project Monterey and sought billions of dollars in damages.</p>\n<h3 id=\"6-operational-insufficiencies\" style=\"position:relative;\"><a href=\"#6-operational-insufficiencies\" aria-label=\"6 operational insufficiencies permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>6. Operational Insufficiencies</h3>\n<p>Open-source projects can be a lot of effort for an organization. It isn't always clear who will do the work to manage the change requests from the developer community or take care of scope, licensing, and versioning.</p>\n<h3 id=\"7-poor-developer-practices\" style=\"position:relative;\"><a href=\"#7-poor-developer-practices\" aria-label=\"7 poor developer practices permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>7. Poor Developer Practices</h3>\n<p>If hackers are invited to contribute to open-source projects, they can potentially change the code so that it contains malware. If the code is not carefully reviewed, it can become part of an open-source project.</p>\n<h2 id=\"the-bottom-line\" style=\"position:relative;\"><a href=\"#the-bottom-line\" aria-label=\"the bottom line permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>The Bottom Line</h2>\n<p>The open-source licenses are not like traditional software licenses (you don't pay for using them). Hence, you cannot expect it to be constructed with the best security practices and also pose potential risks. These risks may include vulnerabilities of the source code, proprietary issues, license violations, etc.</p>\n<p>Experts recommend not to leverage the open-source project in the places where:</p>\n<ul>\n<li>You are handling sensitive personal and operational data information, e.g., Identity Access Management(IAM) space. </li>\n<li>You are developing proprietary software based on the open-source project. </li>\n</ul>\n<p>Enterprises should carefully analyze and assess their suitability while adopting open source and be cautious when implementing the project.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-loginradius\"\n        title=\"book-a-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"November 26, 2021","updated_date":null,"title":"Why You Should Use Open Source Project For Your Business","tags":["security"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.9230769230769231,"src":"/static/da49f74aa418b24ac69e985d2e6dbb9c/14b42/open-source.jpg","srcSet":"/static/da49f74aa418b24ac69e985d2e6dbb9c/f836f/open-source.jpg 200w,\n/static/da49f74aa418b24ac69e985d2e6dbb9c/2244e/open-source.jpg 400w,\n/static/da49f74aa418b24ac69e985d2e6dbb9c/14b42/open-source.jpg 800w,\n/static/da49f74aa418b24ac69e985d2e6dbb9c/16310/open-source.jpg 1024w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Jitender Agarwal","github":null,"avatar":null}}}},{"node":{"fields":{"slug":"/identity/3-stages-gartner-carta-it-security/"},"html":"<p>IT security is becoming an integral part of a business’s overall success amid the digitally advanced ecosystems where security breaches are just a loophole away. </p>\n<p>CARTA (Continuous Adaptive Risk and Trust Assessment) is a new and efficient IT security approach introduced by Gartner in 2017 that helps cybersecurity experts ensure a stringent mechanism to handle vulnerabilities. </p>\n<p>Businesses embarking on a <a href=\"https://www.loginradius.com/blog/identity/digital-transformation-consumer-iam/\">digital transformation journey</a> shouldn’t overlook security since data breaches cause losses worth millions of dollars every year and eventually tarnishes brand repute. </p>\n<p>This post will cover all aspects of CARTA and how businesses can implement it to ensure robust cybersecurity. </p>\n<h2 id=\"what-is-carta-how-does-it-benefit-businesses\" style=\"position:relative;\"><a href=\"#what-is-carta-how-does-it-benefit-businesses\" aria-label=\"what is carta how does it benefit businesses permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is CARTA? How Does it Benefit Businesses?</h2>\n<p>Gartner, an information technology (IT) research and consultancy company, introduced CARTA back in 2017. CARTA is an approach built on <a href=\"https://www.loginradius.com/blog/engineering/what-is-adaptive-authentication/\">adaptive security architecture</a> that helps businesses manage risks associated with security. </p>\n<p>CARTA ensures businesses employ a consistent, up-to-date approach to cybersecurity in the ever-increasing digital landscape where we’re interconnected with millions of devices.</p>\n<p>Since digitalization offers endless opportunities and business advancements through efficiency and accessibility, the fact that specific vulnerabilities are associated with it can’t be overlooked. </p>\n<p>Here’s where enterprises need to adopt a robust approach to manage the risks successfully. CARTA allows businesses to make more informed decisions through the degree of trust and depth of a risk. </p>\n<h2 id=\"carta-approach\" style=\"position:relative;\"><a href=\"#carta-approach\" aria-label=\"carta approach permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>CARTA Approach</h2>\n<p>CARTA stipulates various aspects for cybersecurity and risk management, including: </p>\n<ul>\n<li>Continuous monitoring, assessment, and immediate response for remediation of an underlying risk</li>\n<li>100% device visibility</li>\n<li>Automated control</li>\n<li>Micro-segmentation for containing data breaches </li>\n<li>Adequate security management for IoT devices </li>\n<li>Risk and trust shouldn’t be static </li>\n</ul>\n<h2 id=\"stages-of-it-security-for-implementation-of-carta\" style=\"position:relative;\"><a href=\"#stages-of-it-security-for-implementation-of-carta\" aria-label=\"stages of it security for implementation of carta permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Stages of IT Security for Implementation of CARTA</h2>\n<p>According to Gartner, CARTA can be applied in three 3 diverse IT phases to monitor and assess continuously. These include Run, Plan, and Build. </p>\n<p>Let’s understand these phases where businesses can implement CARTA. </p>\n<ul>\n<li><strong>Run:</strong> Organizations utilize intelligent analytics to detect anomalies and to detect the baseline in the run phase. This helps organizations notice and respond to security incidents rapidly without hampering the overall security mechanisms. Automated solutions for the run phase can help enhance evaluations through valuable insights driving more success. </li>\n<li><strong>Build:</strong> Since organizations utilize public libraries for creating personalized, efficient, and updated cybersecurity solutions, CARTA dictates they analyze these libraries for security risks before implementing them carefully. </li>\n<li><strong>Planning:</strong> Before implementing IT security solutions, businesses must carefully focus on their priorities and assets. They must plan their budget and roadmap early to ensure better decisions in the long run. </li>\n</ul>\n<p><strong>Also Download</strong>: <a href=\"https://www.loginradius.com/resource/adaptive-authentication-in-the-age-of-digital-apocalypse/\">Adaptive Authentication in the Age of Digital Apocalypse</a></p>\n<p>In a nutshell, CARTA ensures organizations manage the risks associated with the digital world by emphasizing and developing security mechanisms that are continuously monitoring and assessing every aspect.  </p>\n<p>Through a simplistic view of the digital world, organizations can protect their assets by analyzing what is good and bad well in advance and taking the necessary steps to prevent any harm. </p>\n<h2 id=\"final-thoughts\" style=\"position:relative;\"><a href=\"#final-thoughts\" aria-label=\"final thoughts permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Final Thoughts</h2>\n<p>Every business in the digital landscape is prone to several security threats if stringent security measures aren’t in place. </p>\n<p>CARTA’s risk reduction model is <a href=\"https://www.loginradius.com/on-premises-deployment/\">built on the premise</a> that everything should be assessed and monitored and eventually proposes a revolutionary security and risk management mindset for the upcoming decade. </p>\n<p>Hence, businesses striving to implement the best security practices must consider relying on CARTA for enhanced risk management for their organization.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-free-demo-loginradius\"\n        title=\"book-a-free-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"November 10, 2021","updated_date":null,"title":"3 Best Stages of IT Security for Implementing Gartner's CARTA","tags":["security"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.639344262295082,"src":"/static/88b6fddfe892c12cd2154d9a59f6a81d/14b42/carta.jpg","srcSet":"/static/88b6fddfe892c12cd2154d9a59f6a81d/f836f/carta.jpg 200w,\n/static/88b6fddfe892c12cd2154d9a59f6a81d/2244e/carta.jpg 400w,\n/static/88b6fddfe892c12cd2154d9a59f6a81d/14b42/carta.jpg 800w,\n/static/88b6fddfe892c12cd2154d9a59f6a81d/16310/carta.jpg 1024w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Vishal Sharma","github":null,"avatar":null}}}},{"node":{"fields":{"slug":"/identity/what-is-oauth/"},"html":"<p>OAuth stands for Open Authorization. It's a process through which an application or website can access private data from another website. It provides applications the ability to \"secure designated access.\" For example, you can tell Google that it's OK for abc.com to access your Google account or contact without having to give abc.com your Google password.</p>\n<p>OAuth never shares password data but instead uses authorization tokens to prove an identity between consumers and service providers. OAuth is an authentication protocol that allows you to approve one application interacting with another on your behalf without giving away your password.</p>\n<p>To understand this, let's take the example of Facebook. When an app on Facebook asks you to share your profile and pictures, Facebook acts as a service provider: it has your data and image, and that app is a consumer. If you want to do something with your picture with the help of this app, you need to provide permission to this app to access your images, which the OAuth manages in the background.</p>\n<h2 id=\"how-does-the-oauth20-work\" style=\"position:relative;\"><a href=\"#how-does-the-oauth20-work\" aria-label=\"how does the oauth20 work permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How Does the OAuth2.0 Work</h2>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 512px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 68.5546875%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"what-is-oauth-1\"\n        title=\"what-is-oauth-1\"\n        src=\"/static/40fa6eb6f1f5acf7210a4b5de0eca5ec/01e7c/what-is-oauth-1.png\"\n        srcset=\"/static/40fa6eb6f1f5acf7210a4b5de0eca5ec/01e7c/what-is-oauth-1.png 512w\"\n        sizes=\"(max-width: 512px) 100vw, 512px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>The following explains the working of the above sequence diagram of Oauth 2.0 implementation: </p>\n<ol>\n<li>Let's assume the client requests authorization to access protected resources owned by the resource owner by redirecting the client to the authorization server.</li>\n<li>The resource access request is authenticated and authorized by the resource owner from the web application, and the authorization grant is returned to the client by an authorized endpoint.</li>\n<li>There are four types of Grant Protocol defined by OAuth 2.0: <strong>Authorization Code</strong>, <strong>Client Credentials</strong>, <strong>Device Code</strong>, and <strong>Refresh Token</strong>.</li>\n<li>The client requests the access token from the authorization server by presenting the authorization grant returned from the authorized endpoint and authentication of its own identity to the token endpoint. A token endpoint is a URL such as <code>https://your_domain/oauth2/token</code>.</li>\n<li>The access token will be issued to the client for valid authentication and authorization grant by the authorization server or authentication provider.</li>\n<li>By presenting the access token for authentication, the client can request the protected resources from the resource server.</li>\n<li>The requested resources are returned to the application (client) with the valid access token from the resource server.</li>\n</ol>\n<p><strong>Also Read: <a href=\"https://www.loginradius.com/blog/engineering/authorization-code-flow-oauth/\">Guide to Authorization Code Flow for OAuth 2.0 </a></strong></p>\n<h2 id=\"why-you-should-be-using-oauth\" style=\"position:relative;\"><a href=\"#why-you-should-be-using-oauth\" aria-label=\"why you should be using oauth permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Why You Should be Using OAuth</h2>\n<p>OAuth provides applications the ability to secure designated access. In the traditional method, before OAuth, sites ask for the username and password combination for login and use the same credentials to access your data.</p>\n<p>With OAuth flow, instead of sending the username and password to the server with each request, the consumer sends an API key ID and secret. In this scenario, the consumer communicates to their identity provider for access. The identity provider generates an encrypted, signed token that grants the application access by authenticating the consumer. This process works on trust between the Identity Provider and the application. It will create a better interface for web applications.</p>\n<h2 id=\"working-with-oauth-token--scope\" style=\"position:relative;\"><a href=\"#working-with-oauth-token--scope\" aria-label=\"working with oauth token  scope permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Working with OAuth Token &#x26; Scope</h2>\n<p>The authorization server authenticates the client and validates the authorization grant, and if valid, issues a token known as an **access token. **It must be kept confidential and in storage. This access token should only be seen by the application, authorization, and resource server. The application makes sure that the storage of the access token can not be readable to other applications on the same device.</p>\n<p>The <a href=\"/blog/identity/oauth2-0-guide/\">OAuth 2.0 authorization protocol</a> defines the following methods to receive the Access Token. These Flows are called grant types. So you can decide the grant types as per the use case or it is based mainly on the type of your application.</p>\n<p>The following are the five types of grants described to perform authorizations tasks. Those are</p>\n<ul>\n<li>Authorization Code Grant</li>\n<li>Implicit Grant</li>\n<li>Resource Owner Credentials Grant</li>\n<li>Client Credentials Grant</li>\n<li>Refresh Token Grant \\</li>\n</ul>\n<p><strong>The scope</strong> specifies the level of access that the application is requesting from the client. An application can request one or more scopes. This information is then presented to the consumer on the consent screen. The access token issued to the application will be limited to the scopes granted. <strong>Consent</strong> tells your consumers who is requesting access to their data and what kind of data you're asking to access.</p>\n<h2 id=\"blending-oauth-with-loginradius\" style=\"position:relative;\"><a href=\"#blending-oauth-with-loginradius\" aria-label=\"blending oauth with loginradius permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Blending OAuth with LoginRadius</h2>\n<p>LoginRadius Identity Platform supports standard <a href=\"https://tools.ietf.org/html/rfc6749\">OAuth 2.0 specs</a> to integrate your OAuth client with LoginRadius. Thus, you can allow your application's customers to log in to an OAuth-enabled application without creating an account. This<a href=\"https://www.loginradius.com/docs/single-sign-on/tutorial/federated-sso/oauth-2-0/oauth-2-0-overview/#oauthguide0\"> document</a> goes over the complete process of getting the SSO feature implemented with OAuth 2.0.</p>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>This article talked about OAuth 2.0 as an authorization framework for delegated access to web APIs. This feature grants the resource access to the consumer without exposing their password to their application. However, before implementing any functionality on your website, analyze and consider the pros and cons from every possible angle.</p>\n<p>Cheers!</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-loginradius\"\n        title=\"book-a-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"September 23, 2021","updated_date":null,"title":"Everything You Need to Know About OAuth and How it Works","tags":["security"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.6260162601626016,"src":"/static/598f4336592e5164e938b78ec3cfc1bd/14b42/what-is-oauth-cover.jpg","srcSet":"/static/598f4336592e5164e938b78ec3cfc1bd/f836f/what-is-oauth-cover.jpg 200w,\n/static/598f4336592e5164e938b78ec3cfc1bd/2244e/what-is-oauth-cover.jpg 400w,\n/static/598f4336592e5164e938b78ec3cfc1bd/14b42/what-is-oauth-cover.jpg 800w,\n/static/598f4336592e5164e938b78ec3cfc1bd/16310/what-is-oauth-cover.jpg 1024w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Vaibhav Jain","github":null,"avatar":null}}}},{"node":{"fields":{"slug":"/identity/what-is-decentralized-authentication/"},"html":"<p>Decentralized authentication simply means that there is no central authority needed to verify your identity, i.e., decentralized identifiers. DIDs (Decentralized Identifiers) are a special type of identifier that allows for decentralized, verified digital identification. A DID is any subject identified by the DID's controller (e.g., a person, organization, thing, data model, abstract entity, etc.). </p>\n<p>DIDs, unlike traditional federated identifiers, are designed to be independent of centralized registries, identity providers, and certificate authorities.</p>\n<h2 id=\"what-is-the-decentralized-identity-model\" style=\"position:relative;\"><a href=\"#what-is-the-decentralized-identity-model\" aria-label=\"what is the decentralized identity model permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is the Decentralized Identity Model</h2>\n<p>So, <strong>what is Decentralized Authentication</strong>, and how to achieve it? Let us try to understand it with an example. Say you move to a new country, so now, you need to verify your identity once again to every service provider to give them proof that you are the right person and not a fraud.</p>\n<p>You must register for various services, including voting, obtaining a driver's license, banking, receiving electricity, and paying for entertainment subscriptions. To open an account, you must currently register with each service provider separately and prove your identification.</p>\n<p>But decentralized authentication simplifies this process. You only have to <a href=\"https://www.loginradius.com/authentication/\">authenticate your identification</a> to a neutral third party once, and the proof of your identity is saved in an identity trust fabric (ITF). The ITF and its supporting infrastructure (i.e., decentralized identity network, services, and verified claim exchange protocols) act as a middleman between you and your service providers, handling all identification and access requests.</p>\n<h2 id=\"how-to-achieve-decentralized-authentication\" style=\"position:relative;\"><a href=\"#how-to-achieve-decentralized-authentication\" aria-label=\"how to achieve decentralized authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How to Achieve Decentralized Authentication</h2>\n<p>When we think of decentralization, the first word that comes to our mind is \"Blockchain\". The introduction of blockchain as a technology for implementing a decentralized and tamper-evident shared-ledger allows for new research into establishing a common trust domain.</p>\n<p>At the moment, distributed ledger technology is a viable means to construct an ITF. It provides a decentralized and relatively safe way to store and verify the proof of IDs for identities (and associated profile attributes).</p>\n<p>As of now, blockchain technology is an interesting approach to <strong>decentralized authentication.</strong> But, blockchain isn't really built for the speed and scale you'd normally associate with enterprise tech. And that's not to say business leaders should be ignoring this stuff. There's an actual sense that client stress is going to be a critical driving force around self-sovereign identity — wherein people call for that they manipulate how their private statistics are shared.</p>\n<p>Although blockchain is one promising avenue for decentralized identity, it is far from the only one. Many of the most powerful concepts behind decentralized identity can be implemented without the use of blockchain. So, we should always be looking for an alternative.</p>\n<h2 id=\"how-will-it-be-used\" style=\"position:relative;\"><a href=\"#how-will-it-be-used\" aria-label=\"how will it be used permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How Will It Be Used</h2>\n<p>In one simple example, someone creates a couple of personal and public keys in an identification wallet. The public key (identifier) is hashed and saved immutably in an ITF. A dependent third party then proves the person's identification and certifies it by signing with its non-public key. </p>\n<p>The certification report is likewise saved within the ITF. If the person desires to get admission to a carrier, it's sufficient to give its identifier within the shape of a QR code or inside a token. The provider company <a href=\"https://www.loginradius.com/blog/identity/what-is-identity-verification/\">verifies the identification</a> with the aid of evaluating the hash values of identifiers with their corresponding hash facts within the ITF. </p>\n<p>If they match, admission is granted. In greater ideal scenarios, the person can derive separate key pairs from a non-public key to generate separate identifiers for one-of-a-kind relationships to allow privacy-pleasant protocols.</p>\n<h2 id=\"how-decentralized-authentication-is-influencing-industries\" style=\"position:relative;\"><a href=\"#how-decentralized-authentication-is-influencing-industries\" aria-label=\"how decentralized authentication is influencing industries permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How Decentralized Authentication is Influencing Industries</h2>\n<p>Businesses and industries that understand and capture the possibility to apply rising standardized decentralized identification technology for client identification control will create a long-time period of aggressive gain. It permits them to leapfrog the opposition and preserve their lead some distance into the future.</p>\n<p>This main area will come from having a holistic approach to identification control that encompasses identification, security, and privacy. For the companies with the foresight to embody them, decentralized identification technology will:  </p>\n<ul>\n<li>Reduce the want for centralized databases to absolutely the minimum (e.g., for regulatory purposes) and accordingly provide clients complete control and possession over their non-public information.</li>\n<li><a href=\"https://www.loginradius.com/blog/identity/consumer-data-privacy-security/\">Reduce vulnerability to information misuse</a> via the ones charged with coping with it, and to cyberattacks, fraud, and different monetary crimes.</li>\n<li>Give extra comfort to clients via ways of putting off passwords for login and ongoing authentication. </li>\n<li>Generate remarkable degrees of human acceptance as true among the corporation and its customers and companions.</li>\n<li>Reduce the compliance burden of dealing with clients' private information in services.</li>\n<li>Allow participation in open, trustworthy, interoperable standards.</li>\n<li>Enable interesting new enterprise alliances inside which companions can talk and trade records securely to supply services (e.g., in scientific or education).</li>\n</ul>\n<p>We know that <strong>Decentralized Authentication</strong> is the key to advancing in the future, and now it depends on how we try to implement it. Some problems may arise, but we never move ahead in the game/life if we are not up for a challenge.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-loginradius\"\n        title=\"book-a-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"September 21, 2021","updated_date":null,"title":"Decentralized Authentication: What Is It And How It Is Changing the Industry","tags":["security"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.694915254237288,"src":"/static/93cdd284b9caf8254977b8b515d06797/14b42/what-is-decentralized-authentication-cover.jpg","srcSet":"/static/93cdd284b9caf8254977b8b515d06797/f836f/what-is-decentralized-authentication-cover.jpg 200w,\n/static/93cdd284b9caf8254977b8b515d06797/2244e/what-is-decentralized-authentication-cover.jpg 400w,\n/static/93cdd284b9caf8254977b8b515d06797/14b42/what-is-decentralized-authentication-cover.jpg 800w,\n/static/93cdd284b9caf8254977b8b515d06797/16310/what-is-decentralized-authentication-cover.jpg 1024w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},{"node":{"fields":{"slug":"/identity/what-is-openid-connect/"},"html":"<p>OpenID Connect has brought a revolution in the authentication process and ascended by leaps and bounds. It is primarily used in the <a href=\"https://www.loginradius.com/blog/identity/what-is-single-sign-on/\">single sign-on</a> (SSO) and identity provision on the web. The main reason behind its success is the JSON-based ID tokens (JWT) delivered via the OAuth 2.0 process flow.</p>\n<p>Firstly, let’s have a quick look at OAuth 2.0. </p>\n<p>Often referred to as authorization or delegation protocol, it is a security standard where you authorize an application to access your data, or use features in another application on your behalf, without giving them your password. </p>\n<p>In simple terms, it provides applications the ability to “secure designated access.” OAuth never shares password data but instead uses authorization tokens to prove an identity between consumers and service providers. OAuth is an authentication protocol that allows you to approve one application interacting with another on your behalf without giving away your password.</p>\n<h2 id=\"what-is-openid-connect-oidc\" style=\"position:relative;\"><a href=\"#what-is-openid-connect-oidc\" aria-label=\"what is openid connect oidc permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is OpenID Connect (OIDC)</h2>\n<p>Now, let us learn about OpenID Connect. It is an OpenID Foundation (OIDF) standard that leverage OAuth 2.0 process flow to add an identity layer in order to obtain basic profile information about the End-User in an interoperable and REST-like manner or verify the identity of the End-User on the basis of the authentication done by an Authorization Server or Identity Provider (IDP). </p>\n<p>OpenID Connect supports clients of all types, including web-based, mobile, and JavaScript clients, to request and receive information about authenticated sessions and end-users. By implementing OpenID Connect, leveraging OAuth 2.0 fabricates a unified framework that promises mobile native applications, secure APIs, and browser applications in a single, cohesive architecture.</p>\n<h2 id=\"what-openid-connect-solves\" style=\"position:relative;\"><a href=\"#what-openid-connect-solves\" aria-label=\"what openid connect solves permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What OpenID Connect Solves</h2>\n<p>It is a very common practice to deploy the same password across multiple applications and websites. Since the traditional credentials are not centrally administered, if the security of any website that you use is compromised, a hacker could gain access to your password across multiple sites. </p>\n<p>Here comes OpenID connect in the picture as it never shares a password with any website. Even then, if a compromise does occur, you can immediately prevent any malicious access to your accounts at any website by simply changing the password for your OpenID Connect.</p>\n<p><strong>Also Read: <a href=\"https://www.loginradius.com/blog/engineering/guest-post/add-authentication-to-play-framework-with-oidc-and-loginradius/\">Add Authentication to Play Framework With OIDC and LoginRadius</a></strong></p>\n<h2 id=\"how-openid-connect-works\" style=\"position:relative;\"><a href=\"#how-openid-connect-works\" aria-label=\"how openid connect works permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How OpenID Connect Works</h2>\n<p>Before proceeding further, let’s have a look at some of the terminologies:</p>\n<ol>\n<li><strong>Client:</strong> The client is the application that’s trying to access the user’s account. It needs to get permission from the user before accessing the account. For example, a client application can present the user with the login page to get an access token for access to a particular resource.</li>\n<li><strong>Authorization Server:</strong> The authorization server validates the user credentials and redirects the user back to the client with an authorization code. The client communicates with the authorization server to confirm its identity and exchanges the code for an access token.</li>\n<li><strong>Scope:</strong> It specifies the level of access that the application is requesting from the client.</li>\n<li><strong>Claims:</strong> It constitutes the payload part of a JSON web token and represents a set of information exchanged between two parties.</li>\n</ol>\n<p>The application begins with an OAuth 2.0 flow that asks the user to authorize a request. As part of the flow, the client will include the OpenID Connect scope with scopes for any additional information it wants about the user. As the request is processed, the client receives an access token and an ID token issued by the authorization server. The ID token contains claims that have information about the user. </p>\n<p>The SSO is implemented by delivering ID tokens from the authorization server to the client. The client then contacts a dedicated endpoint on the authorization server known as the UserInfo endpoint to receive the remaining claims about the user using the access token. </p>\n<p>It is this ID token which is also known as the J<a href=\"https://www.loginradius.com/blog/engineering/jwt/\">SON Web Token (JWT)</a>, which contains claims, which are nothing but statements (like an email address or name) about an entity (the user) and some additional metadata. </p>\n<p>The OpenID Connect specification has a defined set of standard claims. The set of standard claims include name, email, gender, birth date, and so on. However, if you want to capture information about a user and there currently isn’t a standard claim that best reflects this piece of information, you can create custom claims and add them to your tokens.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 60.61538461538461%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"what-is-openid-connect-1\"\n        title=\"what-is-openid-connect-1\"\n        src=\"/static/451f1a4e5feecdeb41c4dc3cc4046e48/e5715/what-is-openid-connect-1.png\"\n        srcset=\"/static/451f1a4e5feecdeb41c4dc3cc4046e48/a6d36/what-is-openid-connect-1.png 650w,\n/static/451f1a4e5feecdeb41c4dc3cc4046e48/e5715/what-is-openid-connect-1.png 768w,\n/static/451f1a4e5feecdeb41c4dc3cc4046e48/d0143/what-is-openid-connect-1.png 1025w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>For instance, let us say you want to use OpenID Connect to authenticate the user for your own application using Google’s OAuth URL.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 68.61538461538461%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"what-is-openid-connect-2\"\n        title=\"what-is-openid-connect-2\"\n        src=\"/static/c5975515186d2504fcffefda5c889c80/e5715/what-is-openid-connect-2.png\"\n        srcset=\"/static/c5975515186d2504fcffefda5c889c80/a6d36/what-is-openid-connect-2.png 650w,\n/static/c5975515186d2504fcffefda5c889c80/e5715/what-is-openid-connect-2.png 768w,\n/static/c5975515186d2504fcffefda5c889c80/2bef9/what-is-openid-connect-2.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p><strong>Step 1:</strong> On clicking the sign-in button, you are required to pass a few parameters like <strong>scope, **which is a space-delimited list of scopes, **response_type</strong> having the value code, <strong>client_id</strong> having the client identifier, <strong>redirect_uri</strong> having the client redirect URI, and <strong>state</strong> having a random string. </p>\n<p><strong>Step 2:</strong> The OpenID provider authenticates users for a particular application instance.</p>\n<p><strong>Step 3:</strong> A one-time-use code is passed back to the client using a predefined Redirect URI.</p>\n<p><strong>Step 4:</strong> The user interface can then share this temporary code with the server</p>\n<p><strong>Step 5:</strong> The server can exchange this code in order to get access to the user’s profile. </p>\n<p>Here, technically speaking, you are not only getting the user profile but an Access Token and an ID Token having all the details of the user’s profile.</p>\n<h2 id=\"openid-connect-vs-openid-20\" style=\"position:relative;\"><a href=\"#openid-connect-vs-openid-20\" aria-label=\"openid connect vs openid 20 permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>OpenID Connect vs OpenID 2.0</h2>\n<p>OpenID Connect performs various tasks similar to OpenID 2.0, but it does so in such a way that it is API-friendly and usable by mobile and native applications. OpenID Connect defines optional mechanisms for encryption and robust signing. In OpenID Connect, OAuth 2.0 capabilities are integrated with the protocol itself, whereas the integration of OAuth 1.0a and OpenID 2.0 requires an extension.</p>\n<p>OpenID Connect and OpenID 2.0 have many architectural similarities. Furthermore, a very similar set of problems are solved by the protocols. However, OpenID 2.0 uses XML and a custom message signature scheme. Their implementations would sometimes abnormally refrain from interoperating. OAuth 2.0, leveraged by OpenID Connect, outsources the required encryption to the web’s built-in TLS (also called SSL or HTTPS) infrastructure, which is implemented on both client and server platforms universally. When signatures are required, OpenID Connect uses standard JSON Web Token (JWT) data structures. For this reason, OpenID Connect is easier for developers to implement, and when implemented, it results in much better interoperability.</p>\n<p>The story of OpenID Connect interoperability has been proven in practice when an extended series of interoperability trials were conducted by members of the OpenID Connect Working Group and the developers behind numerous OpenID Connect implementations.</p>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>OpenID Connect, its predecessors, and other <a href=\"https://www.loginradius.com/blog/engineering/encryption-and-hashing/\">public-key-encryption-based authentication</a> frameworks guarantee the security of the complete internet by having the responsibility for user identity verification in the hands of the most trusted and reliable service providers. If compared with the one which is available earlier, OpenID Connect is a way easier approach to implement and integrate and is expected to achieve a much-outspread acceptance.</p>\n<p>Cheers!</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAGCAYAAADDl76dAAAACXBIWXMAAAsSAAALEgHS3X78AAABdElEQVQY002RO0/CUBzFG6PtbZWHCAmRmBB5P8vDII9SSC0omog4oAEGjZMO6OKEuLjoJ2Fx0cSBwUQnXZxcHPwux38LJA7nNvfec8+5v1tOCCiwpbbhye2BxbYgBMtgIRVioDRRsARGXxZUzLlEHmehBaesQ4rrEMPViYf2DR9nDGKkChbVICVqsMt1WJI1sHCFwhUsUIFohJH49TxECvRUjhDW2mAbB5iP6hB8hUkhiRPN5KIZYJdrsEYrcCSpmQqMm6/m9ylUhSulY7N5ivROB3L9GOlGF3Ktbc4zuz341UPw/uIk0ESbBjoSGlYIx8BfzjSwVmyCEYEUUmCPa3Bnd+hwC75yC95S05SxbolU/iEbOCFCpDexEfIioTNCNd6Tp6IlMnNuGeeDe3z//OLx5RWj5zFGT2O8fXxh/P4Ja6w6vSEFCnTIlW2YiDzhzX7ATFKojDlvjpBPcDF4QPdyiG5/iE7/BmfXd+hd3VKpCoG8fzxWw2+c+yTpAAAAAElFTkSuQmCC'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-loginradius\"\n        title=\"book-a-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"September 21, 2021","updated_date":null,"title":"Getting Started with OpenID Connect","tags":["security"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.6260162601626016,"src":"/static/0625350ba691ab9d9997de97feb52d80/14b42/what-is-openid-connect-cover.jpg","srcSet":"/static/0625350ba691ab9d9997de97feb52d80/f836f/what-is-openid-connect-cover.jpg 200w,\n/static/0625350ba691ab9d9997de97feb52d80/2244e/what-is-openid-connect-cover.jpg 400w,\n/static/0625350ba691ab9d9997de97feb52d80/14b42/what-is-openid-connect-cover.jpg 800w,\n/static/0625350ba691ab9d9997de97feb52d80/16310/what-is-openid-connect-cover.jpg 1024w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Gurjyot Singh","github":null,"avatar":null}}}},{"node":{"fields":{"slug":"/identity/identity-system-customization/"},"html":"<p>In a world where every user demands a personalized experience, businesses without personalization would surely miss out on business opportunities. </p>\n<p>However, customizing a user identity system is a whole different concept and isn’t just limited to adding a personalized greeting for a user with their name. </p>\n<p>Customizing experiences right from the beginning when the user interacts with a brand impacts conversions and overall lead generation. </p>\n<p>Whether collecting user information, displaying the most relevant results, or suggesting products based on their previous preferences, customization is undoubtedly pivotal in improving conversions, sales, and lead generation. </p>\n<p>This post will highlight customized identity systems and learn how it paves the path for increased business advancements. </p>\n<h2 id=\"what-is-an-identity-system\" style=\"position:relative;\"><a href=\"#what-is-an-identity-system\" aria-label=\"what is an identity system permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is an Identity System?</h2>\n<p>Before we inch towards the business benefits of customizing an identity system, let’s first understand what an identity system is. </p>\n<p>An identity system or identity management system is an information system or a group of technologies working together to ensure the right individual has access to the right resources. </p>\n<p>Moreover, an identity system or a <a href=\"https://www.loginradius.com/\">consumer identity and access management</a> (CIAM) system helps businesses secure millions of consumer identities on their platform to offer a robust mechanism that prevents data breach. </p>\n<p>A CIAM solution also offers valuable insights into a consumer’s behavior, which further allows businesses to tailor their marketing and onboarding strategies. </p>\n<p><a href=\"https://www.loginradius.com/resource/an-identity-checklist-to-strategize-ciam-in-the-cloud/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"eb-iam-checklist\"\n        title=\"eb-iam-checklist\"\n        src=\"/static/b4c5a83a6e4a9c64bd00c98d46c12fcf/e5715/eb-iam-checklist.png\"\n        srcset=\"/static/b4c5a83a6e4a9c64bd00c98d46c12fcf/a6d36/eb-iam-checklist.png 650w,\n/static/b4c5a83a6e4a9c64bd00c98d46c12fcf/e5715/eb-iam-checklist.png 768w,\n/static/b4c5a83a6e4a9c64bd00c98d46c12fcf/63ff0/eb-iam-checklist.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<h2 id=\"role-of-identity-system-customization\" style=\"position:relative;\"><a href=\"#role-of-identity-system-customization\" aria-label=\"role of identity system customization permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Role of Identity System Customization</h2>\n<p>Since we have a fair knowledge of identity systems, let’s understand how customization can be a game-changer for achieving business goals through an identity system. </p>\n<p>We all come across different personalization experiences whenever we purchase goods from online marketplaces. </p>\n<p>Whether it’s Amazon suggesting a pair of running shoes when you purchase sports shorts or Netflix suggesting you a series based on your preferences, personalization is undeniably the key to push consumers to the sales funnel. </p>\n<p>However, the actual game begins in the first couple of seconds whenever an individual interacts with a brand for the first time. </p>\n<p>Yes, enterprises need to understand the importance of the onboarding process, which, if personalized adequately, can do wonders for their brand. </p>\n<p>Let’s understand this thing with an example.</p>\n<p>Imagine a user lands on a website and thinks about signing up. The website asks for a long list of details for the signup procedure. </p>\n<p>The user somehow manages to fill the enormous signup form (although around 80% of users will switch at this moment). </p>\n<p>Now the website, after the signup process, again asks for specific information. This information would be used to deliver a personalized experience but would undoubtedly hamper the user experience. </p>\n<p>The remaining users would now switch platforms. </p>\n<p>Here’s where an identity management solution like LoginRadius comes into play. </p>\n<p>The innovative CIAM solution leverages <a href=\"https://www.loginradius.com/blog/identity/presenting-progressive-profiling-loginradius/\">progressive profiling</a> that gradually collects user information and automatically delivers personalized journeys and thus reducing fatigue and improving signup rates and conversions. </p>\n<h2 id=\"how-loginradius-offers-competitive-edge-to-businesses\" style=\"position:relative;\"><a href=\"#how-loginradius-offers-competitive-edge-to-businesses\" aria-label=\"how loginradius offers competitive edge to businesses permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How LoginRadius Offers Competitive Edge to Businesses?</h2>\n<p>Let’s learn how LoginRadius helps brands deliver a flawless customized experience that increases conversions and improves lead generation rates. </p>\n<ul>\n<li><strong>Personalized Experiences:</strong> Bring in more revenue through LoginRadius that offers a great personalized experience. When you know people’s preferences, you can offer what they want, when they want it, the way they want it.</li>\n<li><strong>Customer Data Protection (MFA and <a href=\"https://www.loginradius.com/blog/identity/adaptive-authentication/\">Adaptive Authentication</a>):</strong> Consumers are infamous for repeating passwords across various online sites. Advanced CIAM solutions like LoginRadius use adaptive multi-factor authentication (MFA), which considers critical parameters such as location, the hour of the day, and gadgets to authenticate users. It promotes even greater <a href=\"https://www.loginradius.com/blog/engineering/password-security-best-practices-compliance/\">password security</a> by requiring additional verification for high-risk password resets.</li>\n<li><strong>Digital Consumer Interactions that are Seamless and Trustworthy:</strong> Many businesses have numerous online apps and interfaces. You can create a seamless customer experience by connecting all of your platforms with a single CIAM solution like LoginRadius: A single point of entry for all applications. Its identification database makes it necessary for users to verify multiple times when moving between them. During the login procedure, this adds to the friction.</li>\n<li><strong>Flexible APIs for Customization:</strong> When it comes to safeguarding access to information, developers strive to provide a seamless client experience. LoginRadius’ APIs provide developers with the freedom to define authentication requirements at any point in the planning process.</li>\n<li><strong>Support for Several Channels:</strong> LoginRadius provides various entrance points throughout all devices, making it as simple as possible for clients to get the tools they need to operate their company.</li>\n</ul>\n<h2 id=\"final-thoughts\" style=\"position:relative;\"><a href=\"#final-thoughts\" aria-label=\"final thoughts permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Final Thoughts</h2>\n<p>Businesses leveraging personalization are exceptionally ahead of their competitors as consumers are always expecting more personalized journeys. </p>\n<p>The key lies in considering personalization right from the beginning when a user first interacts with the brand, which can be achieved through identity system customization. </p>\n<p>LoginRadius helps brands create personalized journeys for their users that quickly signup and land into the sales funnel. </p>\n<p>Brands that wish to invoke the true potential of personalization must consider relying on the LoginRadius CIAM solution. <a href=\"https://www.loginradius.com/contact-sales/\">Talk to our sales team</a> today! </p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-loginradius\"\n        title=\"book-a-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"September 07, 2021","updated_date":null,"title":"Why Should You be Customizing Your Identity System to Your Needs","tags":["security"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5037593984962405,"src":"/static/7d74cce17394a034288bf98bf9ddc260/14b42/identity-system-customization-cover.jpg","srcSet":"/static/7d74cce17394a034288bf98bf9ddc260/f836f/identity-system-customization-cover.jpg 200w,\n/static/7d74cce17394a034288bf98bf9ddc260/2244e/identity-system-customization-cover.jpg 400w,\n/static/7d74cce17394a034288bf98bf9ddc260/14b42/identity-system-customization-cover.jpg 800w,\n/static/7d74cce17394a034288bf98bf9ddc260/16310/identity-system-customization-cover.jpg 1024w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Manish Tiwari","github":null,"avatar":null}}}},{"node":{"fields":{"slug":"/identity/sms-authentication-protect-business/"},"html":"<h2 id=\"an-overview\" style=\"position:relative;\"><a href=\"#an-overview\" aria-label=\"an overview permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>An Overview</h2>\n<p>With growing numbers of websites and consumers on those websites, authenticating each one of them becomes an arduous task. Also, it becomes an important aspect to protect and secure the consumer's data available on your application.  To protect sensitive consumer data, two-factor authentication became a mandatory requirement in today's digital world.</p>\n<p><a href=\"https://www.loginradius.com/resource/loginradius-ciam-two-factor-authentication/+\">Two-factor authentication</a> can be done via multiple channels. One is by using google authenticator codes, and the other is sending OTP on the consumer's email. But the easiest and convenient way is to do it via SMS.</p>\n<p>SMS stands for <strong>Short Messaging Service</strong>, which you guessed right. The text messages that we get on our mobile phones. This SMS holds an One Time Password (OTP), used to validate the consumer login. So basically, it can be used as a backend agent who reaches out to the original consumer and provides him access to any network, system, or web application.</p>\n<h2 id=\"how-does-sms-authentication-work\" style=\"position:relative;\"><a href=\"#how-does-sms-authentication-work\" aria-label=\"how does sms authentication work permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How does SMS Authentication Work?</h2>\n<p>A short messaging service (SMS) is generally used to carry any information to the end-user. It can be information like promotional messages, notifications, or personal texts, but they also carry authentication codes (OTPs). </p>\n<p>Using SMS authentication is quite simple and easy to understand. When a consumer tries to log in to a website, system, or network, he provides the login credentials. On successfully authenticating the login credentials, the server now does a two-factor authentication. It ensures that the consumer trying to log in is who he says he is. To authenticate the user, a text SMS and an OTP are sent to the consumer's registered mobile number. When that OTP is entered, the consumer gets authenticated, and then only they can access the contents of the system/application.</p>\n<p>SMS authentication is based on one of the three types of <a href=\"https://www.loginradius.com/blog/identity/what-is-multi-factor-authentication/\">multifactor authentication</a>, i.e., <strong>Possession based authentication</strong>. In this type of MFA, the consumer is authenticated via something that only he can possess, which is the mobile handset.</p>\n<h2 id=\"merits-and-demerits-of-using-sms-authentication\" style=\"position:relative;\"><a href=\"#merits-and-demerits-of-using-sms-authentication\" aria-label=\"merits and demerits of using sms authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Merits and Demerits of Using SMS Authentication</h2>\n<p>Everything in this world holds both the concepts of merits and demerits, and so does SMS authentication. Let's first discuss the merits that it has.</p>\n<ol>\n<li><strong>Additional Layer of security:</strong> Two-factor authentication is now widely used to protect consumers' account data. SMS authentication provides an extra layer of protection that too without any complexity. At least it is far better than having no additional security check.</li>\n<li><strong>Ease of usage</strong>: It is the human behaviour that we always look for an easy way to get our work done. Now imagine having a complex two factor authentication setup. Users will end up frustrated doing complex authentications. Here SMS authentication rises as an easy and secure option.</li>\n<li><strong>Ease of usage</strong>: It is human behavior that we always look for an easy way to get our work done. Now imagine having a complex two-factor authentication setup. Users will end up frustrated doing complex authentications. Here SMS authentication rises as an easy and secure option.</li>\n<li><strong>Low Cost:</strong> Sending SMS to consumers includes minor charges, which helps a lot for the organization with a large consumer base.</li>\n</ol>\n<p>Even after being so convenient and easy to operate, there are some demerits also. These demerits are capable enough to make the organizations think that it is enough to protect the business. Let's discuss them one by one:</p>\n<ol>\n<li><strong>SIM Highjacking or Device theft:</strong> It looks effortless to send the verification code on a mobile number and authenticate consumers based on that. But the Option of SMS authentication can be harmful if the SIM/device got lost or stolen by someone. As in this case, SIMs can easily be used on other mobile phones, and they will still receive the validation code.</li>\n<li><strong>Hacking:</strong> Earlier, it was complicated to intercept GSM-based SMS, but as the technologies are evolving, hackers have also got more power in their hands. The regular text which is sent and received over mobile phones can easily be intercepted today.</li>\n<li><strong>Social Engineering Attacks:</strong> Compared to earlier days, more devices are now connected to the internet today. Today, <a href=\"https://www.loginradius.com/blog/identity/phishing-for-identity/\">a simple phishing link</a> via a text msg or any advertisement will do the job. If a consumer clicks on the link by mistake or falls into any such trap, all his data will be gained by hackers, including SMS.</li>\n</ol>\n<p><a href=\"https://www.loginradius.com/resource/loginradius-ciam-phone-authentication/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"phone-auth-DS\"\n        title=\"phone-auth-DS\"\n        src=\"/static/e803561322c0f2e7a0423cf87d0771b2/e5715/phone-auth-DS.png\"\n        srcset=\"/static/e803561322c0f2e7a0423cf87d0771b2/a6d36/phone-auth-DS.png 650w,\n/static/e803561322c0f2e7a0423cf87d0771b2/e5715/phone-auth-DS.png 768w,\n/static/e803561322c0f2e7a0423cf87d0771b2/63ff0/phone-auth-DS.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<h2 id=\"should-businesses-use-sms-authentication\" style=\"position:relative;\"><a href=\"#should-businesses-use-sms-authentication\" aria-label=\"should businesses use sms authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Should Businesses Use SMS Authentication?</h2>\n<p>With all the demerit points discussed above and keeping all the security issues in mind, businesses might want to reconsider their authentication methodology. It is known very clearly that cybercrimes and hackers are overgrowing, especially after the internet revolution. </p>\n<p>Hacking groups and organizations are getting sophisticated daily, and SMS authentication has not evolved with such changes. We are still using a similar old mechanism to send text messages.</p>\n<p>Hence, intercepting a text message is easier as compared to earlier days.</p>\n<p>So to answer the big question, yes, it is better to have some two-factor authentication in the form of SMS authentication, but businesses should not rely entirely on it. They must think of other possible authentication mechanisms if they are collecting sensitive consumer data.</p>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>Dropping the idea of SMS authentication might look easy. Still, it is a bit difficult for some organizations because, as we already mentioned, SMS authentication is a very well-established method and has been used for a long time. The convenience provided in authenticating the end-users is also unparalleled. </p>\n<p>But businesses need to find an alternative for this as SMS authentication cannot be heavily relied upon. The key to achieving that is to find any other authentication method which is as easy, convenient, user-friendly, and secure at the same time. Going with the new trends in the technologies, <a href=\"https://www.loginradius.com/blog/identity/what-is-mob-biometric-authentication/\">Biometric Authentication</a> is one feasible solution. Well, we will indeed talk about that some other day :)</p>\n<p>Cheers!</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"LoginRadius Book a Demo\"\n        title=\"LoginRadius Book a Demo\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"September 02, 2021","updated_date":null,"title":"SMS Authentication — Can it Really Protect Your Business?","tags":["security"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.6666666666666667,"src":"/static/1eeb09974e808e86297ec44977490ac5/14b42/sms-authentication-protect-business-cover.jpg","srcSet":"/static/1eeb09974e808e86297ec44977490ac5/f836f/sms-authentication-protect-business-cover.jpg 200w,\n/static/1eeb09974e808e86297ec44977490ac5/2244e/sms-authentication-protect-business-cover.jpg 400w,\n/static/1eeb09974e808e86297ec44977490ac5/14b42/sms-authentication-protect-business-cover.jpg 800w,\n/static/1eeb09974e808e86297ec44977490ac5/16310/sms-authentication-protect-business-cover.jpg 1024w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Ashish Kumar Yadav","github":null,"avatar":null}}}},{"node":{"fields":{"slug":"/identity/smart-cities-improve-unified-identity/"},"html":"<p>Every country is progressively inching towards diverse smart city projects that eventually become the new driving force behind a state’s overall development. </p>\n<p>However, the key aspect determining whether these projects are a failure or a success is the involvement of civilians living and working in that city. </p>\n<p>Undoubtedly, civilian engagement is a significant factor that can offer valuable insights to enhance the current services that pave the path for the region’s overall development. </p>\n<p>But the big question is how to enhance civilian engagement?</p>\n<p>Well, delivering a flawless user experience and online services can help increase civilian engagement. </p>\n<p>The key lies in leveraging a robust <a href=\"https://www.loginradius.com/b2b-identity/\">identity management solution</a> that delivers a great user experience to citizens across multiple platforms and devices and ensures adequate security and privacy. </p>\n<p>Let’s understand the role of digital identity for smart cities in improving civilians’ digital experience through unified identity.</p>\n<h2 id=\"the-role-of-digital-identity-for-smart-cities\" style=\"position:relative;\"><a href=\"#the-role-of-digital-identity-for-smart-cities\" aria-label=\"the role of digital identity for smart cities permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>The Role of Digital Identity for Smart Cities</h2>\n<p>With population growth and the expansion of public services, cities need to be innovative about providing services to all people without compromising service quality. There is a need for a single platform where all facilities are centralized, and customer experience is considered.</p>\n<p>Digital identity is a great way to get started as it can prove a citizen’s identity through diverse government channels and is crucial for citizens to avail government services. </p>\n<p>As the government invokes the potential of secure digital identities, citizens would access core services and resources without any hassle. </p>\n<p>Moreover, every citizen requires some kind of public service, and that’s why handling a unique number of identities securely becomes a tough nut to crack for the government. Here’s where the need for digital identity management comes into play. </p>\n<p>A smart CIAM (consumer identity and access management) solution like LoginRadius helps public sector organizations manage heaps of identities efficiently without hampering user experience. </p>\n<p>Let’s learn how a CIAM solution like LoginRadius can deliver a flawless digital experience to civilians that pushes overall development reinforced by adequate security.</p>\n<h2 id=\"centralized-online-services\" style=\"position:relative;\"><a href=\"#centralized-online-services\" aria-label=\"centralized online services permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Centralized Online Services</h2>\n<p>Cities need one unified self-service portal so that their constituents have a seamless, efficient experience as they access the services they need. The LoginRadius Identity Platform enables cities to centralize their customer-facing digital applications into one portal. </p>\n<p>This portal enables a frictionless experience across multiple services that improve user experience and <a href=\"https://www.loginradius.com/customer-experience-solutions/\">enhance user engagement</a>. </p>\n<p> <br>\nThis single locus of access delivers a connected experience across multiple touchpoints and channels. LoginRadius has supported applications such as Account Summary, Customer Profile, Permit Applications, and Bill Payment. </p>\n<h2 id=\"maintaining-one-digital-identity-across-all-customer-service\" style=\"position:relative;\"><a href=\"#maintaining-one-digital-identity-across-all-customer-service\" aria-label=\"maintaining one digital identity across all customer service permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Maintaining One Digital Identity Across All Customer Service</h2>\n<p>What good is a centralized portal if citizens create multiple identities for individual web and mobile applications? Operating in this way creates identity silos that prevent a thorough view of the customer’s journey and preferences, which means the customer experience can’t be optimized for each individual.</p>\n<p>Without a seamless user experience, engagement rates drop. But with <a href=\"https://www.loginradius.com/single-sign-on/\">LoginRadius Single Sign-on (SSO),</a> cities and companies can allow customers to access all applications within their platform with a single set of unified credentials, rather than having to register and log in to each service separately. </p>\n<h2 id=\"integrating-with-third-party-applications\" style=\"position:relative;\"><a href=\"#integrating-with-third-party-applications\" aria-label=\"integrating with third party applications permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Integrating with Third-Party Applications</h2>\n<p>Many public sector organizations have a hard time using customer data to improve the digital experience. </p>\n<p>The LoginRadius Identity Platform offers pre-built integrations with over 150 third-party applications such as CRM, email marketing tools, online communities, payment systems, and more.</p>\n<p>This enables organizations to use that customer data to understand their customers better, offer more useful information and deliver that information more directly.</p>\n<h2 id=\"how-loginradius-helped-hydro-ottawa-in-creating-a-solid-architectural-foundation\" style=\"position:relative;\"><a href=\"#how-loginradius-helped-hydro-ottawa-in-creating-a-solid-architectural-foundation\" aria-label=\"how loginradius helped hydro ottawa in creating a solid architectural foundation permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How LoginRadius Helped Hydro Ottawa in Creating a Solid Architectural Foundation</h2>\n<p>Hydro Ottawa is a regulated electricity local distribution company in eastern Ontario. </p>\n<p>As the third-largest municipally-owned electric utility in Ontario, Hydro Ottawa maintains one of the safest, most reliable, and most cost-effective electricity distribution systems in the province.  They serve about 332,000 residential and commercial customers across 1,116 square kilometers.</p>\n<p><a href=\"https://www.loginradius.com/resource/case-study-page-hydro-ottawa/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAGCAYAAADDl76dAAAACXBIWXMAAAsSAAALEgHS3X78AAABdUlEQVQY0z2Py0sCURjFhSDHUUpRKfNBZT5ytCSryffbLCPNTeUDonYJ1qZVVkSbRIKQgrbRohYV1CaqRVArN+3aBP0tp3tnmhaHc7nf4Xe+T6awh0DFOkJQOiNQEVFn6Z89CGlOxYwEwHIJ6GaWoB1LQuFOgXFGobCJOYa4TISFoffEoXYEoRyeRo/ND4MvC703DTUXE4ISUEkg5vgquNQyWL4IxjNLgAEwf6UyiTzIz8OfK4OL5KFzhcESsNLKo9cVFeZUtNg4NQfDRAb9pHDAl4GFz0E7noKclAlAKWzyzYKLFsDFirCQoIrA1PYANO6Y0C4B+wjISCAmIuoUrPEk/q+QSY/JXBWhwjpRFcF8BcmVGtKlGsz8ghg0eLG528TX9w/un95w/fCMm8cXvHc+8frRgdodR7c1IJ5M1601Wmi1z3B8eoLDVhvnl7e4uLqDN1tG1xAviF9cI7kmKlv7KNUbKNf3sLFzhOr2AVSjEcjJcr/TlMxyxfTEKAAAAABJRU5ErkJggg=='); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"smart-cities-improve-unified-identity-Hydro-Ottawa\"\n        title=\"smart-cities-improve-unified-identity-Hydro-Ottawa\"\n        src=\"/static/b6964cfa0103e3728d3c44a7135854a7/e5715/smart-cities-improve-unified-identity-Hydro-Ottawa.png\"\n        srcset=\"/static/b6964cfa0103e3728d3c44a7135854a7/a6d36/smart-cities-improve-unified-identity-Hydro-Ottawa.png 650w,\n/static/b6964cfa0103e3728d3c44a7135854a7/e5715/smart-cities-improve-unified-identity-Hydro-Ottawa.png 768w,\n/static/b6964cfa0103e3728d3c44a7135854a7/63ff0/smart-cities-improve-unified-identity-Hydro-Ottawa.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<h3 id=\"client-requirements\" style=\"position:relative;\"><a href=\"#client-requirements\" aria-label=\"client requirements permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Client Requirements</h3>\n<p>The Hydro Ottawa team wanted to create a solid architectural foundation for digital growth and innovation. They decided that the core of this new system would be a <a href=\"https://www.loginradius.com/\">customer identity solution</a>  that centralizes and unifies customer identity data.</p>\n<p>With the launch of their mobile app and a revamp of their customer web portal underway, Hydro Ottawa needed an SSO solution to log in with a single profile that included social media validation.</p>\n<h3 id=\"result\" style=\"position:relative;\"><a href=\"#result\" aria-label=\"result permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Result</h3>\n<ul>\n<li>By implementing the LoginRadius customer identity solution, Hydro Ottawa now offers their customers a secure, streamlined login and registration system. </li>\n<li>Single sign-on (SSO) capabilities removed the previous accessibility barriers. With SSO, customers can move seamlessly through different Hydro Ottawa web applications without signing up or logging in again. </li>\n<li>Customers can easily access their accounts online to see their electricity usage and billing activities.</li>\n<li>By leveraging the identity solution and digital infrastructure already in place, Hydro Ottawa was able to release an award-winning mobile application. It’s the first app in North America that lets customers track their household’s electricity usage and costs, access their billing information, and find out about current power outages using a single tool.</li>\n</ul>\n<h2 id=\"final-thoughts\" style=\"position:relative;\"><a href=\"#final-thoughts\" aria-label=\"final thoughts permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Final Thoughts</h2>\n<p>Digital identity is paving the path for a rich unified experience for citizens that require public services in daily routines. </p>\n<p>Robust consumer identity and access management solutions like <a href=\"https://www.loginradius.com/contact-sales/\">LoginRadius</a> can help public sectors deliver great experiences tacked by adequate security to their civilians, reinforcing different smart city projects. </p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"LoginRadius Book a Demo\"\n        title=\"LoginRadius Book a Demo\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"August 25, 2021","updated_date":null,"title":"How Cities Can Improve Civilians’ Digital Experience with Unified Identity","tags":["security"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.6129032258064515,"src":"/static/7667de49e49fc737acd82123663210c6/14b42/smart-cities-improve-unified-identity-cover.jpg","srcSet":"/static/7667de49e49fc737acd82123663210c6/f836f/smart-cities-improve-unified-identity-cover.jpg 200w,\n/static/7667de49e49fc737acd82123663210c6/2244e/smart-cities-improve-unified-identity-cover.jpg 400w,\n/static/7667de49e49fc737acd82123663210c6/14b42/smart-cities-improve-unified-identity-cover.jpg 800w,\n/static/7667de49e49fc737acd82123663210c6/16310/smart-cities-improve-unified-identity-cover.jpg 1024w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},{"node":{"fields":{"slug":"/identity/refresh-tokens-jwt-interaction/"},"html":"<p>The modern digital landscape demands robust security, which significantly relies on access tokens that securely authenticate users. </p>\n<p>A token plays a crucial role in enhancing the overall security mechanism of an organization that helps to deliver flawless and secure authentication and authorization on their website or application.</p>\n<p>For years, businesses have been using <a href=\"https://www.loginradius.com/blog/identity/pros-cons-token-authentication/\">token-based authentication</a> that allows users to access resources. These tokens have a minimal lifetime, ensuring that cybercriminals have minimum time to exploit a user’s identity. </p>\n<p>With token security, users have to re-authenticate themselves for obvious security reasons by offering credentials to sign in if the access token is expired. </p>\n<p>However, this can be tedious and hampers user experience. To overcome this, the concept of refresh tokens was introduced.</p>\n<p>A refresh token ensures that a user can regain the access token without providing login credentials. </p>\n<p>Let’s dig deeper about refresh tokens, their use, and how they interact with JWTs (JSON Web Token). </p>\n<h2 id=\"what-is-a-token\" style=\"position:relative;\"><a href=\"#what-is-a-token\" aria-label=\"what is a token permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is a Token?</h2>\n<p>A token can be defined as a digitally encoded signature used to authenticate and authorize a user to access specific resources on a network.</p>\n<p>A token is always generated in the form of an OTP (One-Time Password), which depicts that it could only be used once and is generated randomly for every transaction.</p>\n<p>The token-based authentication allows users to verify their unique identity, and in return, they receive a special token that provides access to specific resources for a particular time frame.</p>\n<p>Apart from this, users can easily access the website or network for which the token is issued and need not enter the credentials again and again until the token expires.</p>\n<p>Tokens are widely used for regular online transactions for enhancing overall security and accuracy.</p>\n<h2 id=\"what-is-a-refresh-token\" style=\"position:relative;\"><a href=\"#what-is-a-refresh-token\" aria-label=\"what is a refresh token permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is a Refresh Token?</h2>\n<p>Since access tokens aren’t valid for an extended period because of security reasons, a refresh token helps re-authenticate a user without the need for login credentials. </p>\n<p>The primary purpose of a refresh token is to get long-term access to an application on behalf of a particular user. </p>\n<p>In a nutshell, a refresh token allows any website or application to regrant the access token without bothering the user. Here are its benefits:</p>\n<ul>\n<li>Balances security with usability</li>\n<li>Reinforces authentication</li>\n<li>Improves user experience </li>\n</ul>\n<h2 id=\"what-is-a-jwt-json-web-token\" style=\"position:relative;\"><a href=\"#what-is-a-jwt-json-web-token\" aria-label=\"what is a jwt json web token permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is a JWT (JSON Web Token)?</h2>\n<p>JWT (JSON Web Token) is used to provide a standard way for two parties to communicate securely. JWT is commonly used for managing authorization.</p>\n<p>There is an open industry standard called RFC-7519, which defines how JWT should be structured and how to use it to exchange information (called “claims”) in the form of JSON objects. This information can be verified and trusted as it is digitally signed.</p>\n<p><a href=\"https://www.loginradius.com/blog/engineering/jwt/\">JWT (JSON Web Token)</a> is a popular method of SSO, which is widely used by B2C applications, and through this system, you can allow your consumers to log in to an application that supports JWT.</p>\n<h2 id=\"when-to-use-a-refresh-token\" style=\"position:relative;\"><a href=\"#when-to-use-a-refresh-token\" aria-label=\"when to use a refresh token permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>When to Use a Refresh Token?</h2>\n<p>Before inching towards refresh tokens, one should understand that <a href=\"https://www.loginradius.com/blog/engineering/oauth2/\">OAuth 2.0</a> specifications define both access tokens and refresh tokens. </p>\n<p>Enterprises can leverage a refresh token in scenarios where the API needs authentication through an access token but users aren’t always available to provide credentials again and again. </p>\n<p>Hence, to enhance usability and improve user experience, refresh tokens can be used. </p>\n<p><strong>Also read:</strong> <strong><a href=\"https://www.loginradius.com/blog/identity/oauth2-0-guide/\">Working With Industry Authorization: A Beginner's Guide to OAuth 2.0</a></strong></p>\n<h2 id=\"best-practices-to-secure-refresh-tokens\" style=\"position:relative;\"><a href=\"#best-practices-to-secure-refresh-tokens\" aria-label=\"best practices to secure refresh tokens permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Best Practices to Secure Refresh Tokens</h2>\n<p>Since browser-based web applications cannot start using a refresh token, refresh tokens always require additional security. </p>\n<p>Whenever a refresh token is being utilized, the security token service quickly issues another access token and a new refresh token. The user can now make API calls through a refresh token. </p>\n<p>Whenever the overall security token service suspects that any refresh token is being used more than once, it automatically assumes something isn’t right. As a result, the refresh token gets immediately revoked and hence ensures adequate security. </p>\n<p><a href=\"https://www.loginradius.com/blog/identity/risk-based-authentication/\">RBA (Risk-based Authentication) </a>can be the finest way to enhance the security of a refresh token since it helps to analyze a vulnerability and automatically adds another stringent security layer in the mechanism. </p>\n<p>RBA works seamlessly with token-based authentication and can help improve overall security in high-risk scenarios where businesses need a stringent mechanism to prevent a security breach. </p>\n<h2 id=\"authentication-using-jwt-token-and-refresh-token\" style=\"position:relative;\"><a href=\"#authentication-using-jwt-token-and-refresh-token\" aria-label=\"authentication using jwt token and refresh token permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Authentication Using JWT Token and Refresh Token</h2>\n<p>JWTs represent a set of claims as JSON objects encoded in a JWS and JWE structure. This JSON object is called “JWT Claims Set.” The JSON object consists of zero or more name/value pairs (or members), where the names are strings, and the values are arbitrary JSON values. These members are the claims represented by the JWT.</p>\n<p>Your JWTs can contain any information you want; the user's name, birth date, email, etc. You do this with claims-based authorization. You then just tell your provider to make a JWT with these claims from the claims principle.</p>\n<p>Authentication is implemented through JWT access tokens along with refresh tokens. The API returns a short-lived token (JWT), which expires in 15 minutes, and in HTTP cookies, the refresh token expires in 7 days. </p>\n<p>JWT is currently used for accessing secure ways on API, whereas a refresh token generates another new JWT access token when it expires or even before. </p>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>Refresh tokens can be the ideal way to enhance security and improve user experience since users need not enter login credentials again and again. </p>\n<p>LoginRadius helps enterprises get maximum benefits in terms of security, scalability, and usability when implementing token-based authentication on web and mobile devices. </p>\n<p>Businesses can leverage LoginRadius’ authentication and authorization services for a seamless experience that fosters business growth. <a href=\"https://www.loginradius.com/contact-sales\">Schedule a call today</a>! </p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-loginradius\"\n        title=\"book-a-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"August 24, 2021","updated_date":null,"title":"Refresh Tokens: When to Use Them and How They Interact with JWTs","tags":["security"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.6129032258064515,"src":"/static/3e53bf0d14b0304e647258612eee7deb/14b42/refresh-tokens-jwt-interaction-cover.jpg","srcSet":"/static/3e53bf0d14b0304e647258612eee7deb/f836f/refresh-tokens-jwt-interaction-cover.jpg 200w,\n/static/3e53bf0d14b0304e647258612eee7deb/2244e/refresh-tokens-jwt-interaction-cover.jpg 400w,\n/static/3e53bf0d14b0304e647258612eee7deb/14b42/refresh-tokens-jwt-interaction-cover.jpg 800w,\n/static/3e53bf0d14b0304e647258612eee7deb/16310/refresh-tokens-jwt-interaction-cover.jpg 1024w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Saikiran Babladi","github":null,"avatar":null}}}},{"node":{"fields":{"slug":"/identity/nist-password-guidelines-2021/"},"html":"<p>We’re living in an era where almost everything is just a few clicks away, and the internet is becoming the second home for all of us.</p>\n<p>Whether it’s entertainment or essential purchasing, we’re catered to everything online in the digital world.</p>\n<p>But with the increase in the use of the internet, the risk of security breach and identity thefts have augmented substantially.</p>\n<p>Businesses are compromising sensitive user data and consumer identities that not only cause losses worth millions but eventually tarnish brand repute.  </p>\n<p>To cope with the increasing number of cyber frauds and data thefts, the National Institute of Standards and Technology (NIST) has issued certain requirements along with controls for digital user identities.</p>\n<p>The NIST has dispensed several guidelines that not only ensure security to the user but eventually help enterprises secure their crucial business information.</p>\n<p>These guidelines offer recommendations for users for <a href=\"https://www.loginradius.com/blog/identity/loginradius-password-policy-business-consumer/\">creating strong passwords</a> along with recommendations for vendors/verifiers that are handling passwords.</p>\n<p>Let’s have a quick look at some of the most important NIST guidelines and the cybersecurity best practices to follow in 2021.</p>\n<h2 id=\"nist-overview\" style=\"position:relative;\"><a href=\"#nist-overview\" aria-label=\"nist overview permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>NIST Overview</h2>\n<p>Recognizing the national and economic security of the United States depends on the reliable functioning of critical infrastructure. The NIST Cybersecurity Framework is a thorough collaboration between industry and government, and consists of standards, guidelines, and practices to promote the protection of critical infrastructure.</p>\n<p>The prioritized, flexible, repeatable, and cost-effective approach of the Framework helps owners and operators of critical infrastructure to manage cybersecurity-related risk.</p>\n<p>The NIST Cybersecurity Framework consists of several guiding standards:</p>\n<ul>\n<li>NIST SP 800-53 (Revision 4)</li>\n<li>NIST SP 800-171</li>\n<li>The OMB Trusted Internet Connection (TIC) Initiative—FedRAMP Overlay (pilot) </li>\n<li>The DoD Cloud Computing Security Requirements Guide (SRG)</li>\n</ul>\n<p>Now, let’s have a quick look at some of the password guidelines issued by NIST.</p>\n<h3 id=\"processing-and-password-length\" style=\"position:relative;\"><a href=\"#processing-and-password-length\" aria-label=\"processing and password length permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Processing and Password Length</h3>\n<p>As per the NIST latest guidelines, the length of a password is a crucial security aspect, and all user-created passwords must be at least 8 characters in length.</p>\n<p>Moreover, the passwords generated by machines must be a minimum of 6 characters in length. Apart from this, the maximum character length must be 64 characters.</p>\n<p>Now, the essential aspect for enterprises is that during the verification process, the verifiers shouldn’t truncate passwords while processing. Instead, the passwords should be adequately hashed and must be salted.</p>\n<p>This reinforces the security of credentials. Also, the user should be allowed a minimum of 10 attempts to enter their password before locking their profile.</p>\n<p><strong>Also Read</strong>: <a href=\"https://www.loginradius.com/blog/identity/cybersecurity-best-practices-for-enterprises/\">Cybersecurity Best Practices for Businesses in 2021</a> </p>\n<h3 id=\"no-more-hints\" style=\"position:relative;\"><a href=\"#no-more-hints\" aria-label=\"no more hints permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>No More Hints</h3>\n<p>NIST has advised the vendors and verifiers to dismiss the use of password hints that were earlier offered to users for creating more complex passwords.</p>\n<p>Since these hints can allow attackers to guess the passwords, these hints shouldn’t be used in any form to ensure the highest level of security for users and service providers.</p>\n<p>Moreover, KBA (Knowledge-based Authentication), which was earlier a part of the authentication process that includes questions like- “Where you were born?” were asked to prove identity.</p>\n<h3 id=\"two-factor-authentication-and-password-managers\" style=\"position:relative;\"><a href=\"#two-factor-authentication-and-password-managers\" aria-label=\"two factor authentication and password managers permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Two-Factor Authentication and Password Managers</h3>\n<p>The users must be provided with the ability to paste passwords into password fields as users incline towards the use of password managers for a seamless authentication experience.</p>\n<p>Earlier, the verifiers didn’t allow the users to paste a password just because of security concerns. But now, service providers need to revoke the same for enhanced user experience.</p>\n<p>Apart from this, the use of <a href=\"https://www.loginradius.com/blog/identity/how-secure-2fa/\">two-factor authentication</a> must be emphasized as SMS isn’t considered a secure option.</p>\n<p>The verifiers need to rely on strong multi-factor authentication methods that provide authentication using secure one-time links or must use Google Authenticator.</p>\n<h3 id=\"hashing\" style=\"position:relative;\"><a href=\"#hashing\" aria-label=\"hashing permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Hashing</h3>\n<p>Password hashing is crucial in today’s era as it’s no longer safe to store passwords in plain text formats, which can be easily exploited.</p>\n<p>Password hashing is defined as the method to one-way transform a password that turns the password into another string called hashed password. This means that the password can’t be reversed to its original form once hashed.</p>\n<p>NIST recommends the use of password hashing algorithms while storing and retrieving passwords. The identity providers must rely on a secure password management mechanism that ensures hashing of passwords of the users within a network for enhanced security.</p>\n<h2 id=\"loginradius--the-ultimate-solution-covering-a-larger-footprint-of-the-overall-nist-cybersecurity-framework\" style=\"position:relative;\"><a href=\"#loginradius--the-ultimate-solution-covering-a-larger-footprint-of-the-overall-nist-cybersecurity-framework\" aria-label=\"loginradius  the ultimate solution covering a larger footprint of the overall nist cybersecurity framework permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>LoginRadius <strong>—</strong> The Ultimate Solution Covering a Larger Footprint of the Overall NIST Cybersecurity Framework</h2>\n<p>The NIST Cybersecurity Framework is worth adopting solely for its stated goal of improving risk-based security. But it also delivers ancillary benefits that include effective collaboration and communication of security posture with executives and industry organizations, as well as potential future improvements in legal exposure and even assistance with regulatory compliance.</p>\n<p>The NIST Cybersecurity Framework is NOT just for “government applications.” It represents a state-of-the-art approach to security and compliance.</p>\n<p><a href=\"https://www.loginradius.com/resource/loginradius-ciam-passwordless-login/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"DS-passwordless-login\"\n        title=\"DS-passwordless-login\"\n        src=\"/static/f4798092ec43235616eb2638cc648d3f/e5715/DS-passwordless-login.png\"\n        srcset=\"/static/f4798092ec43235616eb2638cc648d3f/a6d36/DS-passwordless-login.png 650w,\n/static/f4798092ec43235616eb2638cc648d3f/e5715/DS-passwordless-login.png 768w,\n/static/f4798092ec43235616eb2638cc648d3f/63ff0/DS-passwordless-login.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<p>Here’s what enterprises get with the LoginRadius consumer identity and access management (CIAM) solution:</p>\n<ul>\n<li><strong>Compliance:</strong> LoginRadius is NIST CSF audited and certified and offers CCPA and GDPR compliances.</li>\n<li><strong>Multi-Factor Authentication:</strong> LoginRadius offers stringent authentication backed by multi-factor authentication (MFA).</li>\n<li><strong>Risk-based Authentication:</strong> LoginRadius CIAM provides adaptive MFA, i.e., risk-based authentication, which adds another stringent layer of authentication whenever something suspicious is detected during a login attempt.</li>\n<li><strong>Quick Insights:</strong> Get valuable insights regarding user behavior to create the best marketing strategy and to provide different offers to users.</li>\n<li><strong>Single Sign-On (SSO):</strong> Enhance user experience with LoginRadius Single Sign-On that helps users to stay authenticated while switching applications or programs.</li>\n<li><strong>Passwordless Login:</strong> <a href=\"https://www.loginradius.com/passwordless-login/\">LoginRadius’ Passwordless Login</a> helps enterprises build the next level of user authentication experience that improves engagement and enhances conversions.</li>\n<li><strong>Social Login:</strong> LoginRadius CIAM helps your users to leverage their social media to quickly authenticate within a couple of seconds for a seamless login experience. </li>\n</ul>\n<h2 id=\"final-thoughts\" style=\"position:relative;\"><a href=\"#final-thoughts\" aria-label=\"final thoughts permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Final Thoughts</h2>\n<p>Enterprises embarking on a journey to enhance business growth while matching the pace with the best cybersecurity hygiene should consider NIST password guidelines while making password policies for users.</p>\n<p>When it comes to creating a flawless login experience backed by security, LoginRadius leaves no stone unturned in delivering the finest experience.</p>\n<p>LoginRadius is self-attested to the NIST Cybersecurity Framework as part of its internal infosec program and aligns with the NIST SP 800-53 component, leveraging the CSA CCM, which covers a broader footprint of the overall NIST cybersecurity framework.</p>\n<p>Need help with NIST? <a href=\"https://www.loginradius.com/contact-sales/\">Reach us</a> for quick guidance today.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-free-demo-loginradius\"\n        title=\"book-a-free-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"July 22, 2021","updated_date":null,"title":"How NIST is Changing Password Creation in 2021","tags":["security"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5151515151515151,"src":"/static/9819d7e3c418c8014b25d32652278643/14b42/nist-password-guidelines-2021-cover.jpg","srcSet":"/static/9819d7e3c418c8014b25d32652278643/f836f/nist-password-guidelines-2021-cover.jpg 200w,\n/static/9819d7e3c418c8014b25d32652278643/2244e/nist-password-guidelines-2021-cover.jpg 400w,\n/static/9819d7e3c418c8014b25d32652278643/14b42/nist-password-guidelines-2021-cover.jpg 800w,\n/static/9819d7e3c418c8014b25d32652278643/16310/nist-password-guidelines-2021-cover.jpg 1024w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Deependra Singh","github":null,"avatar":null}}}},{"node":{"fields":{"slug":"/identity/bring-your-own-identity/"},"html":"<p>When was the last time you signed up to a website by filling out the entire registration form? Gone are the days where you had to fill out lengthy registration forms, create different usernames and passwords, and remember them every time you tried to login - awesome, right!</p>\n<p>Consumers demand a smarter experience today. They don't like to create a new ID every time they want to utilize a service. Instead, they are open to leveraging their existing digital identity securely and easily, with the opportunity to reuse it in multiple domains. </p>\n<p>And as a response to this demand, businesses have come-up with a concept called Bring Your Own Identity (BYOI).</p>\n<h2 id=\"what-is-byoi\" style=\"position:relative;\"><a href=\"#what-is-byoi\" aria-label=\"what is byoi permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is BYOI</h2>\n<p>The \"Bring your own\" trend started when organizations allowed their employees to bring their device - BYOD. Later, it gained popularity and paved the way for many such concepts like Bring your own apps (BYOA), Bring your own technology (BYOT), Bring your own cloud (BYOC), Bring your own encryption (BYOE), etc.</p>\n<p><strong>Bring your own identity, or BYOI is also one such trend where consumers bring in their own digital ID, which is either managed by self or by any third-party.</strong></p>\n<p>Instead of asking consumers to fill in long forms as part of the registration process, you can allow them to choose their existing <a href=\"https://www.loginradius.com/blog/identity/digital-identity-management/\">digital identity</a>. These could be any of their social media accounts such as Facebook, Twitter, Google, or LinkedIn. </p>\n<p>Moreso, with features  like simplified registration (which is both quick and secure), the BYOI trend can address the problems of organizations that are losing consumers.  </p>\n<h2 id=\"the-big-picture\" style=\"position:relative;\"><a href=\"#the-big-picture\" aria-label=\"the big picture permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>The Big Picture</h2>\n<p>With the pandemic forcing organizations to rethink their digital transformation, BYOI is a key part of securing user identities in 2021. BYOI (Bring Your Own Identity) will unlock the value in digital identities and is going to disrupt traditional methods of access in the future.</p>\n<p>Many of your consumers have an existing digital identity, and BYOI lets them use an account they already have rather than creating a new one. By allowing your consumers to log in with an existing set of credentials, you make it simple for consumers to sign up for an account with you, increasing your overall conversion rate.</p>\n<h2 id=\"identity-brokering\" style=\"position:relative;\"><a href=\"#identity-brokering\" aria-label=\"identity brokering permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Identity Brokering</h2>\n<p><a href=\"https://www.loginradius.com/identity-providers/\">Identity Brokering</a> is an approach where organizations/businesses do not require consumers to provide their credentials to authenticate. Instead, an identity broker service acts as a bridge between the Identity and Service Providers and enables the authentication process between the two.</p>\n<h3 id=\"span-stylecolor-ff4500-identity-broker-service-facilitates-byoi-by-implementing-industry-standard-protocol-oauth2-oauth-open-authentication-2-is-a-framework-that-authorizes-and-enables-applications-to-obtain-limited-access-to-a-consumers-accounts-on-an-http-service-such-as-facebook-github-or-digitalocean-span\" style=\"position:relative;\"><a href=\"#span-stylecolor-ff4500-identity-broker-service-facilitates-byoi-by-implementing-industry-standard-protocol-oauth2-oauth-open-authentication-2-is-a-framework-that-authorizes-and-enables-applications-to-obtain-limited-access-to-a-consumers-accounts-on-an-http-service-such-as-facebook-github-or-digitalocean-span\" aria-label=\"span stylecolor ff4500 identity broker service facilitates byoi by implementing industry standard protocol oauth2 oauth open authentication 2 is a framework that authorizes and enables applications to obtain limited access to a consumers accounts on an http service such as facebook github or digitalocean span permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><span style=\"color: #FF4500\"> Identity broker service facilitates BYOI by implementing industry-standard protocol OAUTH2. OAuth (Open Authentication) 2 is a framework that authorizes and enables applications to obtain limited access to a consumer's accounts on an HTTP service such as Facebook, GitHub, or DigitalOcean. </span></h3>\n<h2 id=\"the-loginradius-advantage\" style=\"position:relative;\"><a href=\"#the-loginradius-advantage\" aria-label=\"the loginradius advantage permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>The LoginRadius Advantage</h2>\n<p>If you are the CSO or CIO of your company looking for a platform that acts as an identity broker, the <a href=\"https://www.loginradius.com/\">LoginRadius CIAM platform</a> is the perfect solution that can act as a bridge between multiple identity service providers. </p>\n<p>The possibilities are endless with the LoginRadius platform in how you can set up your login flows to best serve your consumer's needs and meet your business goals. LoginRadius can integrate with any provider, so you can give your consumers the convenience and choice while having an optimized back-end infrastructure to ensure an automated and streamlined experience for your consumers.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-loginradius\"\n        title=\"book-a-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"July 09, 2021","updated_date":null,"title":"The Rise of BYOI (Bring your own Identity)","tags":["security"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.7857142857142858,"src":"/static/21da72bd0fe638c759ad35eb963a1557/14b42/bring-your-own-identity-cover.jpg","srcSet":"/static/21da72bd0fe638c759ad35eb963a1557/f836f/bring-your-own-identity-cover.jpg 200w,\n/static/21da72bd0fe638c759ad35eb963a1557/2244e/bring-your-own-identity-cover.jpg 400w,\n/static/21da72bd0fe638c759ad35eb963a1557/14b42/bring-your-own-identity-cover.jpg 800w,\n/static/21da72bd0fe638c759ad35eb963a1557/16310/bring-your-own-identity-cover.jpg 1024w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Saikiran Babladi","github":null,"avatar":null}}}},{"node":{"fields":{"slug":"/identity/step-up-authentication-loginradius/"},"html":"<p>With the sudden increase in the number of data breaches across the world amid the global pandemic, securing consumer data is becoming the top-notch priority for online businesses.</p>\n<p>Since most of the data breaches and unauthorized access are a result of human error or exploitation of authenticity by cybercriminals, adequate measures must be taken by enterprises to secure consumer data.</p>\n<p>So what can be the ideal solution when businesses already have a secure authentication mechanism in place?</p>\n<p>Well, a robust authentication system for consumers that shuns any chance of unauthorized access to sensitive information is undoubtedly the need of the hour.</p>\n<p>LoginRadius, a leading consumer identity, and access management solution provider has launched a “<a href=\"https://www.loginradius.com/resource/reauthentication-by-loginradius-2/\">step-up authentication</a>” feature in their CIAM that reinforces conventional authentication systems.</p>\n<p>The game-changing security feature enables consumers to authenticate even if they have recently signed in. This mechanism can be set up in various circumstances based on a particular business’s needs.</p>\n<h3 id=\"intent-behind-launch\" style=\"position:relative;\"><a href=\"#intent-behind-launch\" aria-label=\"intent behind launch permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>Intent behind Launch</strong></h3>\n<p>The step-up authentication feature by LoginRadius enhances consumer and enterprise security by adding an extra layer of authentication that kicks in during a certain scenario. Here are some of the reasons behind the launch:</p>\n<ul>\n<li>To assist in fighting everyday security and cyber challenges</li>\n<li>To prevent session hijacking when a consumer leaves the device logged in</li>\n<li>To strengthen the security of critical information and events</li>\n<li>To help maintain consumer trust</li>\n</ul>\n<p>The step-up authentication feature can help businesses in securely authenticating consumers when:</p>\n<ul>\n<li>Consumers attempt to access secure resources on your application</li>\n<li>Consumers perform a crucial transaction on your application</li>\n<li>There’s no activity from a consumer’s end for a while</li>\n</ul>\n<p>Since different businesses may require different scenarios for step-up authentication to pitch in, the enterprise can decide which application events are crucial transactions for them and then leverage step-up authentication for the same.</p>\n<h2 id=\"final-thoughts\" style=\"position:relative;\"><a href=\"#final-thoughts\" aria-label=\"final thoughts permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Final Thoughts</h2>\n<p>Step-up authentication is a revolutionary feature when it comes to authenticating logged-in consumers when they perform a crucial transaction or need access to secure resources. It helps <a href=\"https://www.loginradius.com/authentication/\">authenticate consumers</a> without hampering the user experience. </p>\n<p>Implementing step-up authentication on an online platform offers a competitive edge to businesses seeking innovative ways to enhance authentication and security for their website or application.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"LoginRadius Book a Demo\"\n        title=\"LoginRadius Book a Demo\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"June 17, 2021","updated_date":null,"title":"LoginRadius Offers Additional Security Layer through Newly-Enhanced Step-up Authentication Feature","tags":["security"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.6666666666666667,"src":"/static/6c7127ad26c4552c6aaf292f91e5fb84/14b42/step-up-authentication-loginradius-cover.jpg","srcSet":"/static/6c7127ad26c4552c6aaf292f91e5fb84/f836f/step-up-authentication-loginradius-cover.jpg 200w,\n/static/6c7127ad26c4552c6aaf292f91e5fb84/2244e/step-up-authentication-loginradius-cover.jpg 400w,\n/static/6c7127ad26c4552c6aaf292f91e5fb84/14b42/step-up-authentication-loginradius-cover.jpg 800w,\n/static/6c7127ad26c4552c6aaf292f91e5fb84/16310/step-up-authentication-loginradius-cover.jpg 1024w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},{"node":{"fields":{"slug":"/identity/unified-cx-retail/"},"html":"<p>In an increasingly digital world, brands know they depend on a unified experience. However, this is only possible when <strong>consumer experience in retail</strong> focuses on designing and orchestrating a single insight, ensuring consumers receive the exact value repeatedly across all touchpoints, products, and services. It is the diversity of these experiences that determines the quality of consumer relationships.</p>\n<h2 id=\"what-is-unified-consumer-experience\" style=\"position:relative;\"><a href=\"#what-is-unified-consumer-experience\" aria-label=\"what is unified consumer experience permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is Unified Consumer Experience?</h2>\n<p>Unified consumer experience can be defined as consumers' perceptions (conscious and subconscious) of their relationship with the brand during the entire life cycle.</p>\n<p>The American research and consulting company Gartner, in its definition, explains quite well what unified experience is about, \"The practice of designing and reacting to consumer interactions to meet or exceed their expectations and thus increase their satisfaction, loyalty, and promotion.\"</p>\n<p>Moreover, it's about getting to know consumers so completely that you can create and deliver personalized experiences that attract them to stay loyal to the brand or company and \"promote\" it to other people. That's the most valuable advertising tactic that exists.</p>\n<h2 id=\"why-is-a-unified-consumer-experience-necessary\" style=\"position:relative;\"><a href=\"#why-is-a-unified-consumer-experience-necessary\" aria-label=\"why is a unified consumer experience necessary permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Why is a Unified Consumer Experience Necessary?</h2>\n<p>The concept of unified consumer experience may sound idealistic or poignant, but anyone who rejects it is woefully out of context. Consumers have become a competitive differentiator in today's hyper-competitive and hyper-connected global marketplace. There is tangible business value in maintaining an effective consumer experience which can:</p>\n<ul>\n<li>Strengthen brand preference through <a href=\"https://www.loginradius.com/blog/fuel/omnichannel-customer-experience/\">omnichannel experiences</a></li>\n<li>Increase revenue with existing consumer sales and new sales from word of mouth</li>\n<li>Improve loyalty (and build advocates) through meaningful and memorable consumer interactions</li>\n<li>Lower costs by reducing customer churn</li>\n</ul>\n<p>With the execution of any plan, some challenges may cross your way. The same goes for creating a unified consumer experience in retail. You have to be prepared for the upcoming difficulties that may lead to some problems in one way or another. Therefore, you must identify those challenges to be prepared for them. The following can help.</p>\n<h3 id=\"create-consistent-brand-experiences-across-all-channels\" style=\"position:relative;\"><a href=\"#create-consistent-brand-experiences-across-all-channels\" aria-label=\"create consistent brand experiences across all channels permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Create consistent brand experiences across all channels</h3>\n<p> While consumers may be willing to accept different service levels across different channels, they expect the brand value proposition to remain consistent. But the proliferation of channels makes it difficult to ensure consistency across all of them.</p>\n<h3 id=\"integration-of-brand-and-channel-experiences\" style=\"position:relative;\"><a href=\"#integration-of-brand-and-channel-experiences\" aria-label=\"integration of brand and channel experiences permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Integration of brand and channel experiences</h3>\n<p>An integrated channel experience is highly desirable but challenging to achieve. Technology inherited processes and organizational territorialism can be barriers to integration.</p>\n<h3 id=\"consolidate-consumer-data-in-a-single-view\" style=\"position:relative;\"><a href=\"#consolidate-consumer-data-in-a-single-view\" aria-label=\"consolidate consumer data in a single view permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Consolidate consumer data in a single view</h3>\n<p> Having a <a href=\"https://www.loginradius.com/profile-management/\">single view of the consumer</a> across interactions, channels, products, and time would facilitate coordinated, unified communications with the consumer. Departmental silos, fragmented data, and inconsistent processes make this challenge seem insurmountable.</p>\n<h2 id=\"benefits-of-unified-consumer-experience\" style=\"position:relative;\"><a href=\"#benefits-of-unified-consumer-experience\" aria-label=\"benefits of unified consumer experience permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Benefits of Unified Consumer Experience</h2>\n<p>It is best to offer a unified solution that allows conversations to be managed from a single interface to facilitate the best consumer experience in retail. The objective is clear—to guarantee consistency of responses across all contact channels. A unified consumer relationship strategy must be based on multi-channel interaction management designed around a centralized knowledge base.</p>\n<p>With that in mind, here are the top five benefits of investing in a unified experience.</p>\n<h3 id=\"improve-word-of-mouth-marketing\" style=\"position:relative;\"><a href=\"#improve-word-of-mouth-marketing\" aria-label=\"improve word of mouth marketing permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Improve word of mouth marketing</h3>\n<p>One of the biggest benefits of having a unified experience is delighting the consumer, who will certainly spread their satisfaction with family, friends, and colleagues. Word of mouth marketing is by far the best way to boost your results.</p>\n<h3 id=\"improve-consumer-engagement\" style=\"position:relative;\"><a href=\"#improve-consumer-engagement\" aria-label=\"improve consumer engagement permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Improve consumer engagement</h3>\n<p>A satisfied consumer will engage with the brand more often and will certainly become a loyal consumer. In the age of social media, it's easier to share information online. Suppose a consumer decides to buy something while running through your feed. In that case, a unified experience will ensure they have the same shopping experience throughout their journey, no matter where they are. </p>\n<p><strong>Also Read</strong>: <a href=\"https://www.loginradius.com/blog/fuel/customer-experience-retail-industry/\">Enhancing Customer Experience in Retail Industry</a></p>\n<h3 id=\"analyze-feedbacks-and-increase-loyalty\" style=\"position:relative;\"><a href=\"#analyze-feedbacks-and-increase-loyalty\" aria-label=\"analyze feedbacks and increase loyalty permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Analyze feedbacks and increase loyalty</h3>\n<p>Having a unified experience makes it easier to analyze consumer feedback throughout their entire journey and optimize marketing, service, and purchasing strategies. This will undoubtedly promote more enchanting and loyalty-building experiences.</p>\n<h3 id=\"interact-in-real-time-and-provide-consistent-service\" style=\"position:relative;\"><a href=\"#interact-in-real-time-and-provide-consistent-service\" aria-label=\"interact in real time and provide consistent service permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Interact in real-time and provide consistent service</h3>\n<p>Today's consumer is highly informed through a unique experience. It is possible to supply them with new information in real-time through the most convenient channel, including SMS, voice, social and chat. Having multiple channels is, therefore, essential to ensure efficient service.</p>\n<h3 id=\"optimize-competitiveness\" style=\"position:relative;\"><a href=\"#optimize-competitiveness\" aria-label=\"optimize competitiveness permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Optimize competitiveness</h3>\n<p>Surveys indicate that<a href=\"https://searchengineland.com/88-consumers-trust-online-reviews-much-personal-recommendations-195803#:~:text=88%25%20Have%20Read%20Reviews%20To,85%25%20in%202013\"> 88%</a> of consumers read product reviews to determine the quality of the consumer experience offered by a brand. By ensuring your current consumer satisfaction through a unified experience, competitiveness gains are also inevitable.</p>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>Every stage of achieving a unified experience is essential, from initial consideration to functional evaluation, time of purchase, and even the post-purchase experience. Each stage is an opportunity to improve the consumer experience in retail<strong>,</strong> and each phase is an opportunity to obtain more information that can give feedback into the marketing processes and take advantage of the next time.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-loginradius\"\n        title=\"book-a-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"June 15, 2021","updated_date":null,"title":"Why Big Merchants Need to Deliver a Unified Consumer Experience?","tags":["security"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5037593984962405,"src":"/static/64599dc42b6d1b3d20f002040beba4b9/14b42/unified-cx-retail-cover.jpg","srcSet":"/static/64599dc42b6d1b3d20f002040beba4b9/f836f/unified-cx-retail-cover.jpg 200w,\n/static/64599dc42b6d1b3d20f002040beba4b9/2244e/unified-cx-retail-cover.jpg 400w,\n/static/64599dc42b6d1b3d20f002040beba4b9/14b42/unified-cx-retail-cover.jpg 800w,\n/static/64599dc42b6d1b3d20f002040beba4b9/16310/unified-cx-retail-cover.jpg 1024w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Navanita Devi","github":null,"avatar":null}}}},{"node":{"fields":{"slug":"/identity/data-security-hospitality-industry/"},"html":"<p>The hospitality industry is one of the largest industries that cater specifically to humans. Hotels, restaurants, and resorts house large databases that contain data regarding business operations as well as consumer information that visit the restaurant or resort. </p>\n<p>The personal information collected can range from generic data like names and phone numbers to sensitive data like bank account details. </p>\n<p>In addition to this, databases in the hospitality industry also happen to be the most vulnerable to data breaches. It has been seen that the most number of breaches in security has resulted in identity theft and leaks of credit card information. </p>\n<h2 id=\"data-security-concerns-for-the-hospitality-business\" style=\"position:relative;\"><a href=\"#data-security-concerns-for-the-hospitality-business\" aria-label=\"data security concerns for the hospitality business permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Data Security Concerns for The Hospitality Business</h2>\n<p>The frequency of cyberattacks against business databases can be attributed to the fact that the hospitality industry largely depends on credit cards as a medium of payment. This may increase the chances of a hacker receiving access to sensitive information. Larger businesses contain multiple databases protected by thinly veiled encryption. </p>\n<p>The vulnerabilities in the data security in hospitality are also witnessed in the following aspect: </p>\n<ul>\n<li><strong>Sovereignty over data</strong>: The data collected and the people who can access it differ from country to country. In communist countries like China and Russia, governments have access to every industry’s database. However, democratic governments, as seen in the European and North American countries, offer more data privacy in the hospitality industry. </li>\n<li><strong>Financial restrictions</strong>: This is mostly seen in smaller businesses that are just starting or businesses that have seen a dip in visitors. The low funds will not allow an owner to invest in a capable cybersecurity provider.</li>\n<li><strong>Divided ownership</strong>: High-profile businesses in this industry can have several owners or franchisors. Each of these individuals will have access to the databases on multiple devices. Therefore, a hacker can easily force their way into the mainframe. </li>\n<li><strong>Electronic payment methods</strong>: The aforementioned reliance on payment cards can greatly increase the chances of information leaking. However, other virtual methods of payment like online payment and more can create the potential for <a href=\"https://www.loginradius.com/blog/identity/2019/10/cybersecurity-attacks-business/\">cyber attacks</a>. </li>\n<li><strong>Disposal methods</strong>: Most businesses lack the ability to dispose of information that is no longer required properly. This leads to the accumulation of information like credit card data of past consumers and more. </li>\n<li><strong>Lack of training</strong>: Staff training is restricted to the service aspect of the business. However, training employees to carry out processes in maintaining data security in hospitality like data collection and storage in the right manner is overlooked. </li>\n<li><strong>Coercion</strong>: There is a chance that the hackers directly approach the employees of the business to release information and thus infiltrate the data security in hospitality. They can manipulate them to give up their loyalty towards the business. </li>\n<li><strong>Adherence to law</strong>: Given the rise in data breaches, the security measures put in place by lawmakers are especially strict during this time. Therefore, failure to adhere to these laws leads to one paying large fines for putting consumer data at risk. </li>\n<li><strong>Insider attacks</strong>: A scorned employee can be a potential offender towards the systems that possess data collected as they have a motive to sell sensitive information to competitors or hackers. However, the chance of this occurring is slim. </li>\n</ul>\n<h2 id=\"best-practices-for-data-security-in-the-hospitality-industry\" style=\"position:relative;\"><a href=\"#best-practices-for-data-security-in-the-hospitality-industry\" aria-label=\"best practices for data security in the hospitality industry permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Best Practices for Data Security in the Hospitality Industry</h2>\n<p>As per the multiple threats that have been uncovered above, it is essential to understand how to ensure hotel <a href=\"https://www.loginradius.com/blog/identity/2020/12/data-security-best-practices/\">data security</a>. Therefore, the businesses in the hospitality industry employ the use of the following measures: </p>\n<ul>\n<li><strong>Encrypting payment card data</strong>: This process can involve the addition of two-factor authentication that will protect the data from being accessible to non-employees. This encryption can <a href=\"https://www.loginradius.com/blog/identity/2021/03/identity-theft-frauds/\">prevent identity theft</a>. </li>\n<li><strong>Training and educating</strong>: Employees will require thorough vetting regarding the importance of proper data storage. This training can also work towards reducing the chances of insider attacks as only a few employees will have access to the databases.</li>\n<li><strong>Cyber-security measures</strong>: This includes the addition of firewalls, traffic filters, and network monitors to guard against malware present online. </li>\n<li><strong>Testing computer systems</strong>: The testing process applies to the cyber-security provider. That is to say, businesses are required to carry out several tests to determine if the provider can detect the threat or malware.</li>\n<li><strong>Track data</strong>: Databases that are stored on various systems require a tracker. Through this tracker, one is capable of determining where the data is present or moving towards. </li>\n</ul>\n<p><a href=\"https://www.loginradius.com/resource/pii-data-breach-report/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"protecting-PII-against-data-breaches-report\"\n        title=\"protecting-PII-against-data-breaches-report\"\n        src=\"/static/8ae28768fa7a47b91a86b0e9441f9c50/e5715/protecting-PII-against-data-breaches-report.png\"\n        srcset=\"/static/8ae28768fa7a47b91a86b0e9441f9c50/a6d36/protecting-PII-against-data-breaches-report.png 650w,\n/static/8ae28768fa7a47b91a86b0e9441f9c50/e5715/protecting-PII-against-data-breaches-report.png 768w,\n/static/8ae28768fa7a47b91a86b0e9441f9c50/63ff0/protecting-PII-against-data-breaches-report.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<h2 id=\"how-can-loginradius-mitigate-data-security-concerns-for-the-hospitality-industry\" style=\"position:relative;\"><a href=\"#how-can-loginradius-mitigate-data-security-concerns-for-the-hospitality-industry\" aria-label=\"how can loginradius mitigate data security concerns for the hospitality industry permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How Can LoginRadius Mitigate Data Security Concerns for the Hospitality Industry</h2>\n<p>LoginRadius offers a variety of security measures to protect the hospitality industry. In fact, the importance of LoginRadius attachments to <a href=\"https://www.loginradius.com/industry-travel-and-hospitality/\">data security has revolutionized</a> how hospitality organizations are dealing with data protection and cybersecurity. They can do so due to the following features: </p>\n<ul>\n<li>Compliance with legal issues regarding the collection and storage of information. </li>\n<li>Multiple authentication implementations.</li>\n<li>Safe cloud integrations for businesses that function using multiple systems. </li>\n<li>Encryption for cards and other information. </li>\n<li>Encryption of data at the field (onsite business systems) levels to ensure data security in hospitality. </li>\n<li>Management of consent of consumers. </li>\n</ul>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>According to the AARP, around <a href=\"https://www.aarp.org/money/scams-fraud/info-2021/ftc-fraud-report-identity-theft-pandemic.html\">1.4 million</a> cases of Identity theft were reported in 2020. Therefore, it has become one of the most common methods of fraud.</p>\n<p>To mitigate this, governments across the world have implemented the privacy act. This privacy act hopes to decrease the number of identity theft cases by regulating the information that is collected by businesses. Therefore, investing in proper data security in hospitality can work to protect not only the consumer but also the business from losing large sums of profit. </p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAGCAYAAADDl76dAAAACXBIWXMAAAsSAAALEgHS3X78AAABdElEQVQY002RO0/CUBzFG6PtbZWHCAmRmBB5P8vDII9SSC0omog4oAEGjZMO6OKEuLjoJ2Fx0cSBwUQnXZxcHPwux38LJA7nNvfec8+5v1tOCCiwpbbhye2BxbYgBMtgIRVioDRRsARGXxZUzLlEHmehBaesQ4rrEMPViYf2DR9nDGKkChbVICVqsMt1WJI1sHCFwhUsUIFohJH49TxECvRUjhDW2mAbB5iP6hB8hUkhiRPN5KIZYJdrsEYrcCSpmQqMm6/m9ylUhSulY7N5ivROB3L9GOlGF3Ktbc4zuz341UPw/uIk0ESbBjoSGlYIx8BfzjSwVmyCEYEUUmCPa3Bnd+hwC75yC95S05SxbolU/iEbOCFCpDexEfIioTNCNd6Tp6IlMnNuGeeDe3z//OLx5RWj5zFGT2O8fXxh/P4Ja6w6vSEFCnTIlW2YiDzhzX7ATFKojDlvjpBPcDF4QPdyiG5/iE7/BmfXd+hd3VKpCoG8fzxWw2+c+yTpAAAAAElFTkSuQmCC'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-loginradius\"\n        title=\"book-a-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"April 23, 2021","updated_date":null,"title":"Data Security in Hospitality: Best Practices for Operating In a Post-COVID Era","tags":["security"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5037593984962405,"src":"/static/5f5d54187db9fa145c26b762f1a0e763/14b42/data-security-hospitality-industry-cover.jpg","srcSet":"/static/5f5d54187db9fa145c26b762f1a0e763/f836f/data-security-hospitality-industry-cover.jpg 200w,\n/static/5f5d54187db9fa145c26b762f1a0e763/2244e/data-security-hospitality-industry-cover.jpg 400w,\n/static/5f5d54187db9fa145c26b762f1a0e763/14b42/data-security-hospitality-industry-cover.jpg 800w,\n/static/5f5d54187db9fa145c26b762f1a0e763/16310/data-security-hospitality-industry-cover.jpg 1024w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Navanita Devi","github":null,"avatar":null}}}},{"node":{"fields":{"slug":"/identity/what-is-salt/"},"html":"<p>In February 2019, some <a href=\"https://www.theregister.com/2019/02/11/620_million_hacked_accounts_dark_web/\">617 million online account</a> details were stolen from 16 hacked websites and displayed for sale on the dark web. In April 2019, nearly <a href=\"https://www.upguard.com/breaches/facebook-user-data-leak\">540 million records</a> from third-party Facebook data were exposed. These are some of the most well-known data breaches that have occurred recently. Let us understand what causes such breaches and how we can protect our data from these.</p>\n<h2 id=\"what-is-a-salt\" style=\"position:relative;\"><a href=\"#what-is-a-salt\" aria-label=\"what is a salt permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is a Salt?</h2>\n<p>Salting hashes sounds like something that comes out of a recipe book. However, in cryptography, salt plays a significant role in the breach of data. While creating applications, security is usually not the biggest priority. While data leaks can sometimes happen, hash salting generators only come to mind when there is a major invasion of privacy that affects the majority of the consumers’ applications. </p>\n<p>Processes like user password hashing and salting are quite common in applications. They are indispensable for the <a href=\"https://www.loginradius.com/blog/identity/2020/12/data-security-best-practices/\">protection of data</a> and building long-lasting consumer trust and loyalty. But before we embark on how salting is useful to boost security, let us understand what salting is and how it works. </p>\n<h2 id=\"what-is-salting\" style=\"position:relative;\"><a href=\"#what-is-salting\" aria-label=\"what is salting permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is Salting?</h2>\n<p>Salting refers to adding random data to a hash function to obtain a unique output which refers to the hash. Even when the same input is used, it is possible to obtain different and unique hashes. These hashes aim to strengthen security, protect against dictionary attacks, brute-force attacks, and several others. </p>\n<p>Most commonly, salting is used in common passwords to strengthen them. So the next question is, what is salting when it comes to passwords? Often when we talk about passwords, we use terms like hashed and salted. This means there is an addition of random strings of characters (salting) to the password that is unique and known only to that site. Normally, this Salt is placed before the password and prevents people from figuring out even the simplest passwords like ‘123456’ or ‘password’. </p>\n<p>If a password has been hashed and salted, it is difficult for you to crack the passwords. Even if it is one of the most commonly used passwords, it takes several tries to break down the hashing and reveal the password. </p>\n<h2 id=\"how-can-we-effectively-utilize-hashing-using-salt\" style=\"position:relative;\"><a href=\"#how-can-we-effectively-utilize-hashing-using-salt\" aria-label=\"how can we effectively utilize hashing using salt permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How Can We Effectively Utilize Hashing Using Salt?</h2>\n<p>Whenever you are setting or resetting your password, the aim is to make it as unique as possible so that it cannot be easily guessed and subsequently hacked. This is the main aim of salts. They improve the uniqueness quotient of your password on the particular site you are accessing and add an extra security layer to the user password so that your data is not breached easily. </p>\n<p>So how can we use salts to increase the efficiency of hashing?</p>\n<ul>\n<li><strong>Uniqueness</strong></li>\n</ul>\n<p>The first step is to make your Salt as unique as possible. Make it as different as you can, using characters which one would never commonly pick. For example, if you use ten different salts, you are increasing the security of the hashed password by a factor of ten. </p>\n<p>Furthermore, when the salted password is stored separately, using rainbow tables, it makes it difficult for the attacker to determine the password. The best method to <a href=\"https://www.loginradius.com/blog/identity/2019/12/digital-privacy-best-practices/\">ensure privacy protection</a> is to use a unique salt each time the same user generates or changes their password. </p>\n<ul>\n<li><strong>Length of the salt</strong></li>\n</ul>\n<p> The length of the salt is as important as its quality or uniqueness. Very short salts are easier to attack and breach, thereby compromising your password. Ideally, the length of Salt should be as long as the output of the hash. For example, if the hash output is 32 bytes, the salt length should be at least 32 bytes, if not more. This step is an addition to passwords with specialized characters. </p>\n<ul>\n<li><strong>Predictability</strong> </li>\n</ul>\n<p>Usernames must never be used as salt values. They are not only predictable but are also heavily overused by the user across several sites. This reduces their security. Since these usernames such as ‘admin’ and ‘root’ are very commonly looked up as well, it is easy to crack the hashes and cause a breach of privacy.</p>\n<ul>\n<li><strong>Salt value generators</strong></li>\n</ul>\n<p>The best way to ensure that your salted password hashing is secure is by using a cryptographically secure pseudo-random password generator to generate the salt values for you. As the name suggests, these are random, unpredictable, and reliable in terms of security and privacy.</p>\n<ul>\n<li><strong>Addition of a secret key</strong></li>\n</ul>\n<p>A public key is vulnerable to attacks. The ‘secret’ to securing and validating your password is by adding a secret key. When this private key is added, it allows the password to be validated. The key must also be stored externally in a separate server. This makes it difficult for the hacker to attack the data as he has to first access the internal system and then breach through the external server as well. </p>\n<ul>\n<li><strong>Salt reuse</strong></li>\n</ul>\n<p>A common mistake when they are salting their password is reusing a salt they may have used previously. You may think that using the salt only once hardly takes away its uniqueness, but in reality, even one use of a salt depreciates its value. Reusing it can make it much easier for attackers to breach through both internal and external systems. Therefore, it is recommended to rely on a password salt generator each time. </p>\n<ul>\n<li><strong>Using extremely different combinations</strong></li>\n</ul>\n<p>The more unique the combination of the hash, the more secure it is, but the combinations cannot be extremely strange. Combining random characters in the hopes that the <a href=\"https://www.loginradius.com/blog/identity/2021/01/how-to-choose-a-secure-password/\">password will become more secure</a> can actually backfire sometimes. </p>\n<p>It creates interoperability problems and reduces password strength. Never attempt to create crypto hashes and salts on your own. Always use standard designs that have been created by experts to avoid compromising your safety. </p>\n<ul>\n<li><strong>Kerckhoff’s Principle</strong> </li>\n</ul>\n<p>To attack a hash, the hacker has to know the algorithm. However, according to Kerckhoff’s Principle, the hacker has access to the source code with which he can easily reverse engineer the algorithm. This access is only possible in free and open-source software. </p>\n<p>This is why your hash and salt must come from an external, closed source and server so that it is not easy to locate its origin and hack it. The more secure your link is, the more difficult it is to source the original Salt and hash.</p>\n<h2 id=\"why-use-loginradius-to-add-a-password-salt\" style=\"position:relative;\"><a href=\"#why-use-loginradius-to-add-a-password-salt\" aria-label=\"why use loginradius to add a password salt permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Why Use LoginRadius to Add a Password Salt?</h2>\n<p>Most businesses are not well-versed in the language of password salts and hashes and have to rely on experts for their help. LoginRadius offers a solution to manage passwords for strong authentication.</p>\n<p><a href=\"https://www.loginradius.com/\">The CIAM platform</a> offers a comprehensive set of services for the protection of data, including password hashing, salting, password compliance check, password peppering and BYOK (Bring your own key), and data encryption. </p>\n<p>LoginRadius has also launched a unique password policy that provides additional features such as password complexity, profile password prevention, password expiration, and password history. </p>\n<p><a href=\"https://www.loginradius.com/resource/password-policy-datasheet\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"password-policy\"\n        title=\"password-policy\"\n        src=\"/static/4869119f192e8d3c85c01a555126a7c6/e5715/password-policy.png\"\n        srcset=\"/static/4869119f192e8d3c85c01a555126a7c6/a6d36/password-policy.png 650w,\n/static/4869119f192e8d3c85c01a555126a7c6/e5715/password-policy.png 768w,\n/static/4869119f192e8d3c85c01a555126a7c6/63ff0/password-policy.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<p>This policy makes LoginRadius an excellent choice for password protection among businesses and consumers alike. </p>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>Protecting your data, whether you represent a company or simply for your personal accounts, is essential. Hashing and salting of passwords and cryptographic hash functions are the foolproof methods for this purpose. With salts, you can rest assured that your passwords and data are in good hands. </p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAGCAYAAADDl76dAAAACXBIWXMAAAsSAAALEgHS3X78AAABdElEQVQY002RO0/CUBzFG6PtbZWHCAmRmBB5P8vDII9SSC0omog4oAEGjZMO6OKEuLjoJ2Fx0cSBwUQnXZxcHPwux38LJA7nNvfec8+5v1tOCCiwpbbhye2BxbYgBMtgIRVioDRRsARGXxZUzLlEHmehBaesQ4rrEMPViYf2DR9nDGKkChbVICVqsMt1WJI1sHCFwhUsUIFohJH49TxECvRUjhDW2mAbB5iP6hB8hUkhiRPN5KIZYJdrsEYrcCSpmQqMm6/m9ylUhSulY7N5ivROB3L9GOlGF3Ktbc4zuz341UPw/uIk0ESbBjoSGlYIx8BfzjSwVmyCEYEUUmCPa3Bnd+hwC75yC95S05SxbolU/iEbOCFCpDexEfIioTNCNd6Tp6IlMnNuGeeDe3z//OLx5RWj5zFGT2O8fXxh/P4Ja6w6vSEFCnTIlW2YiDzhzX7ATFKojDlvjpBPcDF4QPdyiG5/iE7/BmfXd+hd3VKpCoG8fzxWw2+c+yTpAAAAAElFTkSuQmCC'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-loginradius\"\n        title=\"book-a-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"April 16, 2021","updated_date":null,"title":"What Is a Salt and How Does It Boost Security?","tags":["security"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5037593984962405,"src":"/static/63cf2bb82c295d4146d34967841d3123/14b42/what-is-salt-cover.jpg","srcSet":"/static/63cf2bb82c295d4146d34967841d3123/f836f/what-is-salt-cover.jpg 200w,\n/static/63cf2bb82c295d4146d34967841d3123/2244e/what-is-salt-cover.jpg 400w,\n/static/63cf2bb82c295d4146d34967841d3123/14b42/what-is-salt-cover.jpg 800w,\n/static/63cf2bb82c295d4146d34967841d3123/16310/what-is-salt-cover.jpg 1024w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Navanita Devi","github":null,"avatar":null}}}},{"node":{"fields":{"slug":"/identity/oauth-authentication-vulnerabilities/"},"html":"<p>With the growing use of the internet, cybercriminals are actively hunting for businesses that haven’t implemented user authentication measures precisely.</p>\n<p>The most common mistake for any business that usually goes unnoticed is the poor implementation of OAuth, which is an open standard protocol for token-based authentication &#x26; authorization. </p>\n<p>Businesses leveraging secure login procedures, including social login, may witness certain attacks leading to exposed consumer identities due to poor OAuth implementation.</p>\n<p>Moreover, the <a href=\"https://www.loginradius.com/blog/identity/2020/05/cyber-threats-business-risk-covid-19/\">rising number of cyberattacks</a> amid the global pandemic depicts organizations needing to enhance their first line of defense to secure their partners and consumers.</p>\n<p>Here we’ll be sharing some tips to help businesses avoid OAuth vulnerabilities and maintain a secure environment for their consumers.</p>\n<h2 id=\"what-is-oauth\" style=\"position:relative;\"><a href=\"#what-is-oauth\" aria-label=\"what is oauth permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is OAuth</h2>\n<p>OAuth defines the standard for token-based authentication and authorization, which allows the client web application to securely obtain a user’s password without direct exposure.</p>\n<p>OAuth allows users to access certain features of a web application without exposing confidential details to the requesting application.</p>\n<p>For instance, if a user needs to sign-up for a new website and prefers to sign-up through their social media profile, it can be done through OAuth working harmoniously in the background.</p>\n<p>In a nutshell, OAuth is used to share access to data between applications by defining a series of communications between the user, the resource owner, and the OAuth provider.</p>\n<p>A good read:<a href=\"https://www.loginradius.com/blog/engineering/oauth2/\"> Getting Started with OAuth 2.0</a></p>\n<h2 id=\"how-do-oauth-authentication-vulnerabilities-occur\" style=\"position:relative;\"><a href=\"#how-do-oauth-authentication-vulnerabilities-occur\" aria-label=\"how do oauth authentication vulnerabilities occur permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How Do OAuth Authentication Vulnerabilities Occur</h2>\n<p>Since the OAuth specification is quite indistinct and flexible, there are chances of several vulnerabilities that can occur.</p>\n<p>While configuring OAuth, the admin must consider all the major security configurations available, which enhances the overall security of consumers’ data.</p>\n<p>In simple words, there are plenty of loopholes if adequate configuration practices aren’t considered while ensuring security for the end-user.</p>\n<p>Apart from this, the fact that OAuth lacks built-in security features and everything relying on the developer’s end is yet another reason for security concerns.</p>\n<p>So does it mean that everything depends on the way OAuth is implemented on a platform? Yes, developers adding robust security features, including proper validation, ensure users’ confidential information isn’t breached by attackers during a login session.</p>\n<h2 id=\"5-tips-to-avoid-oauth-authentication-vulnerabilities\" style=\"position:relative;\"><a href=\"#5-tips-to-avoid-oauth-authentication-vulnerabilities\" aria-label=\"5 tips to avoid oauth authentication vulnerabilities permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>5 Tips to Avoid OAuth Authentication Vulnerabilities</h2>\n<p>Here are some helpful tips to enhance the overall security of your web application:</p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"\" data-index=\"0\"><code class=\"grvsc-code\"><span class=\"grvsc-line\">1.  Always Use Secure Sockets Layer (SSL)</span></code></pre>\n<p>SSL is the first line of defense for your web application or website that helps prevent data breaches, phishing scams, and other similar threats.</p>\n<p>Talking about OAuth security, the ones that aren’t using SSL are undoubtedly surrendering the confidential information of their users to attackers.</p>\n<p>All it takes is a couple of minutes for cybercriminals to sneak into user data by bypassing the basic security if the resource owner doesn’t use SSL.</p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"\" data-index=\"1\"><code class=\"grvsc-code\"><span class=\"grvsc-line\">2.       Encrypting Clients’ Secrets</span></code></pre>\n<p>One of the biggest mistakes that organizations repeat is storing clients’ crucial data in plaintext instead of encrypted files.</p>\n<p>Businesses must understand that if authentication relies entirely on passwords, the databases must contain encrypted files so that attackers can’t gain access to confidential user and business details.</p>\n<p>Using a CIAM solution offering <a href=\"https://www.loginradius.com/blog/engineering/lets-encrypt-with-ssl-certificates/\">data encryption and SSL</a> is perhaps the best option for the highest security while users login to a business website or web application.</p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"\" data-index=\"2\"><code class=\"grvsc-code\"><span class=\"grvsc-line\">3.       Using Refresh Tokens</span></code></pre>\n<p>Access tokens for login must be short-lived, and organizations must emphasize the use of refresh tokens for maximum security.</p>\n<p>Refresh tokens play a crucial role in improving the overall safety in cyberspace. They can automatically end a session if a user on the website is idle for some time and offer access again without entering the credentials (for a predefined time).</p>\n<p>Thus, the user would be forced to log in again but need not enter the credentials, which eventually decreases the risk of a security breach since the previous session already expired.</p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"\" data-index=\"3\"><code class=\"grvsc-code\"><span class=\"grvsc-line\">4.       Choose Short Lifetime for Token Access</span></code></pre>\n<p>The lifetime for both access tokens and refresh tokens should be short to ensure the tokens aren’t active for a long time, which again may lead to a security threat.</p>\n<p>For critical applications dealing with finances or other crucial information about consumers, the access token lifetime should be kept short and not exceed 60 seconds.</p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"\" data-index=\"4\"><code class=\"grvsc-code\"><span class=\"grvsc-line\">5.       SSL Certificate Check</span></code></pre>\n<p>Web applications and websites can be protected from attackers by ensuring SSL security is enabled. The web browser warns if the website lacks an SSL certificate or is expired.</p>\n<p>In a mobile application, the development team needs to ensure that their website is well secured with a proper SSL certificate.</p>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>Certain loopholes in the implementation phase of the OAuth protocol could cause considerable losses to organizations that are collecting user data.</p>\n<p>Avoiding implementation mistakes is the only way to ensure maximum safety for consumers and employees of an organization.</p>\n<p>The aforementioned methods are proven to minimize security threats and ensure seamless interaction between the end-user and resource owner.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-free-demo-loginradius\"\n        title=\"book-free-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n  .dark-default-dark {\n    background-color: #1E1E1E;\n    color: #D4D4D4;\n  }\n</style>","frontmatter":{"date":"April 01, 2021","updated_date":null,"title":"5 Tips to Prevent OAuth Authentication Vulnerabilities","tags":["security"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5037593984962405,"src":"/static/5f4b371bdfb27e227ace6ed547158a78/14b42/OAuth-authentication-vulnerabilities-cover.jpg","srcSet":"/static/5f4b371bdfb27e227ace6ed547158a78/f836f/OAuth-authentication-vulnerabilities-cover.jpg 200w,\n/static/5f4b371bdfb27e227ace6ed547158a78/2244e/OAuth-authentication-vulnerabilities-cover.jpg 400w,\n/static/5f4b371bdfb27e227ace6ed547158a78/14b42/OAuth-authentication-vulnerabilities-cover.jpg 800w,\n/static/5f4b371bdfb27e227ace6ed547158a78/16310/OAuth-authentication-vulnerabilities-cover.jpg 1024w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Vishal Sharma","github":null,"avatar":null}}}},{"node":{"fields":{"slug":"/identity/top-10-cybersecurity-predictions-for-2021-that-smbs-must-know/"},"html":"<p>The global pandemic has forced business executives to reconsider their cybersecurity strategies. According to an IDC report, business spending on security solutions is expected to touch $175 billion by 2024. At the same time, <a href=\"https://www.darkreading.com/vulnerabilities---threats/71--of-security-pros-see-threats-jump-since-covid-19-outbreak/d/d-id/1337498\">71% of security professionals</a> have reported an increase in online threats since the start of the global lockdown in 2020.</p>\n<p>So, how should corporations, including <strong><a href=\"https://www.loginradius.com/startups/\">small-to-medium businesses (SMBs)</a></strong>, respond to this existential threat? What should be the key focus areas that the IT and security teams should focus on?</p>\n<p>To answer these questions, let's discuss the top ten cybersecurity predictions for SMBs in 2021.</p>\n<h3 id=\"1-user-awareness\" style=\"position:relative;\"><a href=\"#1-user-awareness\" aria-label=\"1 user awareness permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. User awareness</h3>\n<p>Driven by the COVID-19 pandemic, organizations are rushing towards remote work  or the “work from home” model. As a result, cybercriminals will be targeting home-based networks and infrastructure to exploit any security vulnerability. This prediction could lead to an increase in ransomware and phishing attacks designed to extract sensitive information.</p>\n<p>Enhanced user awareness about cybersecurity is the best preventive measure to stop such attacks. Apart from effective security policies, organizations must train remote-working employees on the best cybersecurity practices.</p>\n<h3 id=\"2-targeted-phishing-attacks\" style=\"position:relative;\"><a href=\"#2-targeted-phishing-attacks\" aria-label=\"2 targeted phishing attacks permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. Targeted phishing attacks</h3>\n<p>According to <a href=\"https://securityboulevard.com/2020/12/staggering-phishing-statistics-in-2020/#:~:text=More%20than%2060%2C000%20phishing%20websites,of%20all%20spear%20phishing%20attacks.\">Security Boulevard</a>, more than 60,000 phishing websites were created in the year 2020 alone. One in every eight corporate employees has shared sensitive information on phishing websites. In recent years, phishing attacks have become more personalized and targeted, making them a potent threat to any business.</p>\n<p>Targeted phishing attacks are one of the leading cybersecurity threats that SMBs should prepare to encounter this year.</p>\n<h3 id=\"3-cyberattacks-on-the-healthcare-sector\" style=\"position:relative;\"><a href=\"#3-cyberattacks-on-the-healthcare-sector\" aria-label=\"3 cyberattacks on the healthcare sector permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3. Cyberattacks on the healthcare sector</h3>\n<p>Last year, despite the pandemic, hackers actively targeted <strong><a href=\"https://www.loginradius.com/industry-healthcare/\">healthcare</a></strong> and pharma companies and spread fake news about vaccine development. Data breaches in the healthcare sector peaked in 2020 and are expected to continue in the short-term future.</p>\n<p> <a href=\"https://www.loginradius.com/resource/cloud-security-system-sase-whitepaper\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"future-proof-your-security-loginradius\"\n        title=\"future-proof-your-security-loginradius\"\n        src=\"/static/a164480ea3177cb0422ee6104202f8b3/e5715/Future-proof-your-security.png\"\n        srcset=\"/static/a164480ea3177cb0422ee6104202f8b3/a6d36/Future-proof-your-security.png 650w,\n/static/a164480ea3177cb0422ee6104202f8b3/e5715/Future-proof-your-security.png 768w,\n/static/a164480ea3177cb0422ee6104202f8b3/63ff0/Future-proof-your-security.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a> </p>\n<p><a href=\"https://www.mckinsey.com/business-functions/risk/our-insights/covid-19-crisis-shifts-cybersecurity-priorities-and-budgets\"><strong>McKinsey</strong></a> predicts that the healthcare industry will be among the top four spenders in cybersecurity solutions in the coming decade. Apart from increasing their spending, SME players in the healthcare sector also need to evaluate their security infrastructure to counter these cyber threats.</p>\n<h3 id=\"4-machine-learning\" style=\"position:relative;\"><a href=\"#4-machine-learning\" aria-label=\"4 machine learning permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>4. Machine Learning</h3>\n<p>Going ahead, the increased adoption of <strong><a href=\"https://www.loginradius.com/blog/engineering/Full_data_science_pipeline_implementation/\">AI and machine-learning tools</a></strong> will be among the leading cybersecurity predictions for SMBs and other enterprises. The sheer complexity of cyberthreats will require advanced technologies like machine learning to detect and correct the most severe issues.</p>\n<p>SMBs can use advanced ML algorithms to analyze incoming threats and take preventive actions. According to <a href=\"https://www.linkedin.com/in/alan-braithwaite-1046104\">Alan Braithwaite of Ivanti</a>, “AI and ML technologies allow connected devices to heal and secure themselves by as much as 80%.”</p>\n<h3 id=\"5-cloud-security\" style=\"position:relative;\"><a href=\"#5-cloud-security\" aria-label=\"5 cloud security permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>5. Cloud security</h3>\n<p>Among the top trends in cybersecurity predictions for SMBs, <a href=\"https://thycotic.com/company/blog/2020/12/10/cyber-security-predictions-and-trends-for-2021/\">Thycotic</a> predicts that cloud security will emerge as a critical security standard in 2021. With more organizations moving to the cloud infrastructure, there have been growing security concerns caused due to misconfiguration, outages, and bugs.</p>\n<p>To counter such threats, organizations are adopting predictive security that can detect threats in advance. The last three years have seen a <a href=\"https://www.carbonblack.com/press-releases/new-total-economic-impact-study-finds-cb-predictive-security-cloud-delivers-261-return-on-investment-roi/\">261% ROI</a> for the predictive security market.</p>\n<h3 id=\"6-gdpr-compliance\" style=\"position:relative;\"><a href=\"#6-gdpr-compliance\" aria-label=\"6 gdpr compliance permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>6. GDPR compliance</h3>\n<p>As one of the key developments in data privacy, the General Data Protection Regulation (GDPR) has been enacted across the European Union. It requires businesses to protect EU citizens' personal data and privacy while doing business within the EU.</p>\n<p>Compliance with GDPR or similar data protection laws like the CCPA will be one key cybersecurity trend to watch out for in the next decade.</p>\n<h3 id=\"7-online-education\" style=\"position:relative;\"><a href=\"#7-online-education\" aria-label=\"7 online education permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>7. Online education</h3>\n<p>In addition to remote working, online education has been among the significant beneficiaries of the global pandemic. With schools and universities switching to online or e-learning platforms, this industry witnessed a <a href=\"https://www.news18.com/news/tech/online-education-due-to-covid-19-is-causing-massive-spike-in-cyber-attacks-on-schools-colleges-3024551.html\"><strong>30% increase in cyberattacks</strong></a> in August 2020. Primarily aimed at stealing student or research data, <strong><a href=\"https://docs.google.com/document/d/1zg8lUUjyMQ2OpEyNKXYkRGBLcTlLuUYyzwZccCmSeWI/edit\">cybersecurity attacks</a></strong> in the online education space will disrupt learning activities over the next decade.</p>\n<p>Players in the online education sector need to implement a robust security architecture that includes cloud access and end-to-end protection.</p>\n<h3 id=\"8-internet-of-things-iot\" style=\"position:relative;\"><a href=\"#8-internet-of-things-iot\" aria-label=\"8 internet of things iot permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>8. Internet of Things (IoT)</h3>\n<p>The rollout of 5G connectivity is boosting the number of smart devices  or IoT technologies. Global spending on IoT technologies reached <a href=\"https://www.helpnetsecurity.com/2020/06/22/2020-iot-spending/#:~:text=IoT%20spending%20is%20growing%208.2,the%202020%2D2024%20forecast%20period.\">$742 billion in 2020</a>.</p>\n<p>The prevalence of connected IoT devices is also a prime target for hackers as they look for any prevailing vulnerability in IoT networks. SMBs need to have complete visibility into their connected IoT devices to detect and fix any security flaw.</p>\n<h3 id=\"9-mobile-devices-and-platforms\" style=\"position:relative;\"><a href=\"#9-mobile-devices-and-platforms\" aria-label=\"9 mobile devices and platforms permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>9. Mobile devices and platforms</h3>\n<p>A 2019 cybercrime whitepaper revealed that <a href=\"https://www.rsa.com/content/dam/en/white-paper/2019-current-state-of-cybercrime.pdf\">70% of fraud transactions</a> occurred on mobile devices and platforms and resulted in data losses, data tampering, and malware infections. Due to the influx of mobile apps, most users share their data, such as their contact details and messages with the concerning mobile companies.</p>\n<p>As mobile devices become more prevalent, mobile users being targeted by hackers are among the top cybersecurity predictions for SMBs.</p>\n<h3 id=\"10-cyberattacks-on-financial-services\" style=\"position:relative;\"><a href=\"#10-cyberattacks-on-financial-services\" aria-label=\"10 cyberattacks on financial services permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>10. Cyberattacks on financial services</h3>\n<p>According to a 2019 report, banking and financial services are 300 times more prone to cyberattacks than any other industry. Even during the COVID-19 pandemic, cyberattacks on financial institutions spiked by <a href=\"https://www.infosecurity-magazine.com/news/attacks-on-banks-spike-238-during/\">238%</a>.</p>\n<p>Some of the common threats faced by the financial services industry include phishing attacks, <strong><a href=\"https://www.loginradius.com/blog/identity/marriott-data-breach-2020/\">data breaches</a></strong>, and malware threats.</p>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>For SMBs, the global market for cybersecurity solutions is expected to touch <a href=\"https://www.infosecurity-magazine.com/news/attacks-on-banks-spike-238-during/\">$80 billion</a> in the future. This article has highlighted ten of the biggest cybersecurity predictions for SMBs in the coming decade.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAGCAYAAADDl76dAAAACXBIWXMAAAsSAAALEgHS3X78AAABdElEQVQY002RO0/CUBzFG6PtbZWHCAmRmBB5P8vDII9SSC0omog4oAEGjZMO6OKEuLjoJ2Fx0cSBwUQnXZxcHPwux38LJA7nNvfec8+5v1tOCCiwpbbhye2BxbYgBMtgIRVioDRRsARGXxZUzLlEHmehBaesQ4rrEMPViYf2DR9nDGKkChbVICVqsMt1WJI1sHCFwhUsUIFohJH49TxECvRUjhDW2mAbB5iP6hB8hUkhiRPN5KIZYJdrsEYrcCSpmQqMm6/m9ylUhSulY7N5ivROB3L9GOlGF3Ktbc4zuz341UPw/uIk0ESbBjoSGlYIx8BfzjSwVmyCEYEUUmCPa3Bnd+hwC75yC95S05SxbolU/iEbOCFCpDexEfIioTNCNd6Tp6IlMnNuGeeDe3z//OLx5RWj5zFGT2O8fXxh/P4Ja6w6vSEFCnTIlW2YiDzhzX7ATFKojDlvjpBPcDF4QPdyiG5/iE7/BmfXd+hd3VKpCoG8fzxWw2+c+yTpAAAAAElFTkSuQmCC'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-loginradius\"\n        title=\"book-a-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"March 19, 2021","updated_date":null,"title":"Top 10 Cybersecurity Predictions for 2021 That SMBs Must Know","tags":["security"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5037593984962405,"src":"/static/ee34be040f3f942d6c733f70413edbf5/14b42/cybersecurity-loginradius.jpg","srcSet":"/static/ee34be040f3f942d6c733f70413edbf5/f836f/cybersecurity-loginradius.jpg 200w,\n/static/ee34be040f3f942d6c733f70413edbf5/2244e/cybersecurity-loginradius.jpg 400w,\n/static/ee34be040f3f942d6c733f70413edbf5/14b42/cybersecurity-loginradius.jpg 800w,\n/static/ee34be040f3f942d6c733f70413edbf5/47498/cybersecurity-loginradius.jpg 1200w,\n/static/ee34be040f3f942d6c733f70413edbf5/0e329/cybersecurity-loginradius.jpg 1600w,\n/static/ee34be040f3f942d6c733f70413edbf5/21d0b/cybersecurity-loginradius.jpg 5184w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},{"node":{"fields":{"slug":"/identity/7-web-app-sec-threats/"},"html":"<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 68.76923076923077%; position: relative; bottom: 0; left: 0; background-image: url('data:image/jpeg;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"7 Common Web Application Security Threats-1\"\n        title=\"7 Common Web Application Security Threats-1\"\n        src=\"/static/35830bdd3095657c526ad2fc6d66d20e/212bf/7-Common-Web-Application-Security-Threats-1.jpg\"\n        srcset=\"/static/35830bdd3095657c526ad2fc6d66d20e/6aca1/7-Common-Web-Application-Security-Threats-1.jpg 650w,\n/static/35830bdd3095657c526ad2fc6d66d20e/212bf/7-Common-Web-Application-Security-Threats-1.jpg 768w,\n/static/35830bdd3095657c526ad2fc6d66d20e/1a057/7-Common-Web-Application-Security-Threats-1.jpg 1026w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span>\nMalicious actors and security experts are in an endless battle over data. While the former wants to steal it, the latter seeks to protect it. </p>\n<p>Each year, attackers develop inventive web application security threats to compromise sensitive data and access their targets' database. Consequently, security experts build on the exploited vulnerabilities and strengthen their systems through their learnings every year. </p>\n<p>The aggregate frequency and cost of data breaches seem to be growing exponentially. This cost is high (approx. <a href=\"https://www.ibm.com/security/data-breach\">US$8.64 million in the US in 2020</a>) because of developers' inability to incorporate the latest changes and updates into their code to overcome already detected vulnerabilities. Unintuitively, <a href=\"https://www.infopoint-security.de/medien/cenzic-vulnerability-report-2014.pdf\">96% of web apps</a> have some known defects and anomalies. </p>\n<p>To ensure adequate safety against web application security threats, businesses should incorporate security consideration in the applications' development phase. Unfortunately, most developers tend to hold it off until the end.</p>\n<h2 id=\"7-common-web-application-security-threats\" style=\"position:relative;\"><a href=\"#7-common-web-application-security-threats\" aria-label=\"7 common web application security threats permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>7 Common Web Application Security Threats</h2>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 60.61538461538461%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"7 Common Web Application Security Threats-2\"\n        title=\"7 Common Web Application Security Threats-2\"\n        src=\"/static/874e3d6ba1f5fd9704fc79830bd4d302/e5715/7-Common-Web-Application-Security-Threats-2.png\"\n        srcset=\"/static/874e3d6ba1f5fd9704fc79830bd4d302/a6d36/7-Common-Web-Application-Security-Threats-2.png 650w,\n/static/874e3d6ba1f5fd9704fc79830bd4d302/e5715/7-Common-Web-Application-Security-Threats-2.png 768w,\n/static/874e3d6ba1f5fd9704fc79830bd4d302/2bef9/7-Common-Web-Application-Security-Threats-2.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<h3 id=\"1-injection-attacks\" style=\"position:relative;\"><a href=\"#1-injection-attacks\" aria-label=\"1 injection attacks permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. Injection Attacks</h3>\n<p>A web app that is vulnerable to injection attacks accepts untrusted data from an input field without any proper sanitation. By typing code into an input field, the attacker can trick the server into interpreting it as a system command and thereby act as the attacker intended. </p>\n<p>Some common injection attacks include SQL injections, Cross-Site Scripting, Email Header Injection, etc. These attacks could lead to unauthorized access to databases and exploitation of admin privileges.</p>\n<p><strong>How to prevent:</strong></p>\n<ul>\n<li>Keep untrusted inputs away from commands and queries.</li>\n<li>Use a safe Application Programming Interface (API) that avoids interpreters or uses parameterized interfaces.</li>\n<li>Filter and sanitize all inputs as per a whitelist. This prevents the use of malicious character combinations.</li>\n</ul>\n<h3 id=\"2-broken-authentication\" style=\"position:relative;\"><a href=\"#2-broken-authentication\" aria-label=\"2 broken authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. Broken Authentication</h3>\n<p>Broken authentication is an umbrella term given to vulnerabilities wherein authentication and session management tokens are inadequately implemented. </p>\n<p>This improper implementation allows hackers to make claims over a legitimate user’s identity, access their <strong>sensitive data</strong>, and potentially exploit the designated ID privileges.</p>\n<p><strong>How to prevent:</strong></p>\n<ul>\n<li>End sessions after a certain period of inactivity.</li>\n<li>Invalidate a session ID as soon as the session ends.</li>\n<li>Place limiters on the simplicity of passwords.</li>\n<li>Implement <a href=\"https://www.loginradius.com/blog/identity/2019/06/what-is-multi-factor-authentication/\">multi-factor authentication</a> (2FA/MFA).</li>\n</ul>\n<h3 id=\"3-cross-site-scripting-xss\" style=\"position:relative;\"><a href=\"#3-cross-site-scripting-xss\" aria-label=\"3 cross site scripting xss permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3. Cross Site Scripting (XSS)</h3>\n<p>It is an injection-based client-side attack. At its core, this attack involves injecting malicious code in a website application to execute them in the victims’ browsers eventually. Any application that doesn’t validate untrusted data adequately is vulnerable to such attacks. </p>\n<p>Successful implementation results in theft of user session IDs, website defacing, and redirection to malicious sites (thereby allowing <a href=\"https://www.loginradius.com/blog/identity/phishing-for-identity/\">phishing attacks</a>).</p>\n<p><strong>How to prevent:</strong></p>\n<ul>\n<li>Encode all user-supplied data.</li>\n<li>Use auto-sanitization libraries such as <a href=\"https://owasp.org/www-project-antisamy/\">OWASP’s AntiSamy</a>.</li>\n<li>Whitelist inputs to disallow certain special character combinations.</li>\n</ul>\n<h3 id=\"4-insecure-direct-object-references-idor\" style=\"position:relative;\"><a href=\"#4-insecure-direct-object-references-idor\" aria-label=\"4 insecure direct object references idor permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>4. Insecure Direct Object References (IDOR)</h3>\n<p> <br>\nMostly through manipulation of the URL, an attacker gains access to database items belonging to other users. For instance, the reference to a database object is exposed in the URL. </p>\n<p>The vulnerability exists when someone can edit the URL to access other similar critical information (such as monthly salary slips) without additional authorization.</p>\n<p><strong>How to prevent:</strong></p>\n<ul>\n<li>Implement proper <a href=\"https://www.loginradius.com/blog/engineering/user-authentication-react-application/\">user authorization</a> checks at relevant stages of users’ web app journey.</li>\n<li>Customize error messages so that they don’t reveal critical information about the respective user.</li>\n<li>Try not to disclose reference to objects in the URL; use POST based information transmission over GET.</li>\n</ul>\n<h3 id=\"5-security-misconfigurations\" style=\"position:relative;\"><a href=\"#5-security-misconfigurations\" aria-label=\"5 security misconfigurations permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>5. Security Misconfigurations</h3>\n<p> <br>\nAccording to <a href=\"https://owasp.org/www-project-top-ten/\">OWASP top 10 2017</a>, this is the most common web application security threats found across web applications. This vulnerability exists because developers and administrators “forget” to change some default settings such as default passwords, usernames, reference IDs, error messages, etc.</p>\n<p>Given how easy it is to detect and exploit default settings that were initially placed to accommodate a simple <a href=\"https://www.loginradius.com/customer-experience-solutions/\">user experience</a>, the implications of such a vulnerability can be vast once the website is live: from admin privileges to complete database access.</p>\n<p><a href=\"https://www.loginradius.com/resource/understanding-credential-stuffing-attacks-whitepaper\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"credential-stuffing\"\n        title=\"credential-stuffing\"\n        src=\"/static/091051c0e36ccf509c9dea986078f13a/e5715/credential-stuffing.png\"\n        srcset=\"/static/091051c0e36ccf509c9dea986078f13a/a6d36/credential-stuffing.png 650w,\n/static/091051c0e36ccf509c9dea986078f13a/e5715/credential-stuffing.png 768w,\n/static/091051c0e36ccf509c9dea986078f13a/63ff0/credential-stuffing.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<p><strong>How to prevent:</strong></p>\n<ul>\n<li>Frequently maintain and update all web application components**: **firewalls, operating systems, servers, databases, extensions, etc.</li>\n<li>Make sure to change default configurations.</li>\n<li>Make time for regular penetration tests (though this applies to every vulnerability that a web app could have).</li>\n</ul>\n<h3 id=\"6-unvalidated-redirects-and-forwards\" style=\"position:relative;\"><a href=\"#6-unvalidated-redirects-and-forwards\" aria-label=\"6 unvalidated redirects and forwards permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>6. Unvalidated Redirects and Forwards</h3>\n<p>Pretty much every website redirects a user to other web pages. When the credibility of this redirection is not assessed, the website leaves itself vulnerable to such URL based attacks. </p>\n<p>A malicious actor can redirect users to phishing sites or sites containing malware. Phishers search for this vulnerability extensively since it makes it easier for them to gain user trust.</p>\n<p><strong>How to prevent:</strong></p>\n<ul>\n<li>Avoid redirection where possible.</li>\n<li>Give the destination parameters a mapping value rather than the actual URL. Let the server-side code translate the mapping value to the actual URL.</li>\n</ul>\n<h3 id=\"7-missing-function-level-access-control\" style=\"position:relative;\"><a href=\"#7-missing-function-level-access-control\" aria-label=\"7 missing function level access control permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>7. Missing Function Level Access Control</h3>\n<p> <br>\nThe seventh web application security threats in this list is mostly similar to IDOR. The core differentiating factor between the two is that IDOR tends to give the attacker access to information in the database. </p>\n<p>In contrast, Missing_ Function Level Access Control _allows the attacker access to special functions and features that should not be available to any typical user. </p>\n<p>Like, IDOR, access to these functions can be gained through URL manipulation as well.</p>\n<p><strong>How to prevent:</strong></p>\n<ul>\n<li>Implement adequate authorization measures at relevant stages of user web app use.</li>\n<li>Deny all access to set features and functions unless attempted by a pre-approved (admin) user.</li>\n<li>Allow for a flexible shift in grant and rejection of access to feature privileges in your code. Hence, allowing a practical and secure shift in privilege access when needed.</li>\n</ul>\n<h2 id=\"how-loginradius-helps-in-securing-web-applications-for-businesses-while-providing-a-seamless-experience\" style=\"position:relative;\"><a href=\"#how-loginradius-helps-in-securing-web-applications-for-businesses-while-providing-a-seamless-experience\" aria-label=\"how loginradius helps in securing web applications for businesses while providing a seamless experience permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How Loginradius Helps in Securing Web Applications for Businesses While Providing a Seamless Experience</h2>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 60.61538461538461%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"7 Common Web Application Security Threats-3\"\n        title=\"7 Common Web Application Security Threats-3\"\n        src=\"/static/64501b6595ee95dde2a74e906b07ce94/e5715/7-Common-Web-Application-Security-Threats-3.png\"\n        srcset=\"/static/64501b6595ee95dde2a74e906b07ce94/a6d36/7-Common-Web-Application-Security-Threats-3.png 650w,\n/static/64501b6595ee95dde2a74e906b07ce94/e5715/7-Common-Web-Application-Security-Threats-3.png 768w,\n/static/64501b6595ee95dde2a74e906b07ce94/2bef9/7-Common-Web-Application-Security-Threats-3.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p> <br>\nDespite the multitude of solutions available to each vulnerability, it is hardly easy to produce your own code to secure a site against web application security threats. Managing an extensive portfolio can be unscalable. </p>\n<p>This is probably why it is best to rely on dedicated virtual security firms with dedicated years of research into incorporating security as a governing factor in writing scalable codes.</p>\n<p>LoginRadius protects consumer identity through a multilevel security web app environment. The APIs use OpenID Connect (OAuth 2.0 protocol). Also, applications on LoginRadius are hosted by Microsoft Azure and AWS. </p>\n<p>The <a href=\"https://www.loginradius.com/blog/identity/2019/06/customer-identity-and-access-management/\">CIAM platform</a> also ensures that it is updated with the latest government regulations and compliances of respective regions. The cloud directory protects sensitive consumer data while allowing and managing consumer consent for data collection and use.</p>\n<p>Among other features, LoginRadius offers:</p>\n<ul>\n<li>End-to-end SSL encryption for data in transit acts as protection against unauthorised access.</li>\n<li>Automated security monitoring systems to warn admins to take actions against unwarranted activity.</li>\n<li>One-way hashing of passwords allows for added user security: even from database admins.</li>\n<li>Flexible multi-factor authentication shuns the risk of being exposed to a multitude of attacks.</li>\n<li><a href=\"https://www.loginradius.com/single-sign-on/\">SSO solutions</a> for quick access to multiple web properties with a single set of credentials. </li>\n</ul>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>We recommend using this list of top 7 web application threats and vulnerabilities to find a sound security base for your web apps. Developers can build on these vulnerabilities and learn from previous exploits of other entities to create a more secure application.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-free-demo-loginradius\"\n        title=\"book-a-free-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"January 29, 2021","updated_date":null,"title":"7 Common Web Application Security Threats","tags":["security"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.408450704225352,"src":"/static/1ad44de16cb8fe9da10857c4d798e92b/9a31d/7-Common-Web-Application-Security-Threats-cover.jpg","srcSet":"/static/1ad44de16cb8fe9da10857c4d798e92b/f836f/7-Common-Web-Application-Security-Threats-cover.jpg 200w,\n/static/1ad44de16cb8fe9da10857c4d798e92b/2244e/7-Common-Web-Application-Security-Threats-cover.jpg 400w,\n/static/1ad44de16cb8fe9da10857c4d798e92b/9a31d/7-Common-Web-Application-Security-Threats-cover.jpg 767w","sizes":"(max-width: 767px) 100vw, 767px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},{"node":{"fields":{"slug":"/identity/dns-cache-poisoning/"},"html":"<h2 id=\"what-is-dns-cache-poisoning\" style=\"position:relative;\"><a href=\"#what-is-dns-cache-poisoning\" aria-label=\"what is dns cache poisoning permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is DNS Cache Poisoning</h2>\n<p>DNS cache poisoning, also known as DNS spoofing, is a cyber-attack that exploits the weaknesses in the Domain Name System (DNS) servers. It enables the attacker to poison the data in DNS servers, including your company server, by providing false information to your internet traffic and diverting it to fake servers. This is done by redirecting the data in DNS to their IP address. </p>\n<p>DNS cache poisoning utilizes the vulnerabilities in the DNS protocols' security to divert internet traffic away from legitimate servers to the wrong address. </p>\n<p>DNS cache poisoning is effectively used for phishing attacks, often referred to as Pharming, for spreading malware. In the background, the malware runs and connects with the legitimate servers to steal sensitive information.</p>\n<p>When the DNS server is attacked, users may be requested to login into their accounts, and the attacker finds its way to steal the sensitive and financial credentials. </p>\n<p>Moreover, <a href=\"https://www.loginradius.com/blog/identity/phishing-for-identity/\">phishing attacks</a> also install viruses on the client's computer to exploit the stored data for long term access. </p>\n<h2 id=\"how-does-dns-cache-poisoning-works\" style=\"position:relative;\"><a href=\"#how-does-dns-cache-poisoning-works\" aria-label=\"how does dns cache poisoning works permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How Does DNS Cache Poisoning Works</h2>\n<p>DNS spoofing is a threat that copies the legitimate server destinations to divert the domain's traffic. Ignorant of these attacks, the users are redirected to malicious websites, which results in insensitive and personal data being leaked. </p>\n<p>It is a method of attack where your DNS server is tricked into saving a fake DNS entry. This will make the DNS server recall a fake site for you, thereby posing a threat to vital information stored on your server or computer. </p>\n<p>The cache poisoning codes are often found in URLs sent through spam emails. These emails are sent to prompt users to click on the URL, which infects their computer. </p>\n<p>When the computer is poisoned, it will divert you to a fake IP address that looks like a real thing. This way, the threats are injected into your systems as well.</p>\n<h2 id=\"what-are-the-different-stages-of-attack-of-dns-cache-poisoning\" style=\"position:relative;\"><a href=\"#what-are-the-different-stages-of-attack-of-dns-cache-poisoning\" aria-label=\"what are the different stages of attack of dns cache poisoning permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What Are the Different Stages of Attack of DNS Cache Poisoning</h2>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 60.61538461538461%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAMCAYAAABiDJ37AAAACXBIWXMAAAsSAAALEgHS3X78AAAB9UlEQVQoz21TXVPTQBTNjGR3U5nq0BnGcUafwKZAStWCJWlKm6QWBngA+RALFK0z+uKjv/94zyYBU304c5Pdu+eee+6uoz9cQvWuoOLbHNGNxBm0rJk3fXjrkY0lyn8b/SH0ZgpD+AO75uRkM7h713B3L6B2z6EFJNbvTuCthQ8EFbLWCF4wxnJrX76HMO0DGx3VF1XhFzwNP+PZ4AYeVQ7n0FJAd09t0t8qLbFEtZGi0U7hJxcwnSMhnFiljo7vrLLV7Csaw1uY0RxP0h9Qg3votyc2qWzP+KKGhM0YbivBameMzewKy9sT6I3kkXBp5xwvxt9Qj6eo9aeop3OY5Dt0kFe16oTENAeFylC8y/C8M8HL9xPUuM+CspYrlME0Rnfwz36hO/2N10c/UetdFknpv/6RPPgIszWGoTKC37LvqGgq7c2sylp0jZXkHkq+NcnEdKoqfaMyq5LK+c+B0QYB9+yUqYBT1TIYtfMJbvtQKhZXgQelst7KJGa5CipjgbW9YlBxJTqWmZusxPZIxBaoTBLoYz3I0JAB8JrYHGnZY07p7QOpED5eh7DiE9vhIdXcx/rgFN3jGVaCBK4U8LYPBIeFDVEFzuJLqNw3qc5pvuodW1JOVfNC0zv6+Z+zjq2yiIXn5YqnS838mXllwQKmHFiBPyU4ZDQ21nSGAAAAAElFTkSuQmCC'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"stages-of-attack-of-DNS-cache-poisoning\"\n        title=\"stages-of-attack-of-DNS-cache-poisoning\"\n        src=\"/static/d8e06d6ae3159c7277906eada8fe5a8b/e5715/stages-of-attack-of-DNS-cache-poisoning.png\"\n        srcset=\"/static/d8e06d6ae3159c7277906eada8fe5a8b/a6d36/stages-of-attack-of-DNS-cache-poisoning.png 650w,\n/static/d8e06d6ae3159c7277906eada8fe5a8b/e5715/stages-of-attack-of-DNS-cache-poisoning.png 768w,\n/static/d8e06d6ae3159c7277906eada8fe5a8b/2bef9/stages-of-attack-of-DNS-cache-poisoning.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<ul>\n<li>First Stage</li>\n</ul>\n<p>The attacker proceeds to send DNS queries to the DNS resolver, which forwards the Root/TLD authoritative DNS server request and awaits an answer. </p>\n<ul>\n<li>Second Stage</li>\n</ul>\n<p>The attacker overloads the DNS with poisoned responses that contain several IP addresses of the malicious website. </p>\n<p>To be accepted by the DNS resolver, the attacker's response should match a port number and the query ID field before the DNS response. </p>\n<p>Also, the attackers can force its response to increasing their chance of success.</p>\n<ul>\n<li>Third Stage</li>\n</ul>\n<p>If you are a legitimate user who queries this DNS resolver, you will get a poisoned response from the cache, and you will be automatically redirected to the malicious website.</p>\n<h2 id=\"how-to-detect-dns-cache-poisoning\" style=\"position:relative;\"><a href=\"#how-to-detect-dns-cache-poisoning\" aria-label=\"how to detect dns cache poisoning permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How to Detect DNS Cache Poisoning</h2>\n<p>Now that we know what is DNS cache poisoning let's understand how to detect it. </p>\n<p>One way is to monitor the DNS server for any change in behavior patterns. Also, you can apply data security to DNS monitoring.  </p>\n<p>Another way is to look for a potential birthday attack. This occurs when there is a sudden increase in DNS activity from a single source in a single domain. When there is an increase in the DNS activity from a single source, querying your DNS server for multiple domain names without recurring shows that the attacker is looking for a DNS entry for poisoning. </p>\n<p>Monitor the file system behavior and active directory events for any abnormal activities. You can use analytics for correlating activities among three vectors to add important information to your <a href=\"https://www.loginradius.com/blog/identity/2019/10/cybersecurity-best-practices-for-enterprises/\">cybersecurity strategy</a>. </p>\n<h2 id=\"why-is-dns-cache-poisoning-dangerous-for-your-business\" style=\"position:relative;\"><a href=\"#why-is-dns-cache-poisoning-dangerous-for-your-business\" aria-label=\"why is dns cache poisoning dangerous for your business permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Why Is DNS Cache Poisoning Dangerous for Your Business</h2>\n<p>When the DNS server is poisoned, it will start spreading towards other DNS servers and home routers. Computers that lookup DNS entries will get the wrong response by causing more users to end up as victims of DNS poisoning. </p>\n<p>This issue will be resolved only when the poisoned DNS cache is cleared on each affected DNS server; you are at risk of losing your precious information until then. </p>\n<p>One of the major reasons DNS cache poisoning is highly dangerous is that it can spread from one DNS server to another. </p>\n<p><strong>Here are a few DNS poisoning attack examples-</strong></p>\n<p>A <a href=\"https://www.computerworld.com/article/2516831/china-s-great-firewall-spreads-overseas.html\">DNS poisoning event</a> had resulted in the Great Firewall of China's temporary escape from China's national borders by censoring the internet in the USA till the problem was resolved. </p>\n<p>Recently, <a href=\"https://searchsecurity.techtarget.com/answer/How-did-OurMine-hackers-use-DNS-poisoning-to-attack-WikiLeaks\">attackers</a> targeted WikiLeaks, who used a DNS Cache poisoning attack for hijacking traffic to their WikiLeaks like version. This intentional attack was created to divert the traffic away from WikiLeaks and was implemented successfully.</p>\n<h2 id=\"how-to-protect-against-dns-cache-poisoning\" style=\"position:relative;\"><a href=\"#how-to-protect-against-dns-cache-poisoning\" aria-label=\"how to protect against dns cache poisoning permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How To Protect Against DNS Cache Poisoning</h2>\n<h3 id=\"for-dns-server-providers-and-website-owners\" style=\"position:relative;\"><a href=\"#for-dns-server-providers-and-website-owners\" aria-label=\"for dns server providers and website owners permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>For DNS server providers and website owners</h3>\n<p>If you are a DNS service provider or a website owner, you have a huge responsibility for safeguarding your users by using various tools and protocols to manage the threats. </p>\n<p>Some of the resources we have specified will help you in this regard.</p>\n<ul>\n<li>Just like endpoint user security products, you can proactively use DNS spoofing detection tools to scan before you send or receive the data.</li>\n<li>Using DNSSEC (Domain Name System Security Extensions) helps to keep DNS lookup fool-proof and authentic.</li>\n<li>You can use end-to-end encryption to send DNS requests and replies. Hackers will not be able to duplicate the unique security certificate that is present on the legitimate website. </li>\n</ul>\n<p><a href=\"https://www.loginradius.com/resource/ebook/buyers-guide-to-multi-factor-authentication/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"buyer-guide-to-multi-factor-authentication-ebook\"\n        title=\"buyer-guide-to-multi-factor-authentication-ebook\"\n        src=\"/static/dce0b5caab393383c0c906c5653faa64/e5715/buyer-guide-to-multi-factor-authentication-ebook.png\"\n        srcset=\"/static/dce0b5caab393383c0c906c5653faa64/a6d36/buyer-guide-to-multi-factor-authentication-ebook.png 650w,\n/static/dce0b5caab393383c0c906c5653faa64/e5715/buyer-guide-to-multi-factor-authentication-ebook.png 768w,\n/static/dce0b5caab393383c0c906c5653faa64/63ff0/buyer-guide-to-multi-factor-authentication-ebook.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<h3 id=\"for-endpoint-users\" style=\"position:relative;\"><a href=\"#for-endpoint-users\" aria-label=\"for endpoint users permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>For endpoint users</h3>\n<p>To avoid making your users vulnerable to a DNS poisoning attack, you can use the specified tips.</p>\n<ul>\n<li>Do not click on the links that you don't recognize; these include text messages, emails, or social media links. To be safe, you can opt for entering the URL manually in the address bar.</li>\n<li>Regularly scan your computer for any malware. Your security software will help and remove any secondary infections. As the poisoned sites deliver malicious programs, you need to scan for spyware, viruses, or any other hidden issues.</li>\n<li>Flush your DNS cache to solve the problem of poisoning. Nevertheless, cache poisoning remains in your system for a long time until you clean the infected area.</li>\n<li>Use the <a href=\"https://www.loginradius.com/blog/engineering/learn-about-vdn-for-cybersecurity/\">virtual private network (VPN)</a>, a service that offers an encrypted tunnel for your web traffic. You can use a private DNS service exclusively for end-to-end encrypted requests; as a result, your servers are tougher against DNS spoofing. </li>\n</ul>\n<h2 id=\"final-thoughts\" style=\"position:relative;\"><a href=\"#final-thoughts\" aria-label=\"final thoughts permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Final Thoughts</h2>\n<p>DNS cache poisoning can be summarised as an attacker controlling the DNS server to send fake DNS responses. As a result, when the user visits the counterfeit domains, they will be directed to a new IP address selected by the hacker. </p>\n<p>This new IP address might be from a malicious phishing website, where the users are prompted to download malware, or they might be asked to provide their financial or login details. </p>\n<p>Hence, understanding what is DNS cache poisoning, how to detect it, and ways to prevent it is crucial so you can <a href=\"https://www.loginradius.com/blog/identity/2020/06/consumer-data-privacy-security/\">protect your business</a> against it. </p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAGCAYAAADDl76dAAAACXBIWXMAAAsSAAALEgHS3X78AAABdElEQVQY002RO0/CUBzFG6PtbZWHCAmRmBB5P8vDII9SSC0omog4oAEGjZMO6OKEuLjoJ2Fx0cSBwUQnXZxcHPwux38LJA7nNvfec8+5v1tOCCiwpbbhye2BxbYgBMtgIRVioDRRsARGXxZUzLlEHmehBaesQ4rrEMPViYf2DR9nDGKkChbVICVqsMt1WJI1sHCFwhUsUIFohJH49TxECvRUjhDW2mAbB5iP6hB8hUkhiRPN5KIZYJdrsEYrcCSpmQqMm6/m9ylUhSulY7N5ivROB3L9GOlGF3Ktbc4zuz341UPw/uIk0ESbBjoSGlYIx8BfzjSwVmyCEYEUUmCPa3Bnd+hwC75yC95S05SxbolU/iEbOCFCpDexEfIioTNCNd6Tp6IlMnNuGeeDe3z//OLx5RWj5zFGT2O8fXxh/P4Ja6w6vSEFCnTIlW2YiDzhzX7ATFKojDlvjpBPcDF4QPdyiG5/iE7/BmfXd+hd3VKpCoG8fzxWw2+c+yTpAAAAAElFTkSuQmCC'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-loginradius\"\n        title=\"book-a-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"January 13, 2021","updated_date":null,"title":"DNS Cache Poisoning: Why Is It Dangerous for Your Business","tags":["security"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.408450704225352,"src":"/static/f31909dafa2f358eea05d48bd9c92886/9a31d/dns-cache-poisoning-is-dangerous-for-your-business.jpg","srcSet":"/static/f31909dafa2f358eea05d48bd9c92886/f836f/dns-cache-poisoning-is-dangerous-for-your-business.jpg 200w,\n/static/f31909dafa2f358eea05d48bd9c92886/2244e/dns-cache-poisoning-is-dangerous-for-your-business.jpg 400w,\n/static/f31909dafa2f358eea05d48bd9c92886/9a31d/dns-cache-poisoning-is-dangerous-for-your-business.jpg 767w","sizes":"(max-width: 767px) 100vw, 767px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},{"node":{"fields":{"slug":"/identity/what-to-do-when-email-hacked/"},"html":"<p>Emails hacked are the golden words for a hacker to access your personal information and get access to all your accounts. Recovery from a hack is exceptionally time-sensitive because we connect everything from online banking to other online portals with our emails. If you want to mitigate the harm to your identity, finances and protect those around you, you'll have to act quickly and carefully.</p>\n<p>You're probably wondering, \"my account is hacked. How do I repair it?\" If you're a little luckier, you may not be entirely sure that you were hacked. But before (or after) you start to panic, calm down, and go through the article to prevent further damage.</p>\n<h2 id=\"how-did-my-email-get-hacked\" style=\"position:relative;\"><a href=\"#how-did-my-email-get-hacked\" aria-label=\"how did my email get hacked permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How Did My Email Get Hacked</h2>\n<p>One of these four instances could be the reason your inbox was most likely compromised:</p>\n<ol>\n<li>You do not have up-to-date software installed for security.</li>\n<li>Your passwords are weak.</li>\n<li>In an email or social networking site, or website, you have clicked on a malicious link.</li>\n<li>You have downloaded a malicious script or file attached to a game, video, song, or attachment.</li>\n<li>You have clicked on a suspicious advertisement link while browsing.</li>\n</ol>\n<p><strong>You've been hacked when:</strong></p>\n<ul>\n<li>Your contacts receive messages that you have not sent.</li>\n<li>Slow and inconsistent performance of computers.</li>\n<li>When your online password stops working.</li>\n<li>The missing money is your online account.</li>\n<li>You received a ransomware message.</li>\n<li>You received a bogus antivirus alert.</li>\n<li>You have unwanted toolbars in your browser. </li>\n<li>You observe unusual patterns of network traffic.</li>\n</ul>\n<p>Here is an article which talks about what to do when your <a href=\"https://www.loginradius.com/blog/identity/2019/01/how-do-i-know-if-my-email-has-been-leaked-in-a-data-breach/\">email is compromised during a data breach</a>.</p>\n<h2 id=\"what-to-do-after-your-email-account-is-hacked\" style=\"position:relative;\"><a href=\"#what-to-do-after-your-email-account-is-hacked\" aria-label=\"what to do after your email account is hacked permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What to Do After Your Email Account Is Hacked?</h2>\n<p>If your email address has been hacked, what should you do? It's not good enough to get your password changed. And you'll want to make sure the hacker hasn't set up your account to let him get back in or to keep spamming after he's locked out. To get things back in order and keep hackers out of your account for good, follow these seven steps to fix it and prevent any future incident.</p>\n<h2 id=\"1-check-for-malware-and-viruses-on-your-computer\" style=\"position:relative;\"><a href=\"#1-check-for-malware-and-viruses-on-your-computer\" aria-label=\"1 check for malware and viruses on your computer permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. Check for malware and viruses on your computer</h2>\n<p>Have a malware scan run daily. If your account is compromised, search for malware or traces of malware that could be running on your device immediately. Most hackers gather passwords using malware that has been mounted on your gadget (or mobile phone if you have a smartphone). Be sure that your antivirus and anti-malware programs are up to date, no matter which operating system you use. </p>\n<p>Choose a setting that will update your device automatically when there are new security patches available. Conduct an end-to-end scan of your computer if you're not using an antivirus program.</p>\n<h2 id=\"2-adjust-and-improve-your-password\" style=\"position:relative;\"><a href=\"#2-adjust-and-improve-your-password\" aria-label=\"2 adjust and improve your password permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. Adjust and improve your password</h2>\n<p>It's time to update your password until your device is free from malware. You will need to directly contact the email provider, verify who you are, and ask for a password reset if you have lost access to your account.</p>\n<p>Please choose a unique password that varies markedly from your old one and make sure that it does not contain repetitive character strings or numbers. Keep away from passwords with obvious links to your name, your birthday, or similar personal information. </p>\n<p>This knowledge can be quickly identified by hackers and also used in their first attempts at brute force to access your account. Here is a list of the <a href=\"https://www.loginradius.com/blog/identity/2019/12/worst-passwords-list-2019/\">worst passwords in 2019</a> to understand how to create a strong password.</p>\n<h2 id=\"3-notify-people-around-you\" style=\"position:relative;\"><a href=\"#3-notify-people-around-you\" aria-label=\"3 notify people around you permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3. Notify people around you</h2>\n<p>You are more likely to open it and click on links inside it when an email comes from someone you know - even if the topic is strange. Help stop the malware from spreading by warning those on your contact list to be careful not to click on the links and to be cautious about any email sent by you that does not seem right. </p>\n<p>Let the people in your contact list know that your email has been compromised and that any suspicious emails should not be opened or connected to any emails you have recently got.</p>\n<p><a href=\"https://www.loginradius.com/resource/ebook/buyers-guide-to-multi-factor-authentication/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAGCAYAAADDl76dAAAACXBIWXMAAAsSAAALEgHS3X78AAABaElEQVQY002QTUsCYRSFJUjHd8Y0TSpkFMaPzG/wY2Yc09TRIi2oFkUWBO0KrE07c9OqX1KbFrWJIoJo5aZlixb9ldOdMbXFgct77vvce67FHinBEFtaAR8tQyDxVDPj7c8biQsVweI1zCnb8KTqsCd0cNEKuLAGzvBJlhHMHa/AEVbBpAIckSK8aR3uRBWu+Kr5wQSGi+CTDYjVfcT1PTB5B7ZkE2zsa0OgUUhKC/JGB6naLgK5NQTy6+BDCmaWy+QPe4wEotyCL7cOb6YBX5b6lDbcKX081DIq5tN1iNkm/NTsiZUxGy1BCCpwxirjyNagSp/r8KubBG5DJNgC9ZuR/wONyY6IhmkxC0Z3sgbyECgek2QTKNCWlsUMzno3+Pr+wf3TG24fnnH3+IL3wSdePwZw0XmsweIE6KSNbJIKe0gjqAqOYEyabDgVKEDeOsYpQQ/P+zjo9tDpXuHk8hpHF31zqI1Yv+SkwLSl98KVAAAAAElFTkSuQmCC'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"Multi Factor Authentication\"\n        title=\"Multi Factor Authentication\"\n        src=\"/static/dce0b5caab393383c0c906c5653faa64/e5715/Multi-Factor-Authentication.png\"\n        srcset=\"/static/dce0b5caab393383c0c906c5653faa64/a6d36/Multi-Factor-Authentication.png 650w,\n/static/dce0b5caab393383c0c906c5653faa64/e5715/Multi-Factor-Authentication.png 768w,\n/static/dce0b5caab393383c0c906c5653faa64/63ff0/Multi-Factor-Authentication.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<h2 id=\"4-change-your-security-question\" style=\"position:relative;\"><a href=\"#4-change-your-security-question\" aria-label=\"4 change your security question permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>4. Change your security question</h2>\n<p>If your email account has been compromised from a computer or location that does not fit your usual use habits, the cybercriminal may need to address a security question correctly. And if the items are general, such as (Q: what's the name of your brother? A: John), that may not be that difficult to guess. Here is a quick guide to <a href=\"https://www.loginradius.com/blog/identity/2019/01/best-practices-choosing-good-security-questions/\">choosing a good security question</a> to help you further.</p>\n<h2 id=\"5-modify-any-other-accounts-that-have-the-same-password\" style=\"position:relative;\"><a href=\"#5-modify-any-other-accounts-that-have-the-same-password\" aria-label=\"5 modify any other accounts that have the same password permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>5. Modify any other accounts that have the same password</h2>\n<p>This is time-consuming but an effort worth making. Make sure you change all other accounts that use the same username and password as your compromised email. For multiple accounts, hackers love it when we use the same logins.</p>\n<h2 id=\"6-consider-options-for-your-id-defense\" style=\"position:relative;\"><a href=\"#6-consider-options-for-your-id-defense\" aria-label=\"6 consider options for your id defense permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>6. Consider options for your ID defense</h2>\n<p>If you've been hacked, an ID authentication program is another idea worth considering. Usually, these platforms provide email and online account tracking in real-time. In the case of identity fraud, they also typically offer credit score reporting and personal assistance.</p>\n<p>Be sure to look for businesses with a good track record, as this form of security is often associated with high costs.</p>\n<h2 id=\"7-enable-multi-factor-authentication-mfa\" style=\"position:relative;\"><a href=\"#7-enable-multi-factor-authentication-mfa\" aria-label=\"7 enable multi factor authentication mfa permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>7. Enable multi-factor authentication (MFA)</h2>\n<p>In addition to your password, set your email account to require a <a href=\"https://www.loginradius.com/blog/identity/2019/06/what-is-multi-factor-authentication/\">second form of authentication</a> if you log into your email account from a new computer. When signing in, you will also need to enter a special one-time use code that the platform will text to your phone or generate via an app.</p>\n<p>As an additional security measure, several email providers provide two-factor authentication (2FA). To access an account, this approach requires both a password and some other form of identification.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-loginradius\"\n        title=\"book-a-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"December 03, 2020","updated_date":null,"title":"Email is Hacked!: 7 Immediate Steps To Follow","tags":["security"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.408450704225352,"src":"/static/2d6421da4f9e2108cfddd0de87218065/9a31d/what-to-do-when-email-is-hacked.jpg","srcSet":"/static/2d6421da4f9e2108cfddd0de87218065/f836f/what-to-do-when-email-is-hacked.jpg 200w,\n/static/2d6421da4f9e2108cfddd0de87218065/2244e/what-to-do-when-email-is-hacked.jpg 400w,\n/static/2d6421da4f9e2108cfddd0de87218065/9a31d/what-to-do-when-email-is-hacked.jpg 767w","sizes":"(max-width: 767px) 100vw, 767px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},{"node":{"fields":{"slug":"/engineering/secure-enclave-ios-app/"},"html":"<h2 id=\"introduction\" style=\"position:relative;\"><a href=\"#introduction\" aria-label=\"introduction permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Introduction</h2>\n<p>The Secure Enclave is a hardware-based key manager that’s isolated from the main processor to provide an extra layer of security. Using a secure enclave, we can create the key, securely store the key, and perform operations with the key. Thus makes it difficult for the key to be compromised. </p>\n<p>We usually save data persistently in the app using UserDefaults, Keychain, Core Data or SQLite.\nFor example, To save the session of logged in user, we save username and password. But this process puts our data at high-security risk. So it's always recommended to store sensitive data in an encrypted format. But again, it's a challenge to secure keys used in encryption/decryption.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 395px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 32.151898734177216%; position: relative; bottom: 0; left: 0; background-image: url('data:image/jpeg;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"Secure Enclave\"\n        title=\"Secure Enclave\"\n        src=\"/static/31be728f50457b650ee4c74aa92f1974/8473b/image2.jpg\"\n        srcset=\"/static/31be728f50457b650ee4c74aa92f1974/8473b/image2.jpg 395w\"\n        sizes=\"(max-width: 395px) 100vw, 395px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>Now here <strong>Secure Enclave</strong> comes in the role. </p>\n<p>In this blog, we will use Secure Enclave to generate key pair and use those in encryption/decryption of sensitive data further.</p>\n<p>Here I will create a wrapper to generate key pair using Secure Enclave and use them to encrypt/decrypt sensitive data. And also a viewcontroller to show how to use a wrapper to get encrypted and decrypted data.\nYou may implement wrapper's methods as common methods and use wherever needed in the project. But its recommended to use a separate wrapper for handling communication with Secure Enclave.</p>\n<h2 id=\"wrapper\" style=\"position:relative;\"><a href=\"#wrapper\" aria-label=\"wrapper permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Wrapper</h2>\n<p> I have created .h and .m files named as SecEnclaveWrapper as a subclass of NSObject.\nIn .h file I am declaring function for being accessible from other classes like: </p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"objective-c\" data-index=\"0\"><code class=\"grvsc-code\"><span class=\"grvsc-line\"><span class=\"mtk3\">/**</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk3\">Return encrypted value of data using kSecKeyAlgorithmECIESEncryptionStandardX963SHA256AESGCM algo</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk3\">*/</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">- (</span><span class=\"mtk10\">NSData</span><span class=\"mtk1\"> *_Nonnull)encryptData:(</span><span class=\"mtk10\">NSData</span><span class=\"mtk1\"> *_Nonnull)data ;</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk3\">/**</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk3\">Return decryrpted data of encrypted data  using kSecKeyAlgorithmECIESEncryptionStandardX963SHA256AESGCM algo</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk3\">*/</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">- (</span><span class=\"mtk10\">NSData</span><span class=\"mtk1\"> *_Nonnull)decryptData:(</span><span class=\"mtk10\">NSData</span><span class=\"mtk1\"> *_Nonnull)data ;</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk3\">/**</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk3\">Return an initialized instance of the wrapper</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk3\">*/</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">- (</span><span class=\"mtk4\">instancetype</span><span class=\"mtk1\">)init;</span></span></code></pre>\n<p>Then in .m file, define the following methods as : </p>\n<p>The method <code>init</code> initializes and returns the object of this wrapper class. And 'encryptData' and 'decryptData' method return encrypted data and decrypted data of encrypted data, respectively.</p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"objective-c\" data-index=\"1\"><code class=\"grvsc-code\"><span class=\"grvsc-line\"><span class=\"mtk1\">- (</span><span class=\"mtk4\">instancetype</span><span class=\"mtk1\">)init {</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    self = [super init];</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span><span class=\"mtk15\">if</span><span class=\"mtk1\">(![self lookupPublicKeyRef] || ![self lookupPrivateKeyRef])</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">        [self generatePasscodeKeyPair];</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span><span class=\"mtk15\">return</span><span class=\"mtk1\"> self;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">}</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">- (</span><span class=\"mtk10\">NSData</span><span class=\"mtk1\"> *)encryptData:(</span><span class=\"mtk10\">NSData</span><span class=\"mtk1\"> *)data {</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span><span class=\"mtk15\">if</span><span class=\"mtk1\"> (data && </span><span class=\"mtk12\">data</span><span class=\"mtk1\">.</span><span class=\"mtk12\">length</span><span class=\"mtk1\">) {</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">        </span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">        CFDataRef cipher = </span><span class=\"mtk11\">SecKeyCreateEncryptedData</span><span class=\"mtk1\">(publicKeyRef, kSecKeyAlgorithmECIESEncryptionStandardX963SHA256AESGCM, (CFDataRef)data, </span><span class=\"mtk4\">nil</span><span class=\"mtk1\">);</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">        </span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">        </span><span class=\"mtk15\">return</span><span class=\"mtk1\"> (__bridge </span><span class=\"mtk10\">NSData</span><span class=\"mtk1\"> *)cipher;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    } </span><span class=\"mtk15\">else</span><span class=\"mtk1\"> {</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">        </span><span class=\"mtk15\">return</span><span class=\"mtk1\"> </span><span class=\"mtk4\">nil</span><span class=\"mtk1\">;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">        </span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    }</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">}</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">- (</span><span class=\"mtk10\">NSData</span><span class=\"mtk1\">*)decryptData:(</span><span class=\"mtk10\">NSData</span><span class=\"mtk1\"> *)data {</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span><span class=\"mtk15\">if</span><span class=\"mtk1\">(data && </span><span class=\"mtk12\">data</span><span class=\"mtk1\">.</span><span class=\"mtk12\">length</span><span class=\"mtk1\">){</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">        </span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">        CFDataRef plainData = </span><span class=\"mtk11\">SecKeyCreateDecryptedData</span><span class=\"mtk1\">(privateKeyRef, kSecKeyAlgorithmECIESEncryptionStandardX963SHA256AESGCM, (CFDataRef)data, </span><span class=\"mtk4\">nil</span><span class=\"mtk1\">);</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">        </span><span class=\"mtk15\">return</span><span class=\"mtk1\">  (__bridge </span><span class=\"mtk10\">NSData</span><span class=\"mtk1\"> *)plainData;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    }</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span><span class=\"mtk15\">else</span><span class=\"mtk1\"> {</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">        </span><span class=\"mtk15\">return</span><span class=\"mtk1\"> </span><span class=\"mtk4\">nil</span><span class=\"mtk1\">;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    }</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">}</span></span></code></pre>\n<p>The 'lookupPublicKeyRef' method below will lookup keychain for public key &#x26; 'lookupPrivateKeyRef' method search for the private key and return key if found.</p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"objective-c\" data-index=\"2\"><code class=\"grvsc-code\"><span class=\"grvsc-line\"><span class=\"mtk1\">- (SecKeyRef) lookupPublicKeyRef</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">{</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span><span class=\"mtk10\">OSStatus</span><span class=\"mtk1\"> sanityCheck = noErr;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span><span class=\"mtk10\">NSData</span><span class=\"mtk1\"> *tag;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span><span class=\"mtk4\">id</span><span class=\"mtk1\"> keyClass;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span><span class=\"mtk15\">if</span><span class=\"mtk1\"> (publicKeyRef != </span><span class=\"mtk4\">NULL</span><span class=\"mtk1\">) {</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">        </span><span class=\"mtk3\">// if already resides in memory, return</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">        </span><span class=\"mtk15\">return</span><span class=\"mtk1\"> publicKeyRef;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    }</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    tag = [kPublicKeyName dataUsingEncoding:NSUTF8StringEncoding];</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    keyClass = (__bridge </span><span class=\"mtk4\">id</span><span class=\"mtk1\">) kSecAttrKeyClassPublic;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span><span class=\"mtk10\">NSDictionary</span><span class=\"mtk1\"> *queryDict = @{</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">        </span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">        (__bridge </span><span class=\"mtk4\">id</span><span class=\"mtk1\">) kSecClass : (__bridge </span><span class=\"mtk4\">id</span><span class=\"mtk1\">) kSecClassKey,</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">        (__bridge </span><span class=\"mtk4\">id</span><span class=\"mtk1\">) kSecAttrKeyType : (__bridge </span><span class=\"mtk4\">id</span><span class=\"mtk1\">) kSecAttrKeyTypeEC,</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">        (__bridge </span><span class=\"mtk4\">id</span><span class=\"mtk1\">) kSecAttrApplicationTag : tag,</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">        (__bridge </span><span class=\"mtk4\">id</span><span class=\"mtk1\">) kSecAttrKeyClass : keyClass,</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">        (__bridge </span><span class=\"mtk4\">id</span><span class=\"mtk1\">) kSecReturnRef : (__bridge </span><span class=\"mtk4\">id</span><span class=\"mtk1\">) kCFBooleanTrue</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    };</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span><span class=\"mtk3\">//else look key in keychain and return</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    sanityCheck = </span><span class=\"mtk11\">SecItemCopyMatching</span><span class=\"mtk1\">((__bridge CFDictionaryRef) queryDict, (CFTypeRef *) &publicKeyRef);</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span><span class=\"mtk15\">if</span><span class=\"mtk1\"> (sanityCheck != errSecSuccess) {</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">        </span><span class=\"mtk11\">NSLog</span><span class=\"mtk1\">(</span><span class=\"mtk8\">@&quot;Error trying to retrieve key from server.  sanityCheck: %d&quot;</span><span class=\"mtk1\">, (</span><span class=\"mtk4\">int</span><span class=\"mtk1\">)sanityCheck);</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    }</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span><span class=\"mtk15\">return</span><span class=\"mtk1\"> publicKeyRef;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">}</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">- (SecKeyRef) lookupPrivateKeyRef</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">{</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    CFMutableDictionaryRef getPrivateKeyRef = newCFDict;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span><span class=\"mtk11\">CFDictionarySetValue</span><span class=\"mtk1\">(getPrivateKeyRef, kSecClass, kSecClassKey);</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span><span class=\"mtk11\">CFDictionarySetValue</span><span class=\"mtk1\">(getPrivateKeyRef, kSecAttrKeyClass, kSecAttrKeyClassPrivate);</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span><span class=\"mtk11\">CFDictionarySetValue</span><span class=\"mtk1\">(getPrivateKeyRef, kSecAttrLabel, kPrivateKeyName);</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span><span class=\"mtk11\">CFDictionarySetValue</span><span class=\"mtk1\">(getPrivateKeyRef, kSecReturnRef, kCFBooleanTrue);</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span><span class=\"mtk10\">OSStatus</span><span class=\"mtk1\"> status = </span><span class=\"mtk11\">SecItemCopyMatching</span><span class=\"mtk1\">(getPrivateKeyRef, (CFTypeRef *)&privateKeyRef);</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span><span class=\"mtk15\">if</span><span class=\"mtk1\"> (status == errSecItemNotFound)</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">        </span><span class=\"mtk15\">return</span><span class=\"mtk1\"> </span><span class=\"mtk4\">nil</span><span class=\"mtk1\">;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span><span class=\"mtk15\">return</span><span class=\"mtk1\"> (SecKeyRef)privateKeyRef;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">}</span></span></code></pre>\n<p>The following methods will actually deal with Secure Enclave to generate a private key and public key.</p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"objective-c\" data-index=\"3\"><code class=\"grvsc-code\"><span class=\"grvsc-line\"><span class=\"mtk1\">- (</span><span class=\"mtk4\">bool</span><span class=\"mtk1\">) generatePasscodeKeyPair</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">{</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    CFErrorRef error = </span><span class=\"mtk4\">NULL</span><span class=\"mtk1\">;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    SecAccessControlRef sacObject = </span><span class=\"mtk11\">SecAccessControlCreateWithFlags</span><span class=\"mtk1\">(</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">                                                                    kCFAllocatorDefault,</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">                                                                    kSecAttrAccessibleAfterFirstUnlockThisDeviceOnly,</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">                                                                    kSecAccessControlPrivateKeyUsage,</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">                                                                    &error</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">                                                                    );</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span><span class=\"mtk15\">if</span><span class=\"mtk1\"> (error != errSecSuccess) {</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">        </span><span class=\"mtk11\">NSLog</span><span class=\"mtk1\">(</span><span class=\"mtk8\">@&quot;Generating key pair, error: %@</span><span class=\"mtk6\">\\n</span><span class=\"mtk8\">&quot;</span><span class=\"mtk1\">, error);</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    }</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span><span class=\"mtk15\">return</span><span class=\"mtk1\"> [self generateKeyPairWithAccessControlObject:sacObject];</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">}</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">- (</span><span class=\"mtk4\">bool</span><span class=\"mtk1\">) generateKeyPairWithAccessControlObject:(SecAccessControlRef)accessControlRef</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">{</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span><span class=\"mtk3\">// create dictionary of private key </span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    CFMutableDictionaryRef accessControlDict = newCFDict;;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk15\">#if</span><span class=\"mtk4\"> </span><span class=\"mtk1\">!</span><span class=\"mtk11\">TARGET_IPHONE_SIMULATOR</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span><span class=\"mtk11\">CFDictionaryAddValue</span><span class=\"mtk1\">(accessControlDict, kSecAttrAccessControl, accessControlRef);</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk15\">#endif</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span><span class=\"mtk11\">CFDictionaryAddValue</span><span class=\"mtk1\">(accessControlDict, kSecAttrIsPermanent, kCFBooleanTrue);</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span><span class=\"mtk11\">CFDictionaryAddValue</span><span class=\"mtk1\">(accessControlDict, kSecAttrLabel, kPrivateKeyName);</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span><span class=\"mtk3\">// create dictionary for saving key into keychain</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    CFMutableDictionaryRef generatePairRef = newCFDict;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk15\">#if</span><span class=\"mtk4\"> </span><span class=\"mtk1\">!</span><span class=\"mtk11\">TARGET_IPHONE_SIMULATOR</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span><span class=\"mtk11\">CFDictionaryAddValue</span><span class=\"mtk1\">(generatePairRef, kSecAttrTokenID, kSecAttrTokenIDSecureEnclave);</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk15\">#endif</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span><span class=\"mtk11\">CFDictionaryAddValue</span><span class=\"mtk1\">(generatePairRef, kSecAttrKeyType, kSecAttrKeyTypeEC);</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span><span class=\"mtk11\">CFDictionaryAddValue</span><span class=\"mtk1\">(generatePairRef, kSecAttrKeySizeInBits, (__bridge </span><span class=\"mtk4\">const</span><span class=\"mtk1\"> </span><span class=\"mtk4\">void</span><span class=\"mtk1\"> *)([</span><span class=\"mtk10\">NSNumber</span><span class=\"mtk1\"> numberWithInt:</span><span class=\"mtk7\">256</span><span class=\"mtk1\">]));</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span><span class=\"mtk11\">CFDictionaryAddValue</span><span class=\"mtk1\">(generatePairRef, kSecPrivateKeyAttrs, accessControlDict);</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span><span class=\"mtk10\">OSStatus</span><span class=\"mtk1\"> status = </span><span class=\"mtk11\">SecKeyGeneratePair</span><span class=\"mtk1\">(generatePairRef, &publicKeyRef, &privateKeyRef);</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span><span class=\"mtk15\">if</span><span class=\"mtk1\"> (status != errSecSuccess){</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">        </span><span class=\"mtk11\">NSLog</span><span class=\"mtk1\">(</span><span class=\"mtk8\">@&quot;Error trying to retrieve key from server.  sanityCheck: %d&quot;</span><span class=\"mtk1\">, (</span><span class=\"mtk4\">int</span><span class=\"mtk1\">)status);</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">        </span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">        </span><span class=\"mtk15\">return</span><span class=\"mtk1\"> </span><span class=\"mtk4\">NO</span><span class=\"mtk1\">;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    }</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    [self savePublicKeyFromRef:publicKeyRef];</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span><span class=\"mtk15\">return</span><span class=\"mtk1\"> </span><span class=\"mtk4\">YES</span><span class=\"mtk1\">;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">}</span></span></code></pre>\n<p>The private key is generated and stored in Secure Enclave which cannot be directly used. Whereas public key have to be stored manually in keychain by following method.</p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"objective-c\" data-index=\"4\"><code class=\"grvsc-code\"><span class=\"grvsc-line\"><span class=\"mtk1\">- (</span><span class=\"mtk4\">bool</span><span class=\"mtk1\">) savePublicKeyFromRef:(SecKeyRef)publicKeyRef</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">{   </span><span class=\"mtk10\">OSStatus</span><span class=\"mtk1\"> sanityCheck = noErr;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span><span class=\"mtk10\">NSData</span><span class=\"mtk1\"> *tag;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span><span class=\"mtk4\">id</span><span class=\"mtk1\"> keyClass;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    tag = [kPublicKeyName dataUsingEncoding:NSUTF8StringEncoding];</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    keyClass = (__bridge </span><span class=\"mtk4\">id</span><span class=\"mtk1\">) kSecAttrKeyClassPublic;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span><span class=\"mtk10\">NSDictionary</span><span class=\"mtk1\"> *saveDict = @{</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">        </span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">        (__bridge </span><span class=\"mtk4\">id</span><span class=\"mtk1\">) kSecClass : (__bridge </span><span class=\"mtk4\">id</span><span class=\"mtk1\">) kSecClassKey,</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">        (__bridge </span><span class=\"mtk4\">id</span><span class=\"mtk1\">) kSecAttrKeyType : (__bridge </span><span class=\"mtk4\">id</span><span class=\"mtk1\">) kSecAttrKeyTypeEC,</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">        (__bridge </span><span class=\"mtk4\">id</span><span class=\"mtk1\">) kSecAttrApplicationTag : tag,</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">        (__bridge </span><span class=\"mtk4\">id</span><span class=\"mtk1\">) kSecAttrKeyClass : keyClass,</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">        (__bridge </span><span class=\"mtk4\">id</span><span class=\"mtk1\">) kSecValueData : (__bridge </span><span class=\"mtk10\">NSData</span><span class=\"mtk1\"> *)</span><span class=\"mtk11\">SecKeyCopyExternalRepresentation</span><span class=\"mtk1\">(publicKeyRef,</span><span class=\"mtk4\">nil</span><span class=\"mtk1\">),</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">        (__bridge </span><span class=\"mtk4\">id</span><span class=\"mtk1\">) kSecAttrKeySizeInBits : [</span><span class=\"mtk10\">NSNumber</span><span class=\"mtk1\"> numberWithUnsignedInteger:</span><span class=\"mtk7\">256</span><span class=\"mtk1\">],</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">        (__bridge </span><span class=\"mtk4\">id</span><span class=\"mtk1\">) kSecAttrEffectiveKeySize : [</span><span class=\"mtk10\">NSNumber</span><span class=\"mtk1\"> numberWithUnsignedInteger:</span><span class=\"mtk7\">256</span><span class=\"mtk1\">],</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">        (__bridge </span><span class=\"mtk4\">id</span><span class=\"mtk1\">) kSecAttrCanDerive : (__bridge </span><span class=\"mtk4\">id</span><span class=\"mtk1\">) kCFBooleanFalse,</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">        (__bridge </span><span class=\"mtk4\">id</span><span class=\"mtk1\">) kSecAttrCanEncrypt : (__bridge </span><span class=\"mtk4\">id</span><span class=\"mtk1\">) kCFBooleanTrue,</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">        (__bridge </span><span class=\"mtk4\">id</span><span class=\"mtk1\">) kSecAttrCanDecrypt : (__bridge </span><span class=\"mtk4\">id</span><span class=\"mtk1\">) kCFBooleanFalse,</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">        (__bridge </span><span class=\"mtk4\">id</span><span class=\"mtk1\">) kSecAttrCanVerify : (__bridge </span><span class=\"mtk4\">id</span><span class=\"mtk1\">) kCFBooleanTrue,</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">        (__bridge </span><span class=\"mtk4\">id</span><span class=\"mtk1\">) kSecAttrCanSign : (__bridge </span><span class=\"mtk4\">id</span><span class=\"mtk1\">) kCFBooleanFalse,</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">        (__bridge </span><span class=\"mtk4\">id</span><span class=\"mtk1\">) kSecAttrCanWrap : (__bridge </span><span class=\"mtk4\">id</span><span class=\"mtk1\">) kCFBooleanTrue,</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">        (__bridge </span><span class=\"mtk4\">id</span><span class=\"mtk1\">) kSecAttrCanUnwrap : (__bridge </span><span class=\"mtk4\">id</span><span class=\"mtk1\">) kCFBooleanFalse</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    };</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    sanityCheck = </span><span class=\"mtk11\">SecItemAdd</span><span class=\"mtk1\">((__bridge CFDictionaryRef) saveDict, (CFTypeRef *)&publicKeyRef);</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span><span class=\"mtk15\">if</span><span class=\"mtk1\"> (sanityCheck != errSecSuccess) {</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">        </span><span class=\"mtk11\">NSLog</span><span class=\"mtk1\">(</span><span class=\"mtk8\">@&quot;Error trying to retrieve key from server.  sanityCheck: %d&quot;</span><span class=\"mtk1\">, (</span><span class=\"mtk4\">int</span><span class=\"mtk1\">)sanityCheck);</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">        </span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    }</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span><span class=\"mtk15\">return</span><span class=\"mtk1\"> publicKeyRef;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">}</span></span></code></pre>\n<h2 id=\"demo\" style=\"position:relative;\"><a href=\"#demo\" aria-label=\"demo permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Demo</h2>\n<p>Now I am creating ViewController.h and .m files. In viewDidLoad in .m file, having a string to be stored in UserDefaults. I will encrypt this string by a private key generated above and then store persistently encrypted data for later use.</p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"objective-c\" data-index=\"5\"><code class=\"grvsc-code\"><span class=\"grvsc-line\"><span class=\"mtk1\">- (</span><span class=\"mtk4\">void</span><span class=\"mtk1\">)viewDidLoad {</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    [super viewDidLoad];</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span><span class=\"mtk10\">NSString</span><span class=\"mtk1\"> *strDatatosave = </span><span class=\"mtk8\">@&quot;example data to save&quot;</span><span class=\"mtk1\">;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span><span class=\"mtk10\">NSString</span><span class=\"mtk1\"> *bundleIdentifier = [[</span><span class=\"mtk10\">NSBundle</span><span class=\"mtk1\"> mainBundle] bundleIdentifier];</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span><span class=\"mtk10\">NSString</span><span class=\"mtk1\"> *strGroupID = [</span><span class=\"mtk10\">NSString</span><span class=\"mtk1\"> stringWithFormat:</span><span class=\"mtk8\">@&quot;group.%@&quot;</span><span class=\"mtk1\">,bundleIdentifier];</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    SecEnclaveWrapper *keychainItem = [[SecEnclaveWrapper alloc] init];</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span><span class=\"mtk10\">NSData</span><span class=\"mtk1\"> *encrypted = [keychainItem encryptData:[strDatatosave dataUsingEncoding:NSUTF8StringEncoding]];</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span><span class=\"mtk10\">NSString</span><span class=\"mtk1\"> *strEncrypted = [[</span><span class=\"mtk10\">NSString</span><span class=\"mtk1\"> alloc] initWithData:encrypted encoding:NSUTF8StringEncoding];</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span><span class=\"mtk11\">NSLog</span><span class=\"mtk1\">(</span><span class=\"mtk8\">@&quot;encrypted string %@&quot;</span><span class=\"mtk1\">,strEncrypted);</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span><span class=\"mtk10\">NSData</span><span class=\"mtk1\"> *decrypted =[keychainItem decryptData:encrypted];</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span><span class=\"mtk10\">NSString</span><span class=\"mtk1\"> *strDecrypted = [[</span><span class=\"mtk10\">NSString</span><span class=\"mtk1\"> alloc] initWithData:decrypted encoding:NSUTF8StringEncoding];</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span><span class=\"mtk11\">NSLog</span><span class=\"mtk1\">(</span><span class=\"mtk8\">@&quot;decrypted string as real string%@&quot;</span><span class=\"mtk1\">,strDecrypted);</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">}</span></span></code></pre>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>In this blog, we learned about the basics of key generation via Secure Enclave and encryption and decryption using keys.\nBy default, key-pairs are generated in the Secure Enclave. The private key is available only at creation time and can not be obtained later as it is saved in Secure Enclave. Operations can be performed with it without exposing it to user code. Only Public Key will be stored and retrieved.</p>\n<p>You can find the complete repository link <a href=\"https://github.com/LoginRadius/engineering-blog-samples/tree/master/iOS/SecureEnclave/SecureEnclaveDemo\">here</a></p>\n<p>Thanks for reading the blog. For detailed information and execution example of this blog, please refer to the video below:</p>\n<iframe width=\"560\" height=\"315\" src=\"https://www.youtube.com/embed/c_1E_NV4NBk\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen></iframe>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n  .dark-default-dark {\n    background-color: #1E1E1E;\n    color: #D4D4D4;\n  }\n  .dark-default-dark .mtk3 { color: #6A9955; }\n  .dark-default-dark .mtk1 { color: #D4D4D4; }\n  .dark-default-dark .mtk10 { color: #4EC9B0; }\n  .dark-default-dark .mtk4 { color: #569CD6; }\n  .dark-default-dark .mtk15 { color: #C586C0; }\n  .dark-default-dark .mtk12 { color: #9CDCFE; }\n  .dark-default-dark .mtk11 { color: #DCDCAA; }\n  .dark-default-dark .mtk8 { color: #CE9178; }\n  .dark-default-dark .mtk6 { color: #D7BA7D; }\n  .dark-default-dark .mtk7 { color: #B5CEA8; }\n</style>","frontmatter":{"date":"October 13, 2020","updated_date":null,"title":"Secure Enclave in iOS App","tags":["ios","security","data","encryption","private key","xcode"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5037593984962405,"src":"/static/69f1d98b07ca23af682918f3250280ff/14b42/CoverImage.jpg","srcSet":"/static/69f1d98b07ca23af682918f3250280ff/f836f/CoverImage.jpg 200w,\n/static/69f1d98b07ca23af682918f3250280ff/2244e/CoverImage.jpg 400w,\n/static/69f1d98b07ca23af682918f3250280ff/14b42/CoverImage.jpg 800w,\n/static/69f1d98b07ca23af682918f3250280ff/9842e/CoverImage.jpg 900w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Tanvi Jain","github":"tanvijn","avatar":null}}}},{"node":{"fields":{"slug":"/identity/securing-enterprise-mobile-apps/"},"html":"<p>If enterprise mobile apps are the future of businesses, we are already living in the future. With the growing popularity of technologies like 5G, blockchain, AI, and machine language, more and more companies are integrating their corporate processes with mobile platforms.</p>\n<p>Some of these primary capabilities include the management of security, IT infrastructure, content, salesforce, human resource, business intelligence (BI), billing system, and product catalogs.</p>\n<p>No doubt, mobile applications are gradually becoming a staple in enterprises. </p>\n<p>With all the good that's going around, it is crucial that we flip and try to see through the other side of the scenario.</p>\n<h2 id=\"latest-threats-in-the-enterprise-mobile-app-security\" style=\"position:relative;\"><a href=\"#latest-threats-in-the-enterprise-mobile-app-security\" aria-label=\"latest threats in the enterprise mobile app security permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Latest Threats in the Enterprise Mobile App Security</h2>\n<p>Mobile will take over the enterprise software universe very soon. Almost <a href=\"https://www.warc.com/content/paywall/article/warc-datapoints/almost_three_quarters_of_internet_users_will_be_mobileonly_by_2025/124845\">three-quarters of internet users</a> (that sums up to 72.6 percent) will use mobile to access the web by 2025. </p>\n<p>No wonder, businesses of all sizes are making the shift towards enterprise mobile apps.</p>\n<p>What could go wrong? It turns out, a lot. Even a well-established enterprise can fail spectacularly—with respect to <em>security</em>—when they take on mobile.</p>\n<p>Zimperium's <a href=\"https://get.zimperium.com/threat-report-2019-h1/\">2019 State of Enterprise Mobile Security</a> findings below highlights the nuances:</p>\n<ul>\n<li>32% of enterprise mobile endpoints encountered risky networks.</li>\n<li>27% of enterprise mobile endpoints were exposed to device threats.</li>\n<li>7% of enterprise mobile endpoints were exposed to network attacks.</li>\n<li>Almost one out of 10 were exposed to network attacks.</li>\n<li>Man-in-the-middle (MITM) attacks were 93% of network threats and 86% of all risks.</li>\n<li>Apple patched 54% more vulnerabilities than the same timeframe last year.</li>\n</ul>\n<h2 id=\"mobile-app-security-threats-that-you-should-take-seriously-in-2020\" style=\"position:relative;\"><a href=\"#mobile-app-security-threats-that-you-should-take-seriously-in-2020\" aria-label=\"mobile app security threats that you should take seriously in 2020 permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Mobile App Security Threats That You Should Take Seriously in 2020 </h2>\n<p>Mobile security is at the epicenter of an enterprise's concern today. After all, nearly all employees now regularly access corporate data on mobile. You need to keep confidential information out of the wrong hands, and that's an intricate puzzle in itself.</p>\n<p>Following are the major threats security teams need to deal with:</p>\n<p><strong>Improper Session Handling</strong>: Most applications use tokens to allow users to perform multiple actions without re-authenticating their identity every time. Improper session handling happens when apps involuntarily exchange session tokens (for example, with the bad guys), they can <a href=\"https://www.loginradius.com/blog/2020/04/corporate-account-takeover-attacks/\">exploit the website and the corporate network</a>, altogether.</p>\n<p><strong>Insecure data storage</strong>: There are many vulnerable places in an application where data can be stored: binary data stores, SQL databases, and cookie stores are a few. Majority of these vulnerabilities are triggered by the OS, frameworks, and compilers involved. Often, the poor storage of data results from inadequate processes to manage device gallery and data cache.</p>\n<p><a href=\"https://www.loginradius.com/resource/the-enterprise-buyers-guide-to-consumer-identity/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"Enterprise Buyer’s Guide to Consumer Identity Ebook\"\n        title=\"Enterprise Buyer’s Guide to Consumer Identity Ebook\"\n        src=\"/static/6cf3b3c14d1cbec2bf253b24dcd51704/e5715/EB-The-Enterprise-Buyer%E2%80%99s-Guide-to-Consumer-Identity.png\"\n        srcset=\"/static/6cf3b3c14d1cbec2bf253b24dcd51704/a6d36/EB-The-Enterprise-Buyer%E2%80%99s-Guide-to-Consumer-Identity.png 650w,\n/static/6cf3b3c14d1cbec2bf253b24dcd51704/e5715/EB-The-Enterprise-Buyer%E2%80%99s-Guide-to-Consumer-Identity.png 768w,\n/static/6cf3b3c14d1cbec2bf253b24dcd51704/2bef9/EB-The-Enterprise-Buyer%E2%80%99s-Guide-to-Consumer-Identity.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<p><strong>Improper encryption</strong>: Encryption is the method of translating data into an unreadable code that is only usable with the secret key after it has been re-translated. Therefore, it is important to evaluate how easy or difficult it might be to crack your application's secret code. This is a common vulnerability that hackers exploit with code and intellectual property theft, leading to <a href=\"https://www.loginradius.com/blog/2019/12/digital-privacy-best-practices/\">privacy violations</a>, and damage to reputation.</p>\n<p><strong>Mobile ad fraud</strong>: With the amount of revenue generated by mobile advertising every year, it is no surprise that cybercriminals are after all the cash that can be duped from mobile ad revenue streams. One of the most common types of ad fraud is using malware to generate fraudulent clicks on ads that appear to come from real uses. Ad fraud malware often runs in the background and can overheat the battery, incur high data charges, and make users lose millions of dollars.</p>\n<p><strong>Human error from remote workers</strong>: Human error is perhaps one of the most commonly observed <a href=\"https://www.loginradius.com/blog/2019/10/cybersecurity-attacks-business/\">cybersecurity threats</a>. Despite the steady rise in mass media reporting of cybersecurity accidents, the non-technical population still lacks basic security knowledge. Your responsibility as an enterprise owner is to educate employees on mobile security threats and prevent cybercriminals from accessing a device or network.</p>\n<h2 id=\"features-of-a-secured-enterprise-mobile-application\" style=\"position:relative;\"><a href=\"#features-of-a-secured-enterprise-mobile-application\" aria-label=\"features of a secured enterprise mobile application permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Features of a Secured Enterprise Mobile Application</h2>\n<p>A holistic approach to security for mobile devices is regarded as an essential part of a security ecosystem. Keeping data storage and application management at the center, here's what the entire ecosystem looks like.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 60.61538461538461%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"image2 1\"\n        title=\"image2 1\"\n        src=\"/static/b9350a9e7e8c383fb6d53c2897bc2362/e5715/image2-1.png\"\n        srcset=\"/static/b9350a9e7e8c383fb6d53c2897bc2362/a6d36/image2-1.png 650w,\n/static/b9350a9e7e8c383fb6d53c2897bc2362/e5715/image2-1.png 768w,\n/static/b9350a9e7e8c383fb6d53c2897bc2362/d0143/image2-1.png 1025w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<h2 id=\"securing-mobile-apps-using-loginradius-secured-platform\" style=\"position:relative;\"><a href=\"#securing-mobile-apps-using-loginradius-secured-platform\" aria-label=\"securing mobile apps using loginradius secured platform permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Securing Mobile Apps Using LoginRadius' Secured Platform</h2>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 60.61538461538461%; position: relative; bottom: 0; left: 0; background-image: url('data:image/jpeg;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"3 1024x621\"\n        title=\"3 1024x621\"\n        src=\"/static/bf95457f534b662cf27ea7c80eca457a/212bf/3-1024x621.jpg\"\n        srcset=\"/static/bf95457f534b662cf27ea7c80eca457a/6aca1/3-1024x621.jpg 650w,\n/static/bf95457f534b662cf27ea7c80eca457a/212bf/3-1024x621.jpg 768w,\n/static/bf95457f534b662cf27ea7c80eca457a/72e01/3-1024x621.jpg 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>LoginRadius, a <a href=\"https://www.loginradius.com/blog/2019/06/customer-identity-and-access-management/\">consumer identity and access management</a> (CIAM) solution, offers a comprehensive approach to protecting enterprise mobile applications. While human error is unavoidable, the platform is an all-in-one solution for all mobile security needs. Some of the features include:</p>\n<h3 id=\"identity-management\" style=\"position:relative;\"><a href=\"#identity-management\" aria-label=\"identity management permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Identity management </h3>\n<p>The most efficient mobile security involves intelligent device identification. This describes the emergence and development of identity and access management services like LoginRadius, which offers a host of advantages: </p>\n<ul>\n<li>It simplifies the process of access management related to mobile devices.</li>\n<li>It forces device authorization based on the pre-defined metrics. </li>\n<li>It eliminates human errors to quite an extent.</li>\n<li>It abides by international <a href=\"https://www.loginradius.com/compliances/\">data regulatory compliances</a>. </li>\n</ul>\n<h3 id=\"multi-factor-authentication-mfa\" style=\"position:relative;\"><a href=\"#multi-factor-authentication-mfa\" aria-label=\"multi factor authentication mfa permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Multi-factor authentication (MFA)</h3>\n<p>MFA is ideally a <a href=\"https://www.loginradius.com/blog/2019/06/what-is-multi-factor-authentication/\">kind of authentication</a> granted on the server-side and is available after successful authorization. LoginRadius ensures that all user data is encrypted and accessed only after all credentials are successfully validated. Moreover, it creates different authentication tokens for different devices.</p>\n<h3 id=\"adaptive-mobile-security\" style=\"position:relative;\"><a href=\"#adaptive-mobile-security\" aria-label=\"adaptive mobile security permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Adaptive mobile security</h3>\n<p>LoginRadius takes an integrated approach when it comes to <a href=\"https://www.loginradius.com/web-and-mobile-sso/\">responding to mobile threats</a>. It offers a thread of risk management and information security features to prevent cyberattacks or upcoming mobile app vulnerabilities from happening.</p>\n<h3 id=\"data-security\" style=\"position:relative;\"><a href=\"#data-security\" aria-label=\"data security permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Data security</h3>\n<p>LoginRadius defends user data by profoundly analyzing the issue that may exist and produces defense strategies accordingly. It keeps you well-informed about how different operating systems, <a href=\"https://www.loginradius.com/identity-api/\">external APIs</a>, platforms, and enterprise mobile frameworks store and transfer their data. </p>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion </h2>\n<p>Sadly, very few companies have a well-secured management policy, while still a lot of others lack absolute power.  </p>\n<p>Enterprise mobile app security is the need of the hour. Businesses must consider the changing state of cybersecurity and mobility when implementing the above-mentioned <a href=\"https://www.loginradius.com/resource/infographic/cybersecurity-best-practices-for-enterprise/\">protection tips</a> to secure their devices. </p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"Book-a-demo-loginradius\"\n        title=\"Book-a-demo-loginradius\"\n        src=\"/static/c4fac6b24f15c7b7ba84deec1d1107ac/e5715/Book-a-demo-1024x310.png\"\n        srcset=\"/static/c4fac6b24f15c7b7ba84deec1d1107ac/a6d36/Book-a-demo-1024x310.png 650w,\n/static/c4fac6b24f15c7b7ba84deec1d1107ac/e5715/Book-a-demo-1024x310.png 768w,\n/static/c4fac6b24f15c7b7ba84deec1d1107ac/2bef9/Book-a-demo-1024x310.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"August 07, 2020","updated_date":null,"title":"Securing Enterprise Mobile Apps with LoginRadius","tags":["security"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.408450704225352,"src":"/static/aecf6bc1006634031f22240252ba32e4/33aa5/Secure-Enterprise-Mobile-App.jpg","srcSet":"/static/aecf6bc1006634031f22240252ba32e4/f836f/Secure-Enterprise-Mobile-App.jpg 200w,\n/static/aecf6bc1006634031f22240252ba32e4/2244e/Secure-Enterprise-Mobile-App.jpg 400w,\n/static/aecf6bc1006634031f22240252ba32e4/33aa5/Secure-Enterprise-Mobile-App.jpg 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},{"node":{"fields":{"slug":"/identity/online-casino-and-gambling-cyber-threat/"},"html":"<p>The online gambling industry is one of the potential sectors that may make it through the pandemic with the least possible damage. In fact, according to a study by the GrandViewResearch, online gambling is about to witness massive growth, and in the US alone, it will reach a value of <a href=\"https://www.grandviewresearch.com/industry-analysis/online-gambling-market?utm_source=prnewswire.com&#x26;utm_medium=referral&#x26;utm_campaign=PRN_Aug27_onlinegambling_ICT_RD1&#x26;utm_content=Content\">$102.9 billion by 2025</a>.</p>\n<p><em>No wonder the online gambling ecosystem is at its finest phase!</em> </p>\n<p>With the COVID-19 situation confining people to their homes, there's a lot more population playing on the internet. They have even outperformed their physical counterparts by massive numbers.</p>\n<p>In an environment where gambling occurs online, thousands of billions of casino money are transacted via credit and debit cards, wire transfers, and e-wallets. It is no surprise that gambling companies are one of the most favorable targets for scammers and hackers.</p>\n<p><a href=\"https://www.loginradius.com/blog/2019/10/cybersecurity-attacks-business/\">Cybercriminals target their resources</a> in two major ways: one they steal the <em>obvious -</em> money and the other they look for confidential data shared by gamblers online.</p>\n<p>Needless-to-say, the online gambling industry, therefore, needs to take the necessary steps to build safe and secure platforms for casino operators and consumers at large.</p>\n<h2 id=\"online-casino-a-multi-billion-dollar-industry--whats-about-to-change\" style=\"position:relative;\"><a href=\"#online-casino-a-multi-billion-dollar-industry--whats-about-to-change\" aria-label=\"online casino a multi billion dollar industry  whats about to change permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Online Casino, a Multi-Billion Dollar Industry- What's About to Change</h2>\n<p>The online gambling industry has undergone various changes over the past decades and is simultaneously expected to exhibit numerous transformations in the years to come. </p>\n<p>For example, the online gambling market is expected to grow at a compound annual growth rate (CAGR) of 11.5% from 2020 to 2027. That's huge!</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 600px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 50%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"usa online gambling market size\"\n        title=\"usa online gambling market size\"\n        src=\"/static/106a3a03959a84668cd55fac09ed2789/0a47e/usa-online-gambling-market-size.png\"\n        srcset=\"/static/106a3a03959a84668cd55fac09ed2789/0a47e/usa-online-gambling-market-size.png 600w\"\n        sizes=\"(max-width: 600px) 100vw, 600px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>Source: www.grandviewresearch.com</p>\n<p>This also means almost every player in the industry will compete to sustain in the competition, software developers will create more innovative games, and casinos will incorporate new <a href=\"https://www.loginradius.com/blog/2020/01/improving-customer-experience-in-the-gaming-industry/#:~:text=Online%20Gaming%20Industry%20Growth,around%2080%25%20of%20this%20revenue.\">ideas to improve customer experience</a>. So, what are these new ideas? </p>\n<p>Here are five key trends that could change the entire casino and gambling landscape.</p>\n<h3 id=\"1-rise-of-cryptocurrency-transactions-in-casinos\" style=\"position:relative;\"><a href=\"#1-rise-of-cryptocurrency-transactions-in-casinos\" aria-label=\"1 rise of cryptocurrency transactions in casinos permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. Rise of Cryptocurrency Transactions in Casinos</h3>\n<p>Cryptocurrencies are no longer the future. The majority of online gambling and casino operators have already switched to Bitcoin and other cryptocurrencies as their standard mode of payment. Clearly, they see many advantages. Some of which include:</p>\n<ul>\n<li>All operations are automatically recorded within the game, which is why nothing goes unnoticed. All settlement between players and casinos are entirely transparent. </li>\n<li>Gamblers need not enter their data during deposits. Also, it is virtually impossible to hack blockchain systems.</li>\n<li>Cryptocurrency payment transaction fees are either zero or considerably smaller than in paper currency transactions.</li>\n<li>Replenishment of deposits and withdrawals would require comparatively lesser time than the traditional payment method.</li>\n<li>Players can execute all transactions anonymously by replenishing casino accounts using cryptocurrencies.</li>\n</ul>\n<h3 id=\"2-adoption-of-ar-and-vr-in-casinos\" style=\"position:relative;\"><a href=\"#2-adoption-of-ar-and-vr-in-casinos\" aria-label=\"2 adoption of ar and vr in casinos permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. Adoption of AR and VR in Casinos</h3>\n<p><a href=\"https://www.cnbc.com/2016/10/10/virtual-reality-gambling-expected-to-grow-800-percent-by-2021-driven-by-high-rollers.html\">Virtual reality (VR) is another dimension</a> that has been working its way into the gaming industry - with many casinos already integrating it into their environment.</p>\n<p>What this technology does is it designs an entirely new environment, a whole new reality. An example of this is poker, where multiple players share one environment, adding to the experience.</p>\n<p>Similar to virtual reality, there is another technology called augmented reality (AR). Unlike VR, however, AR supplements the current environment with computer overlays. Heard of Pokémon Go? It uses AR, and now it is gearing up to enter the gambling industry.</p>\n<p>Considering that this technology improves an already established environment, live gaming is expected to become even more captivating.</p>\n<h3 id=\"3-customers-evolving-gambling-habits\" style=\"position:relative;\"><a href=\"#3-customers-evolving-gambling-habits\" aria-label=\"3 customers evolving gambling habits permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3. Customer's Evolving Gambling Habits</h3>\n<p>It is no brainer that the customer's habit evolves with time. Social gambling and the rising popularity of gambling applications are some of the biggest indicators in this regard. Players can now easily compete on leaderboards and participate in social slots, whenever they want to.</p>\n<p><a href=\"https://www.casino.org/features/gambling-statistics/\">Mobile technology</a> has been a massive influence on people with a huge percentage of the world's population owning a smartphone. Casinos are more than ever investing in gaming applications and creating mobile-friendly games. It seems like mobile games will soon take over their desktop competition.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 600px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 50%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"europe online gambling market share\"\n        title=\"europe online gambling market share\"\n        src=\"/static/2c6d0a3f840707d36a4a2d7b127b9c3c/0a47e/europe-online-gambling-market-share.png\"\n        srcset=\"/static/2c6d0a3f840707d36a4a2d7b127b9c3c/0a47e/europe-online-gambling-market-share.png 600w\"\n        sizes=\"(max-width: 600px) 100vw, 600px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p><em>Source: www.grandviewresearch.com</em></p>\n<h3 id=\"4-stricter-casinos--gambling-regulations\" style=\"position:relative;\"><a href=\"#4-stricter-casinos--gambling-regulations\" aria-label=\"4 stricter casinos  gambling regulations permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>4. Stricter Casinos &#x26; Gambling Regulations</h3>\n<p>The world is getting pretty serious about gambling. Some countries have already legalized online gambling, while others are looking forward to making a move in 2020. </p>\n<p>For example, Belarus legalized online casinos in 2019, Ukraine introduced a bill to legalize gaming. Russia has simplified the identification procedure required in betting, and even the UK accepted the obligatory requirements related to customer identification. </p>\n<h3 id=\"5-evolution-of-live-casinos\" style=\"position:relative;\"><a href=\"#5-evolution-of-live-casinos\" aria-label=\"5 evolution of live casinos permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>5. Evolution of Live Casinos</h3>\n<p>Another milestone in online gambling is probably the rapid evolution of live casinos. Games are carried out by dealers with professional lighting and sound equipment from exclusive studios. </p>\n<p>Then, cameras are mounted at various room angles, so players can witness everything that's happening inside the studio. Going forward, the concept of a live casino will gain even more popularity.</p>\n<h2 id=\"why-is-online-gambling-and-casino-security-so-crucial\" style=\"position:relative;\"><a href=\"#why-is-online-gambling-and-casino-security-so-crucial\" aria-label=\"why is online gambling and casino security so crucial permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Why Is Online Gambling and Casino Security So Crucial</h2>\n<p>In 2020, reducing the effects of cyber attacks and online fraud is crucial to sustaining the online gambling industry. Hackers are becoming extremely advanced, using tools and implementing sophisticated techniques like signal manipulation through fake apps and app-based hacking to breach data and break down online security protocols.</p>\n<p>Besides, Statista.com estimates that the global online gambling market will be valued at more than <a href=\"https://www.statista.com/statistics/270728/market-volume-of-online-gaming-worldwide/\">$94 billion USD in 2024</a> - meaning more the figure, more the risk of cybercrime.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 74.46153846153845%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"online gambling market 2017 2024 1 1024x763\"\n        title=\"online gambling market 2017 2024 1 1024x763\"\n        src=\"/static/2e8bcf67c1f60144382c72094228925f/e5715/online-gambling-market-2017-2024-1-1024x763.png\"\n        srcset=\"/static/2e8bcf67c1f60144382c72094228925f/a6d36/online-gambling-market-2017-2024-1-1024x763.png 650w,\n/static/2e8bcf67c1f60144382c72094228925f/e5715/online-gambling-market-2017-2024-1-1024x763.png 768w,\n/static/2e8bcf67c1f60144382c72094228925f/2bef9/online-gambling-market-2017-2024-1-1024x763.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>Source: statista</p>\n<p>More than ever now is the time when cyber protection will play a critical role in the continued development and success of this revolutionary online gambling industry.</p>\n<h2 id=\"recent-cyber-attacks-in-online-gambling-sites\" style=\"position:relative;\"><a href=\"#recent-cyber-attacks-in-online-gambling-sites\" aria-label=\"recent cyber attacks in online gambling sites permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Recent Cyber Attacks in Online Gambling Sites</h2>\n<p>The primary <a href=\"https://www.loginradius.com/blog/2020/05/cyber-threats-business-risk-covid-19/\">threat to cybersecurity</a> that online casinos face is hacking. It may include targeted attacks forcing servers to get swamped with bot traffic, or it may consist of more sophisticated tactics designed to gain access to confidential customer data. </p>\n<p>Here are a few instances of recent breaches that will help you understand its severity in today's online gambling threat landscape. </p>\n<ul>\n<li>A group of professional Chinese hackers has officially confirmed that they have been <a href=\"https://www.zdnet.com/article/chinese-hackers-have-breached-online-betting-and-gambling-sites/\">hacking into gambling companies</a> and online betting websites in Southeast Asia since 2019. </li>\n<li>According to what is believed to be one of the biggest breaches of government data, betting companies acquired <a href=\"https://www.dailymail.co.uk/news/article-7904287/Betting-firms-granted-access-database-28-MILLION-children.html\">28 million children's database</a> in England, Wales, and Northern Ireland. The news surfaces in January 2020. </li>\n<li>SBTech, a popular supplier of sports betting and iGaming platform solutions, suffered a <a href=\"https://egr.global/intel/news/sbtech-partners-experience-72-hour-downtime-after-cybersecurity-attack/\">ransomware attack in March 2020</a>. Following which, it shut down its global datacentres. For more than 72 hours, clients were left without a consumer-facing website. Luckily, no data breach was recorded. </li>\n</ul>\n<h2 id=\"types-of-attacks-on-online-casino-betting-and-gambling-sites\" style=\"position:relative;\"><a href=\"#types-of-attacks-on-online-casino-betting-and-gambling-sites\" aria-label=\"types of attacks on online casino betting and gambling sites permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Types of Attacks on Online Casino, Betting and Gambling Sites </h2>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 60.61538461538461%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAMCAIAAADtbgqsAAAACXBIWXMAAAsSAAALEgHS3X78AAABpklEQVQoz22SWU8CQQzH50HpzKIxxsTERxKBZS9QkWt3WfYAuVQiRlARDA8kPvr9X2xnOMSYNJOm03/7a1MGtQlUX8CbgT8nc2fCjEXWFTlvzzBSaAkr0fDX7gg9wAgjJWpQXJuk0K+/8ptHYYQbvUsOmt7idocbEVgJzzeFRXoG7jt4H6qE1vpM+Qte7FFz7INifI2IHIyYibgenrvj83I/XQi4mTBqW58e1qbH4dKZfotwCU6XqAi+gQ1JjK3MmBuxKPWz3kM2eDoqtLgZM/DmBOzOeLw67X5BvMKoFEeSfIOtWMwk440y9WHaolqyc+ON9M3FQbSC27G4bNDM27GzalshL/VRr1HdhHaW8xhUxuAvoD6ByjN953yR9wEdREVsmjkk327TiyOgWUrsMkxFTn41WIPRX4cEmG1LR29CaUDDY63tIJhvJUyCNRSYpJVLJnLqQCzlUZq2FVEbtTxMQPh8k61vIO/vdqNOwoi4Hpy4k7P28qJ6D1JMDSjTU5lK7BOwim7vSQ+41dacrlbsac7dr7PZGft7hnv3GOIlSIv/zfkBQ3JznsOJj8oAAAAASUVORK5CYII='); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"online gambling, casino and betting sectors\"\n        title=\"online gambling, casino and betting sectors\"\n        src=\"/static/26529451dea558b794559117c0816437/e5715/online-gambling-casino-and-betting-sectors.png\"\n        srcset=\"/static/26529451dea558b794559117c0816437/a6d36/online-gambling-casino-and-betting-sectors.png 650w,\n/static/26529451dea558b794559117c0816437/e5715/online-gambling-casino-and-betting-sectors.png 768w,\n/static/26529451dea558b794559117c0816437/d0143/online-gambling-casino-and-betting-sectors.png 1025w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>Online gambling and casino sites face security threats from several sources. For starters, some external hackers launch attacks to commit fraud from the comfort of their home or anywhere (for that matter). Next, some insiders hold administrative positions inside the business itself and <a href=\"https://www.loginradius.com/blog/2019/09/prevent-credential-stuffing-attacks/\">steal customer details</a>. </p>\n<p>Anyway, let's understand some of the major types of cyberattacks impacting the gambling industry. </p>\n<h3 id=\"expediting\" style=\"position:relative;\"><a href=\"#expediting\" aria-label=\"expediting permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Expediting </h3>\n<p>Expediting gameplay abuse is not new to the casino and online gambling industry. It is an automated threat that utilizes bots to speed up time-consuming actions, mostly to offer unfair advantages to players by violating rules in the gameplay. </p>\n<p>Expediting attacks decline user appeal, result in loss of subscription revenue, and may even risk your reputation as an online game service provider.</p>\n<h3 id=\"ddos-attack\" style=\"position:relative;\"><a href=\"#ddos-attack\" aria-label=\"ddos attack permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>DDoS Attack</h3>\n<p>In Distributed Denial of Service (DDoS) attacks, hackers flood gambling sites with an unexpected surge of traffic, leading to insignificant delays in loading times or completely crashing your website. </p>\n<p>Most naturally, players lose interest in the gambling company and jump off to their competitors.</p>\n<h3 id=\"scraping\" style=\"position:relative;\"><a href=\"#scraping\" aria-label=\"scraping permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Scraping </h3>\n<p>Scraping is another automated attack where hackers use bots to steal data from APIs, websites, and databases and consequently use those to exploit gambling operations. </p>\n<p>Scrapers often lead to increased risk of latency on gambling sites using excessive bandwidth with their requests, making legitimate customers suffer from long load times.</p>\n<h3 id=\"account-takeover-attacks\" style=\"position:relative;\"><a href=\"#account-takeover-attacks\" aria-label=\"account takeover attacks permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Account Takeover Attacks</h3>\n<p><a href=\"https://www.loginradius.com/blog/2020/04/corporate-account-takeover-attacks/\">Account takeover attack</a> is a complex challenge for the online gambling industry. Hackers gain illegal access to a genuine user profile to perform payment or identity fraud. </p>\n<p>In the gambling space, they steal players' resources and sell them on the dark market. They lure victims into accepting malicious friend requesting or by clicking on infected links. </p>\n<h3 id=\"sql-injection\" style=\"position:relative;\"><a href=\"#sql-injection\" aria-label=\"sql injection permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>SQL Injection </h3>\n<p>A Structured Query Language (SQL) injection attack happens when a hacker feeds infected SQL statements to take over the database server and add, modify, or delete data according to their will. </p>\n<p>By breaking into application security measures, hackers can easily pass through validation and approval checkpoints. This method of attack is mostly used by attackers to gain access over personal data, intellectual properties of gamblers, customer information, gaming secrets, and more.</p>\n<h2 id=\"how-loginradius-can-enhance-the-experience-of-online-gaming-with-advance-security\" style=\"position:relative;\"><a href=\"#how-loginradius-can-enhance-the-experience-of-online-gaming-with-advance-security\" aria-label=\"how loginradius can enhance the experience of online gaming with advance security permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How LoginRadius Can Enhance the Experience of Online Gaming With Advance Security</h2>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 60.61538461538461%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"How LoginRadius Can Enhance the Experience of Online Gaming\"\n        title=\"How LoginRadius Can Enhance the Experience of Online Gaming\"\n        src=\"/static/569c23acf120c7a7f73a522b7f8d6c6f/e5715/How-LoginRadius-Can-Enhance-the-Experience-of-Online-Gaming.png\"\n        srcset=\"/static/569c23acf120c7a7f73a522b7f8d6c6f/a6d36/How-LoginRadius-Can-Enhance-the-Experience-of-Online-Gaming.png 650w,\n/static/569c23acf120c7a7f73a522b7f8d6c6f/e5715/How-LoginRadius-Can-Enhance-the-Experience-of-Online-Gaming.png 768w,\n/static/569c23acf120c7a7f73a522b7f8d6c6f/2bef9/How-LoginRadius-Can-Enhance-the-Experience-of-Online-Gaming.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p>LoginRadius is a powerful <a href=\"https://www.loginradius.com/blog/2019/06/customer-identity-and-access-management/\">customer identity and access management (CIAM)</a> platform that protects online gamblers' identity and prevents even the most sophisticated bots from infecting the gaming provider. It detects and blocks automated threats, including expediting, scraping, account takeover, DDoS, and more.</p>\n<p>Here's how the LoginRadius platform protects the gaming industry from malicious bot attacks and significantly improving customer experience.</p>\n<ul>\n<li><strong>Multi-Factor Authentication</strong>: The platform adds additional layers of protection by enabling two-factor or <a href=\"https://www.loginradius.com/blog/2019/06/what-is-multi-factor-authentication/\">multifactor authentication</a> on both player and admin accounts. It also offers real-time fraud analysis and data management features. </li>\n</ul>\n<p><a href=\"https://www.loginradius.com/resource/fixing-broken-authentication-with-adaptive-mfa/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAGCAYAAADDl76dAAAACXBIWXMAAAsSAAALEgHS3X78AAABbklEQVQY01WQTUsCURSGJSjnQx3JJKTEQittNC2ZScfGRkfUTKUoUiwy2gRFH5tWWZtW/pJo0SJaRBEtok1t2rUJ+itvZ9QRWrxwL/c9zz08FnZ6CUa4GRW2YPpf+KAK890IE1DAiTpGEutwzelgwzkwwWWwUykwvY7FhBkFeygNju48xRnR4Y6vwBnOgqEBE8gTxKvVIeZqsCU2YI3kCah036nXAVrp4FfXkKkdQK40IZV3MalU4KANBVHrA60EHI5k4ZVLcM/n4ZWK8CwUOtuZHYtJ9iUrkAgm6lsYk1YgRPPgYyUItCHbKw/5k3BFc/ApVYwvrlLKGI0XO/N9oHHgyZd9VgMX0jAYoMFACg6lDj7dhCNaIJ8qLJ4YjlptfP/84u7xFTf3T7h9eMbbxxde3j9JTYY+VAwgOSOHhiuBvPFitvtBYhMMAQUCGhsOTMiQq3s4vGhj+/QSjeMWGict7J9fY+fsCjbyb6j7AxKEw6noHebVAAAAAElFTkSuQmCC'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"adaptive-mfa\"\n        title=\"adaptive-mfa\"\n        src=\"/static/38581e51de794ee73778cc943c5b9537/e5715/adaptive-mfa.png\"\n        srcset=\"/static/38581e51de794ee73778cc943c5b9537/a6d36/adaptive-mfa.png 650w,\n/static/38581e51de794ee73778cc943c5b9537/e5715/adaptive-mfa.png 768w,\n/static/38581e51de794ee73778cc943c5b9537/63ff0/adaptive-mfa.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<ul>\n<li><strong>Passwordless Login</strong>: Eliminating the <a href=\"https://www.loginradius.com/blog/2019/10/passwordless-authentication-the-future-of-identity-and-security/\">use of passwords</a> altogether can surprisingly improve gamblers' retention and loyalty because there will be no passwords to hack in the first place. Also, there is a one-touch login feature where customers login with a magic link or OTP.</li>\n<li><strong>Security Compliance</strong>: LoginRadius is <a href=\"https://www.loginradius.com/compliances/\">compliant with international regulatory standards</a> like COPPA, CCPA, and GDPR. The platform does not allow minor users to register.</li>\n<li><strong>360-Degree View</strong>: Gambling service providers can enjoy a comprehensive view of their customer demographics and detect abnormal user activity. The objective is to help them understand the players' behavior and offer <a href=\"https://www.loginradius.com/customer-experience-solutions/\">them better experiences</a>. </li>\n<li><strong>Consent Management</strong>: It is another popular addition to the LoginRadius identity platform. The feature manages the consent of gamblers about data collection, storage, and communication. If need be, they can also <a href=\"https://www.loginradius.com/blog/2020/05/consent-management/\">change existing permissions</a>.  </li>\n</ul>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>Adhering to the COVID situation and keeping social distancing in mind, more and more people are turning to the multi-billion dollar gambling industry to find solace. Protecting online casinos, betting, and gambling site from malicious bots is a big deal. </p>\n<p>With the ongoing pandemic situation, gambling providers should primarily focus on ensuring that gambling is fair, crime-free, and protects minors. A <a href=\"https://www.loginradius.com/blog/identity/perfect-ciam-platform/\">CIAM platform</a> can help you tap all these touchpoints.</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-free-demo-loginradius\"\n        title=\"book-free-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"June 25, 2020","updated_date":null,"title":"Online Casino and Gambling Industry Is Gaining Momentum, So Is the Cyber Threat","tags":["security"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.408450704225352,"src":"/static/157f70b02980957b8bc5f126cabcac29/c3e3a/Online-Casino-and-Gambling-Industry.jpg","srcSet":"/static/157f70b02980957b8bc5f126cabcac29/f836f/Online-Casino-and-Gambling-Industry.jpg 200w,\n/static/157f70b02980957b8bc5f126cabcac29/2244e/Online-Casino-and-Gambling-Industry.jpg 400w,\n/static/157f70b02980957b8bc5f126cabcac29/c3e3a/Online-Casino-and-Gambling-Industry.jpg 769w","sizes":"(max-width: 769px) 100vw, 769px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},{"node":{"fields":{"slug":"/identity/identity-fraud-hits-time-high-2017/"},"html":"<p>Despite years of battling, and a massive change in the way American's use debit and credit cards, the rate of identity fraud has soared in 2017.</p>\n<p>According to Javelin Strategy &#x26; Research's annual <a href=\"https://www.javelinstrategy.com/coverage-area/2018-identity-fraud-fraud-enters-new-era-complexity\">Identity Fraud Study</a>, the number of identity fraud victims in the United States has increased by 8%.</p>\n<h3 id=\"key-highlights-from-the-study\" style=\"position:relative;\"><a href=\"#key-highlights-from-the-study\" aria-label=\"key highlights from the study permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Key Highlights from the Study</h3>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 399.8461538461538%; position: relative; bottom: 0; left: 0; background-image: url('data:image/jpeg;base64,/9j/2wBDABALDA4MChAODQ4SERATGCgaGBYWGDEjJR0oOjM9PDkzODdASFxOQERXRTc4UG1RV19iZ2hnPk1xeXBkeFxlZ2P/2wBDARESEhgVGC8aGi9jQjhCY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2NjY2P/wgARCABQABQDASIAAhEBAxEB/8QAGQAAAgMBAAAAAAAAAAAAAAAAAAUBAgME/8QAGQEAAgMBAAAAAAAAAAAAAAAAAQQAAgMF/9oADAMBAAIQAxAAAAG8zdjHMktVhdZVRhyJQzkOurGPIdQRuNbZ3TjkIVGUodO5kSf/xAAgEAACAgICAgMAAAAAAAAAAAAAAgETERIDFBAjISJB/9oACAEBAAEFAvUeozxEK8Tq8xW59o5HiRZzHYfHac7bmjY1k1kgx8FclTlTn74uYucvcrc0Yrc//8QAGhEAAgMBAQAAAAAAAAAAAAAAAAECEhMQEf/aAAgBAwEBPwFtnsu6M0ZmjNFYFYH/xAAaEQADAQEBAQAAAAAAAAAAAAAAAQITERAS/9oACAECAQE/AUpPmPcpMUbM2Z2jtH//xAAhEAACAQMDBQAAAAAAAAAAAAAAATIxM0ECESEQICJhkf/aAAgBAQAGPwK2i0iyiJFkDVw2n7E1g5Wxv4mCiIlCnZFkWRY+uDHwwRZFkWf/xAAkEAADAAEDAgcBAAAAAAAAAAAAAREhMUGRgdEQIFFhccHh8f/aAAgBAQABPyFX3xZanUbO6JDqpkDLLuN+7gSbKA1wQ9l3ZdRlqPQT0jItmcSeFwi+Y3MyLuMlo31E1OOeDSlKb5Rg8twn3lgUW9o9/gL8MU/pP4Z//9oADAMBAAIAAwAAABDr8nxY4L0r3//EABwRAAIBBQEAAAAAAAAAAAAAAAABYRARMVGh8P/aAAgBAwEBPxBHD4e7DTVNBEPcTEKIVw//xAAeEQACAAYDAAAAAAAAAAAAAAAAARARMWFxoUFR8P/aAAgBAgEBPxBqq2eZiadIJnL0XWLpLKMhlP/EACMQAQACAgEEAQUAAAAAAAAAAAEAESExYUFRcYGhEJHR8PH/2gAIAQEAAT8QStYHIJriHJjGrY51ErU95SgtCUJXSJW5mcjLeoxdPiOiEweo6S4Ctao+zrCLLktOt3OSte4hFxfpjqj5/mWJZdLEQuxDJZFJMPJLKam+iICwavsxw6qBYSb0LxBQ28iRtx8EOSh76+YB2X3DUCpklpOYoiOyl/TJLsMd8tzO85/ez//Z'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"infographic Final\"\n        title=\"infographic Final\"\n        src=\"/static/11b0b5d01c8069876bf81c96c26a4261/212bf/infographic-Final.jpg\"\n        srcset=\"/static/11b0b5d01c8069876bf81c96c26a4261/6aca1/infographic-Final.jpg 650w,\n/static/11b0b5d01c8069876bf81c96c26a4261/212bf/infographic-Final.jpg 768w,\n/static/11b0b5d01c8069876bf81c96c26a4261/7aec6/infographic-Final.jpg 2509w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<p><a href=\"https://www.loginradius.com/customer-identity/\">Learn more</a> about how LoginRadius can help secure your customers data.</p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"February 20, 2018","updated_date":null,"title":"Identity Fraud Hits All-Time High in 2017","tags":["security"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.408450704225352,"src":"/static/6cc2100b8314a62a057fdbf48b38a80d/c3e3a/identity-fraud-hits-time-high-2017.jpg","srcSet":"/static/6cc2100b8314a62a057fdbf48b38a80d/f836f/identity-fraud-hits-time-high-2017.jpg 200w,\n/static/6cc2100b8314a62a057fdbf48b38a80d/2244e/identity-fraud-hits-time-high-2017.jpg 400w,\n/static/6cc2100b8314a62a057fdbf48b38a80d/c3e3a/identity-fraud-hits-time-high-2017.jpg 769w","sizes":"(max-width: 769px) 100vw, 769px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},{"node":{"fields":{"slug":"/identity/phishing-for-identity/"},"html":"<p>Phishing attacks are on the rise, and they are unfortunately more sophisticated than ever.</p>\n<p>In the past, identity theft could be seen as a common subject in blockbusters or police drama TV series. Today, however, phishing is a reality that could affect anyone. </p>\n<p>So why are these types of attacks on the rise? After all, phishing is not exactly a new concept. </p>\n<p>The reason is they are incredibly profitable for the attackers.</p>\n<p><strong>The average data breach costs organizations <a href=\"https://www.ibm.com/security/data-breach\">$3.92 million</a>.</strong></p>\n<p>A Phishing attack can be a death blow for businesses that don't take the necessary precautions. Not only is the top-line affected, but the brand's image and trust can be obliterated if news of a data breach reaches the public. </p>\n<ul>\n<li>The healthcare industry saw the most breaches accounting for <a href=\"https://www.ibm.com/security/data-breach\">USD 7.13 million in 2020</a>.</li>\n<li>Incidents involving payment and invoice <a href=\"https://info.abnormalsecurity.com/Q2-2020-Quarterly-BEC-Report.html\">fraud increased by 112%</a> between Q1 2020 and Q2 2020.</li>\n<li><a href=\"https://enterprise.verizon.com/en-gb/resources/reports/dbir/\">96% of phishing attacks</a> arrive by email, 3% are carried out through malicious websites, and just 1% via phone.</li>\n<li>86% of breaches were financially motivated in 2020.</li>\n<li>43% of breaches were attacks on web applications in 2020. That's more than double the results from 2019.</li>\n</ul>\n<h2 id=\"what-is-phishing\" style=\"position:relative;\"><a href=\"#what-is-phishing\" aria-label=\"what is phishing permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is Phishing</h2>\n<p>Let's jump back to the beginning and answer the obvious question: What is a Phishing attack? </p>\n<p>A Phishing attack or scam is when an attacker sends an email pretending to be someone (for example, the CEO of an organization) or something he's not (for example, poses as Google). The goal is to extract sensitive information out of the target.</p>\n<p>Essentially, the <a href=\"https://www.loginradius.com/blog/identity/2019/01/how-do-i-know-if-my-email-has-been-leaked-in-a-data-breach/\">attacker attempts to create fear</a>, curiosity, or a sense of urgency. When the target is prompted to open an attachment or fill in their sensitive information (i.e., username, password, or credit card number), they are likely to give in.</p>\n<p>A few examples of phishing attacks include:</p>\n<ul>\n<li>Emails that appear to come from a legitimate source, like Amazon customer support or your bank.</li>\n<li>Phone calls that force victims to act immediately. </li>\n<li>Emails that include links to fake websites and the victim <a href=\"https://www.loginradius.com/blog/identity/2019/09/prevent-credential-stuffing-attacks/\">enter their credentials</a>.</li>\n<li>Emails appear to come from the victim's organization's human resources department and ask to update your details or install a new app on their system. </li>\n<li>Online advertisements that force the victim to click on a valid-looking link that redirects to a malicious website.</li>\n</ul>\n<h2 id=\"7-ways-to-detect-a-phishing-email---heres-how\" style=\"position:relative;\"><a href=\"#7-ways-to-detect-a-phishing-email---heres-how\" aria-label=\"7 ways to detect a phishing email   heres how permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>7 Ways to Detect a Phishing Email - Here's How</h2>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 66.15384615384615%; position: relative; bottom: 0; left: 0; background-image: url('data:image/jpeg;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"ways-detect-phishing-email\"\n        title=\"ways-detect-phishing-email\"\n        src=\"/static/f13c531c014027fd6922bc39d0b5464b/212bf/ways-detect-phishing-email.jpg\"\n        srcset=\"/static/f13c531c014027fd6922bc39d0b5464b/6aca1/ways-detect-phishing-email.jpg 650w,\n/static/f13c531c014027fd6922bc39d0b5464b/212bf/ways-detect-phishing-email.jpg 768w,\n/static/f13c531c014027fd6922bc39d0b5464b/72e01/ways-detect-phishing-email.jpg 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<h3 id=\"1-the-email-is-sent-from-a-public-domain\" style=\"position:relative;\"><a href=\"#1-the-email-is-sent-from-a-public-domain\" aria-label=\"1 the email is sent from a public domain permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. The email is sent from a public domain.</h3>\n<p>No legitimate organization will send you an email from an address ending with '@gmail.com.' No! Not even Google. </p>\n<p>Almost all organizations have their own email domain and company accounts from where they send out official messages. </p>\n<p>Therefore, before opening an email, ensure that the domain name (what follows after @) matches the sender.</p>\n<p>There is a catch, though. Hackers may try to mimic a real email. For example, if an address looks like 'paypal@notice-access-273.com', that is a red flag. </p>\n<p>A genuine email from PayPal will have PayPal in the domain name, i.e., after the @ symbol.</p>\n<h3 id=\"2-the-email-requests-your-sensitive-information\" style=\"position:relative;\"><a href=\"#2-the-email-requests-your-sensitive-information\" aria-label=\"2 the email requests your sensitive information permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. The email requests your sensitive information.</h3>\n<p>If you receive an anonymous email asking for sensitive information, chances are it's a scam. No companies will send you an email requesting passwords, credit card data, tax numbers, nor will they send you a login link. </p>\n<h3 id=\"3-the-email-has-terrible-grammar\" style=\"position:relative;\"><a href=\"#3-the-email-has-terrible-grammar\" aria-label=\"3 the email has terrible grammar permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3. The email has terrible grammar.</h3>\n<p>Bad grammar is one of the easiest ways to recognize a phishing email. Because the legitimate ones are always well-written with no lousy syntax, they are often written by professional writers who exhaustively check for spelling before sending them out. </p>\n<p>So, the next time you receive an email with strange phrases and poor language in the body of the message, it is actually a phish. </p>\n<h3 id=\"4-the-email-has-a-suspicious-attachment\" style=\"position:relative;\"><a href=\"#4-the-email-has-a-suspicious-attachment\" aria-label=\"4 the email has a suspicious attachment permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>4. The email has a suspicious attachment.</h3>\n<p>You should be alarmed if you receive an email containing an attachment from a company that you do not recognize or that you weren't expecting. A malicious URL or trojan may be included in the attachment. </p>\n<p>It's good practice always to scan it using antivirus software first, even if you believe the attachment is real. </p>\n<p><a href=\"https://www.loginradius.com/resource/passwords-are-dead/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"passwords-are-dead-whitepaper\"\n        title=\"passwords-are-dead-whitepaper\"\n        src=\"/static/ec2ad56abd855186e940b7173ae2e12e/e5715/passwords-are-dead-whitepaper.png\"\n        srcset=\"/static/ec2ad56abd855186e940b7173ae2e12e/a6d36/passwords-are-dead-whitepaper.png 650w,\n/static/ec2ad56abd855186e940b7173ae2e12e/e5715/passwords-are-dead-whitepaper.png 768w,\n/static/ec2ad56abd855186e940b7173ae2e12e/63ff0/passwords-are-dead-whitepaper.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<h3 id=\"5-the-message-has-made-you-panic\" style=\"position:relative;\"><a href=\"#5-the-message-has-made-you-panic\" aria-label=\"5 the message has made you panic permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>5. The message has made you panic.</h3>\n<p>Phishing emails are popular to incite fear in the recipient. The email can say that your account may have been compromised, and entering your login details is the only way to verify it. Alternatively, the email will state that your account will be closed if you do not respond immediately.</p>\n<p>In any case, contact the company through other methods before committing any action. </p>\n<h3 id=\"6-the-email-says-you-have-won-a-lottery\" style=\"position:relative;\"><a href=\"#6-the-email-says-you-have-won-a-lottery\" aria-label=\"6 the email says you have won a lottery permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>6. The email says you have won a lottery.</h3>\n<p>So, you received an email about winning a lottery, gift cards, or some new gadgets, but you do not remember buying tickets for it—that's definitely a scam. </p>\n<p>And when you open the message and click on a link, you will be redirected to a malicious website. </p>\n<h3 id=\"7-the-email-is-from-a-government-agency\" style=\"position:relative;\"><a href=\"#7-the-email-is-from-a-government-agency\" aria-label=\"7 the email is from a government agency permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>7. The email is from a government agency.</h3>\n<p>The government will never contact you directly. And most definitely, they won't engage in email-based harassment. Scammers send messages to victims claiming to be the IRS or the FBI demanding their personal information. </p>\n<p>Most of the IRS sends direct official letters to home addresses and do not send you an email or call you until you receive an official letter.</p>\n<p>Moving on. </p>\n<p>Phishing attacks may have a variety of targets depending on the attacker. They could be as generic as email phishing, looking to scam anyone who has a Facebook account, or could be extreme as targeting literally one victim. </p>\n<p><a href=\"https://enterprise.verizon.com/resources/reports/2019-data-breach-investigations-report.pdf\">Verizon statistics</a> show that 94% of malware attacks begin with phishing via email. </p>\n<p>We have hashed out the different types of phishing attacks. </p>\n<h2 id=\"what-are-the-common-types-of-phishing-attacks-and-how-to-prevent-them\" style=\"position:relative;\"><a href=\"#what-are-the-common-types-of-phishing-attacks-and-how-to-prevent-them\" aria-label=\"what are the common types of phishing attacks and how to prevent them permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What Are the Common Types of Phishing Attacks and How To Prevent Them</h2>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 60.61538461538461%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"types-of-phishing-attacks\"\n        title=\"types-of-phishing-attacks\"\n        src=\"/static/43c7aa65a6ff8e0feeb98994e1db43bb/e5715/types-of-phishing-attacks.png\"\n        srcset=\"/static/43c7aa65a6ff8e0feeb98994e1db43bb/a6d36/types-of-phishing-attacks.png 650w,\n/static/43c7aa65a6ff8e0feeb98994e1db43bb/e5715/types-of-phishing-attacks.png 768w,\n/static/43c7aa65a6ff8e0feeb98994e1db43bb/2bef9/types-of-phishing-attacks.png 1024w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<ul>\n<li>Spear Phishing</li>\n</ul>\n<p><a href=\"https://en.wikipedia.org/wiki/Phishing#Spear_phishing\">Spear phishing targets</a> a particular group or category of people, such as the organization's system administrators. Hackers customize their attack by sending emails with the target's name, work phone number, position, company, and other information to deceive the recipient and trick them into believing that the sender is genuine. </p>\n<p>They ask the victim to click on a malicious URL or email attachment and get hold of their sensitive data.</p>\n<p>Organizations should conduct employee security awareness training to defend against this type of scam. They should discourage employees from sharing personal or organizational details on social media. Companies should also invest in solutions that analyze identified malicious links/email attachments for inbound emails.</p>\n<ul>\n<li>Whaling</li>\n</ul>\n<p>Whaling is an even more focused form of phishing since it goes after the whales, the BIG fish within the <a href=\"https://www.loginradius.com/blog/identity/2020/09/consumer-identity-management-cmo-ciso-cio/\">industry like the CEO, CFO or CTO</a>. </p>\n<p>For example, c-suite executives might get an email stating that their company is being sued, and for more information, they need to click on the link. The link redirects them to a page where they enter all of their company's sensitive details like Social Security numbers, tax ID #, and bank account #s. </p>\n<p>Whaling attacks succeed because executives often do not engage with their staff in security awareness training. Organizations should mandate that all company employees, including executives, engage in safety awareness training on an ongoing basis to address the risks of CEO fraud and W-2 phishing.</p>\n<p>Organizations should also introduce multi-factor authentication (MFA) into their financial authorization processes so that no payment is authorized via email alone. </p>\n<ul>\n<li>Smishing and vishing</li>\n</ul>\n<p>Both smishing and vishing involve the use of phones instead of emails. Smishing involves sending text messages to the victim with messages to lure them in to share sensitive information. While hackers communicate via phone in vishing. </p>\n<p>A typical vishing scam involves a hacker posing as a fraud investigator telling the victim that their account has been compromised. The hacker would then ask the victim to provide their bank details to transfer money into a 'safer' account, the hacker's account. </p>\n<p>Stop answering calls from unknown phone numbers to defend against vishing attacks. Never give out private details over the phone and use a caller ID app. </p>\n<p>You can protect against smishing attacks by carefully observing <a href=\"https://www.loginradius.com/blog/identity/2020/12/how-to-stop-phone-hacking/\">unknown phone numbers</a> and if you have any doubt, reach out directly to the company that's mentioned in the message. </p>\n<ul>\n<li>Email phishing</li>\n</ul>\n<p>It is no secret that the majority of phishing attacks <a href=\"https://www.loginradius.com/blog/identity/2020/12/what-to-do-when-email-hacked/\">are sent by email</a>. Cybercriminals register fake domains that mimic a real organization and send out thousands of generic requests.</p>\n<p>They may use the name of the company in the email address like paypal@domainregistrar.com in the anticipation that the name of the sender would simply appear in the inbox of the recipient as 'PayPal'.</p>\n<p>There are many ways to spot a phishing email, but in general, always think before you click an email. Never click on suspicious links, download attachments, or share any sensitive information via email. </p>\n<ul>\n<li>Search engine phishing</li>\n</ul>\n<p>Also known as SEO poisoning or SEO trojans, search engine phishing is the type of phishing where hackers create a fake webpage by targeting specific keywords. When the victim lands on the webpage, they are redirected to the hacker's website.</p>\n<p>These websites could be anything. For example, if you are looking for a job, you may come across fake offers with non-existing companies. The application will require you to provide your personal data like bank details or insurance accounts. </p>\n<p>Remember, no company asks for personal details unless you are hired. Therefore, it is high time you start being cautious. </p>\n<p>Here are a few other guidelines to keep yourself safe from phishing attacks.</p>\n<ul>\n<li>New phishing attack methods are developed all the time. Therefore, keep yourself informed about the latest ones. </li>\n<li>Do not click on a link in an email or instant message unless you are sure that it is genuine.</li>\n<li>Download an anti-phishing toolbar that will alert you every time you are about to enter a known phishing site. </li>\n<li>Keep your browser up-to-date and check your online accounts regularly for traces of phishing attempts.</li>\n<li>Use high-quality firewalls as a shield between you, your computer, and outside intruders to reduce the odds of phishing attempts. </li>\n<li>Be cautious of pop-up windows as they often redirect to malicious websites. Do not click on the \"cancel\" button, as those buttons often lead to phishing sites. Click the tiny 'x' in the upper corner of the browser instead.</li>\n<li>Get into the habit of regularly <a href=\"https://www.loginradius.com/blog/identity/2021/01/how-to-choose-a-secure-password/\">changing your passwords</a> to lock out potential attackers.</li>\n<li>Do not share your personal information anywhere over the Internet. </li>\n<li>Train your employees to adopt the best anti-phishing practices.</li>\n</ul>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>Using the tips mentioned above, businesses will be able to identify some of the most common kinds of phishing attacks. But, that doesn't mean that you can spot every phish. It's a harsh reality that phishing is constantly evolving to adopt new techniques. </p>\n<p>With that in mind, you need to be on top of the game every single day. Keep on conducting <a href=\"https://www.loginradius.com/blog/identity/2019/10/cybersecurity-best-practices-for-enterprises/\">security awareness training</a> so that your employees and executives never fall prey. </p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAGCAYAAADDl76dAAAACXBIWXMAAAsSAAALEgHS3X78AAABdElEQVQY002RO0/CUBzFG6PtbZWHCAmRmBB5P8vDII9SSC0omog4oAEGjZMO6OKEuLjoJ2Fx0cSBwUQnXZxcHPwux38LJA7nNvfec8+5v1tOCCiwpbbhye2BxbYgBMtgIRVioDRRsARGXxZUzLlEHmehBaesQ4rrEMPViYf2DR9nDGKkChbVICVqsMt1WJI1sHCFwhUsUIFohJH49TxECvRUjhDW2mAbB5iP6hB8hUkhiRPN5KIZYJdrsEYrcCSpmQqMm6/m9ylUhSulY7N5ivROB3L9GOlGF3Ktbc4zuz341UPw/uIk0ESbBjoSGlYIx8BfzjSwVmyCEYEUUmCPa3Bnd+hwC75yC95S05SxbolU/iEbOCFCpDexEfIioTNCNd6Tp6IlMnNuGeeDe3z//OLx5RWj5zFGT2O8fXxh/P4Ja6w6vSEFCnTIlW2YiDzhzX7ATFKojDlvjpBPcDF4QPdyiG5/iE7/BmfXd+hd3VKpCoG8fzxWw2+c+yTpAAAAAElFTkSuQmCC'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-loginradius\"\n        title=\"book-a-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"February 13, 2018","updated_date":null,"title":"Phishing Attacks: How to Identify & Avoid Phishing Scams","tags":["security"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.408450704225352,"src":"/static/95a76cd39013c99382f929d1f1187775/9a31d/phishing-for-identity.jpg","srcSet":"/static/95a76cd39013c99382f929d1f1187775/f836f/phishing-for-identity.jpg 200w,\n/static/95a76cd39013c99382f929d1f1187775/2244e/phishing-for-identity.jpg 400w,\n/static/95a76cd39013c99382f929d1f1187775/9a31d/phishing-for-identity.jpg 767w","sizes":"(max-width: 767px) 100vw, 767px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}},{"node":{"fields":{"slug":"/identity/canada-to-fine-companies-for-not-reporting-data-breaches/"},"html":"<p>On Sept. 2, the Canadian Government announced an update to the <a href=\"https://laws-lois.justice.gc.ca/eng/annualstatutes/2015_32/page-1.html\">Digital Privacy Act (June 2015)</a> that will make it mandatory for all Canadian companies to report if their data has been breached. Currently, Alberta is the only province where companies are required to report breaches by law. This change makes this a requirement across the country.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 700px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 75.07692307692308%; position: relative; bottom: 0; left: 0; background-image: url('data:image/jpeg;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"Data Breach\"\n        title=\"Data Breach\"\n        src=\"/static/cc5bf441279823ec0b9cf145d6200a7c/29d31/05_aftermath-100703535-large.jpg\"\n        srcset=\"/static/cc5bf441279823ec0b9cf145d6200a7c/6aca1/05_aftermath-100703535-large.jpg 650w,\n/static/cc5bf441279823ec0b9cf145d6200a7c/29d31/05_aftermath-100703535-large.jpg 700w\"\n        sizes=\"(max-width: 700px) 100vw, 700px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span>Under the new proposed rules, any company that has a data breach will be required to do a risk assessment to determine if the breach poses a “Risk of significant harm”. If so, they’re required to notify all individuals that are affected and also report the breach to the Canadian Privacy Commissioner’s Office. </p>\n<p>A 2017 study by the Ponemon Institute found data breaches are most expensive in the United States and Canada. The average per capita cost of a data breach was $225 in the United States and $190 in Canada. However, because breach reporting is not mandatory, it’s difficult to get a full picture of the number of breaches. Still, over the last few years there have been a number of high profile <a href=\"https://www.loginradius.com/blog/identity/how-do-i-know-if-my-email-has-been-leaked-in-a-data-breach/\">data breaches</a> where the personal information of Canadians was stolen. It’s hoped that mandatory reporting will create an incentive for organizations to take information security more seriously.</p>\n<p><a href=\"https://www.loginradius.com/resource/the-ccpa-and-customer-identity\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAGCAYAAADDl76dAAAACXBIWXMAAAsSAAALEgHS3X78AAABWklEQVQY002QTUsCURSGhxY5X5FpCmPgR1rNOCpmOo7WaOagohVEQaQE0TJI2rSzNq36JdEmiDaFi4hWbtq1adFfeTtzdarFy/m49zznvZcTljfgSCRJKxZktQJJtcai2j13xCfKEPUtzJt78GfqEFI2eLUKYWkd/OQOx2A0GMjU4NMIGi9iJmHCn7QQzNrw6pvgaYBBKUppG+HaEXT7EFJxH550g/XZQoqcm8TMNkqdHrL1A/gJ7AnnIC0amE1W6ZxqcucjVxFzG8paE0q+hVCuMa4pdxgM6G5XyE200ETMaCGgVyBE85AnwN8n093gagOhQhvh0g4WjA7LnW9yOQwoUWNOs5gjkST9kwN0Bjgli7PBLT6/vvHw/Iq7xxfcPw3xNvrA8H0Eb6qG6Xj5D+hVyUWsAJH+0JVMch1ORQwUd08YtNe/Qvd8gG5/gNPLGxxfXEPWKvAQ6wfQn8CjOYwLfAAAAABJRU5ErkJggg=='); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"ccpa-customer-identity\"\n        title=\"ccpa-customer-identity\"\n        src=\"/static/277eebfdb42ba7a9547788e0c4bc7ae6/e5715/ccpa-customer-identity.png\"\n        srcset=\"/static/277eebfdb42ba7a9547788e0c4bc7ae6/a6d36/ccpa-customer-identity.png 650w,\n/static/277eebfdb42ba7a9547788e0c4bc7ae6/e5715/ccpa-customer-identity.png 768w,\n/static/277eebfdb42ba7a9547788e0c4bc7ae6/63ff0/ccpa-customer-identity.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<p>The consequences for organizations that decide not to comply with the new rules are two-fold. First of all is the public relations nightmare that occurs when knowledge of the breach eventually becomes public. Typically this comes in the form of loss of confidence in the brand and will result in loss of customers; up to a third of customers will leave after a breach. Second, are the fines for non-compliance under the proposed new rules; up to $10,000 for a summary offence and up to $100,000 for an indictable offence. </p>\n<p>To learn more about how LoginRadius can help you manage and secure your customer profile data, <a href=\"https://www.loginradius.com/contact-sales/\">contact us</a> to chat with a product specialist about your specific data security needs or visit our <a href=\"https://www.loginradius.com/data-management-and-governance/\">Data Management</a> page to learn more about how we secure your data.</p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"September 07, 2017","updated_date":null,"title":"Canada To Fine Companies For Not Reporting Data Breaches","tags":["security"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.3333333333333333,"src":"/static/cc5bf441279823ec0b9cf145d6200a7c/9a128/canada-to-fine-companies.jpg","srcSet":"/static/cc5bf441279823ec0b9cf145d6200a7c/f836f/canada-to-fine-companies.jpg 200w,\n/static/cc5bf441279823ec0b9cf145d6200a7c/2244e/canada-to-fine-companies.jpg 400w,\n/static/cc5bf441279823ec0b9cf145d6200a7c/9a128/canada-to-fine-companies.jpg 700w","sizes":"(max-width: 700px) 100vw, 700px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.jpg"}}}}]}},"pageContext":{"tag":"security"}},"staticQueryHashes":["1171199041","1384082988","2100481360","23180105","528864852"]}