{"componentChunkName":"component---src-templates-blog-list-template-js","path":"/107","result":{"data":{"allMarkdownRemark":{"edges":[{"node":{"excerpt":"HTTP (hypertext transfer protocol) is a communication protocol that transfers data between client and server. HTTP requests are very…","fields":{"slug":"/engineering/tune-the-go-http-client-for-high-performance/"},"html":"<p>HTTP (hypertext transfer protocol) is a communication protocol that transfers data between client and server. HTTP requests are very essential to access resources from the same or remote server. In Golang, the <code>net/http</code> package comes with the default settings that we need to adjust according to our high-performance requirement.</p>\n<p>For setting up HTTP clients for making requests, most programming languages have different frameworks in place. We will take a hands-on approach in the coming sections to explore how HTTP requests can be made in Golang or Go, as I will refer to the language for the rest of the post.</p>\n<p>While working on the <a href=\"https://www.loginradius.com/blog/engineering/golang-maps/\">Golang projects</a>, I realized that improper configuration of HTTP might crash your server anytime.</p>\n<p>In the time when I was working with HTTP Client, I Observed some problems and their solutions, listed below:</p>\n<h2 id=\"problem1-default-http-client\" style=\"position:relative;\"><a href=\"#problem1-default-http-client\" aria-label=\"problem1 default http client permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Problem:1 Default Http Client</h2>\n<p>The HTTP client does not contain the request timeout setting by default.\nIf you are using http.Get(URL) or &#x26;Client{} that uses the http.DefaultClient. DefaultClient has not timeout setting; it comes with <code>no timeout</code></p>\n<p>Suppose the Rest API where you are making the request is broken, not sending the response back that keeps the connection open. More requests came, and open connection count will increase, Increasing server resources utilization, resulting in crashing your server when resource limits are reached.</p>\n<h3 id=\"solution-dont-use-the-default-http-client-always-specify-the-timeout-in-httpclient-according-to-your-use-case\" style=\"position:relative;\"><a href=\"#solution-dont-use-the-default-http-client-always-specify-the-timeout-in-httpclient-according-to-your-use-case\" aria-label=\"solution dont use the default http client always specify the timeout in httpclient according to your use case permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Solution: Don't use the default HTTP client, always specify the timeout in http.Client according to your use case</h3>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"\" data-index=\"0\"><code class=\"grvsc-code\"><span class=\"grvsc-line\">var httpClient = &http.Client{</span>\n<span class=\"grvsc-line\">  Timeout: time.Second * 10,</span>\n<span class=\"grvsc-line\">}</span></code></pre>\n<p>For the Rest API, it is recommended that timeout should not more than 10 seconds.\nIf the Requested resource is not responded to in 10 seconds, the HTTP connection will be canceled with net/http: request canceled (Client.Timeout exceeded ...) error.</p>\n<h2 id=\"problem2-default-http-transport\" style=\"position:relative;\"><a href=\"#problem2-default-http-transport\" aria-label=\"problem2 default http transport permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Problem:2 Default Http Transport</h2>\n<p>By default, the Golang Http client performs the connection pooling. When the request completes, that connection remains open until the idle connection timeout (default is 90 seconds). If another request came, that uses the same established connection instead of creating a new connection, after the idle connection time, the connection will return to the pool.</p>\n<p>Using the connection pooling will keep less connection open and more requests will be served with minimal server resources.</p>\n<p>When we not defined transport in the http.Client, it uses the default transport <a href=\"https://golang.org/src/net/http/transport.go\">Go HTTP Transport</a></p>\n<p>Default configuration of the HTTP Transport, </p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"\" data-index=\"1\"><code class=\"grvsc-code\"><span class=\"grvsc-line\">var DefaultTransport RoundTripper = &Transport{</span>\n<span class=\"grvsc-line\">\t...</span>\n<span class=\"grvsc-line\">\tMaxIdleConns:          100,</span>\n<span class=\"grvsc-line\">\tIdleConnTimeout:       90 * time.Second,</span>\n<span class=\"grvsc-line\">\t...</span>\n<span class=\"grvsc-line\">}</span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\">const DefaultMaxIdleConnsPerHost = 2</span></code></pre>\n<p>MaxIdleConns is the connection pool size, and this is the maximum connection that can be open; its default value is 100 connections.</p>\n<p>There is problem with the default setting <code>DefaultMaxIdleConnsPerHost</code> with value of 2 connection,\nDefaultMaxIdleConnsPerHost is the number of connection can be allowed to open per host basic.\nMeans for any particular host out of 100 connection from the connection pool only two connection will be allocated to that host.</p>\n<p>With the more request came, it will process only two requests; other requests will wait for the connection to communicate with the host server and go in the <code>TIME_WAIT</code> state. As more request came, increase the connection to the <code>TIME_WAIT</code> state and increase the server resource utilization; at the limit, the server will crash.</p>\n<h3 id=\"solution-dont-use-default-transport-and-increase-maxidleconnsperhost\" style=\"position:relative;\"><a href=\"#solution-dont-use-default-transport-and-increase-maxidleconnsperhost\" aria-label=\"solution dont use default transport and increase maxidleconnsperhost permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Solution: Don't use Default Transport and increase MaxIdleConnsPerHost</h3>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"\" data-index=\"2\"><code class=\"grvsc-code\"><span class=\"grvsc-line\">t := http.DefaultTransport.(*http.Transport).Clone()</span>\n<span class=\"grvsc-line\">t.MaxIdleConns = 100</span>\n<span class=\"grvsc-line\">t.MaxConnsPerHost = 100</span>\n<span class=\"grvsc-line\">t.MaxIdleConnsPerHost = 100</span>\n<span class=\"grvsc-line\">\t</span>\n<span class=\"grvsc-line\">httpClient = &http.Client{</span>\n<span class=\"grvsc-line\">  Timeout:   10 * time.Second,</span>\n<span class=\"grvsc-line\">  Transport: t,</span>\n<span class=\"grvsc-line\">}</span></code></pre>\n<p>By increasing connection per host and the total number of idle connection, this will increase the performance and serve more request with minimal server resources.</p>\n<p>Connection pool size and connection per host count can be increased as per server resources and requirements.</p>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>In this article, we discussed the problems around the 'net/http' client default configurations. By changing some of the default settings of HTTP Client, we can achieve a High-performance HTTP client for production use. If you want to learn more about http, here is an interesting post on <a href=\"https://www.loginradius.com/blog/engineering/http-security-headers/\">HTTP security headers</a> If you like what you read, share your thoughts in the comment section.</p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n  .dark-default-dark {\n    background-color: #1E1E1E;\n    color: #D4D4D4;\n  }\n</style>","frontmatter":{"date":"January 12, 2021","updated_date":null,"description":"In this post, we will discuss how to make HTTP requests for higher performance in Go, and also how to tune it.","title":"How to Use the HTTP Client in GO To Enhance Performance","tags":["Golang","HTTP","Performance"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.7699115044247788,"src":"/static/2aae63044134172737715b9d1801c174/58556/index.webp","srcSet":"/static/2aae63044134172737715b9d1801c174/61e93/index.webp 200w,\n/static/2aae63044134172737715b9d1801c174/1f5c5/index.webp 400w,\n/static/2aae63044134172737715b9d1801c174/58556/index.webp 800w,\n/static/2aae63044134172737715b9d1801c174/99238/index.webp 1200w,\n/static/2aae63044134172737715b9d1801c174/135cd/index.webp 1280w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Mayank Agarwal","github":"mayankagrwal","avatar":null}}}},{"node":{"excerpt":"Introduction How to set up 2FA on your accounts? And why is it important in the first place? As social media is becoming increasingly…","fields":{"slug":"/identity/how-to-setup-2fa-in-online-accounts/"},"html":"<h2 id=\"introduction\" style=\"position:relative;\"><a href=\"#introduction\" aria-label=\"introduction permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Introduction</h2>\n<p>How to set up 2FA on your accounts? And why is it important in the first place? As social media is becoming increasingly popular, security is becoming something of supreme importance. </p>\n<p>Even though choosing a <a href=\"https://www.loginradius.com/blog/identity/2021/01/how-to-choose-a-secure-password/\">strong password</a> helps you in certain ways, by adopting 2FA, you can improve and enhance security further. So, let's know more about this extra layer of protection and how to set up 2FA on your accounts. </p>\n<p>First stop. </p>\n<h2 id=\"what-is-two-factor-authentication\" style=\"position:relative;\"><a href=\"#what-is-two-factor-authentication\" aria-label=\"what is two factor authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>What is Two-Factor Authentication?</strong></h2>\n<p>2FA is one of the best security methods that use two layers to verify a consumer's identity. This means, rather than simply entering the password to log into an account, two-factor authentication requires a code to be sent via text message to the consumer's phone number or generated through an app.</p>\n<p>This type of verification code helps and ensures that only the authorized consumer can access their account. Similarly, <a href=\"https://www.loginradius.com/blog/identity/2019/06/what-is-multi-factor-authentication/\">multi-factor authentication (MFA)</a> offers two or more authentication layers to approve account access for consumers. </p>\n<h2 id=\"types-of-2fa-methods\" style=\"position:relative;\"><a href=\"#types-of-2fa-methods\" aria-label=\"types of 2fa methods permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Types of 2FA Methods</h2>\n<p>SMS Verification is one of the most common forms of 2FA. It involves sending a one-time code via text message to the user's registered phone number. While widely accessible and requiring no internet connection, it is vulnerable to SIM swapping attacks and relies on the reliability of the cellular network.</p>\n<p>Authenticator Apps, such as Google Authenticator, Microsoft Authenticator, and Authy, generate time-based codes for authentication. These apps provide offline functionality, making them useful in areas with no network coverage. They are also less susceptible to phishing attacks compared to SMS. However, they require installation and setup on a smartphone, and there is a risk of losing access if the device is lost or reset.</p>\n<p>Hardware Tokens, like YubiKey or RSA SecurID, are physical devices that generate codes for authentication. They offer a high level of security since they are not connected to the internet, providing protection against phishing attacks. However, they can be costly to implement for individuals, and there is a risk of losing the hardware token.</p>\n<p>Biometric Authentication uses features like fingerprint, face, or iris scans for verification. It offers convenience and a high level of security. However, it requires compatible devices and there is a risk of compromising biometric data.</p>\n<p>Backup Codes are pre-generated codes used as a backup when the primary 2FA method is unavailable. They provide access in emergencies but are limited in use and must be securely stored to prevent unauthorized access.</p>\n<h2 id=\"what-are-authenticator-apps\" style=\"position:relative;\"><a href=\"#what-are-authenticator-apps\" aria-label=\"what are authenticator apps permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>What are Authenticator Apps?</strong></h2>\n<p>Authenticator apps are meant to be installed on your smartphones to obtain passcodes to sign in to your accounts. They are intended to be more secure than texting; they provide<a href=\"https://www.loginradius.com/blog/identity/2018/12/use-multi-factor-authentication-dont-cell-phone-access/\"> flexibility if you are traveling to a place where there is no mobile service</a>.</p>\n<p>Some of the options include <a href=\"https://support.google.com/accounts/answer/1066447\">Google Authenticator</a>, <a href=\"https://authy.com/guides/microsoft/\">Microsoft Authenticator Authy</a>, or HDE OTP. </p>\n<p>All these apps follow the same procedure - when you are adding a new user account, you need to scan a QR code associated with the account, and it is saved in the app. </p>\n<p>The next time you sign in to your app or service, it will ask for a numerical code. You need to open up the authenticator app and check the randomly generated authentication code to access your account securely.</p>\n<h2 id=\"how-to-set-up-2fa-on-your-social-media-accounts\" style=\"position:relative;\"><a href=\"#how-to-set-up-2fa-on-your-social-media-accounts\" aria-label=\"how to set up 2fa on your social media accounts permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>How to Set up 2FA on Your Social Media Accounts?</strong></h2>\n<p><img src=\"/e37d1fb37e7e56273ae71218038fa100/how-to-set-up-2fa-on-your-social-media-accounts.webp\" alt=\"how-to-set-up-2fa-on-your-social-media-accounts\"></p>\n<p>A lot of applications offer 2FA currently, especially if you are storing important and sensitive data, financial information, emails, social media, files, contact details, etc. </p>\n<p>2FA needs more than one factor to login. This might include parameters like \"something you are,\" for example, biometrics in the form of iris scan or fingerprints, \"something you know,\" a password, and \"something you have,\" like a smartphone or hardware key. </p>\n<p>Find out how to set up 2FA on your accounts: </p>\n<h3 id=\"1-google\" style=\"position:relative;\"><a href=\"#1-google\" aria-label=\"1 google permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. Google</h3>\n<p>If you want to set up an authenticator on the Google account, first you need to download the Google Authenticator app available on the Play Store. Once downloaded, do the following:</p>\n<ul>\n<li>Go to Gmail and click the profile icon.</li>\n<li>Choose My account and click on Sign-in &#x26; Security. </li>\n</ul>\n<p>You can add the two-<strong>step verification</strong> process here.</p>\n<p><img src=\"/d315dbd0685e0bbf8d3d63728b462419/how-to-setup-2fa-in-google.webp\" alt=\"how-to-setup-2fa-in-google\"></p>\n<p>Source: Google</p>\n<h3 id=\"2-snapchat\" style=\"position:relative;\"><a href=\"#2-snapchat\" aria-label=\"2 snapchat permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. Snapchat</h3>\n<p>To set up 2FA on your Snapchat account, you will need to:</p>\n<ul>\n<li>Go to the app’s main camera screen and tap on the profile icon. </li>\n<li>Find the gear icon to access Settings.</li>\n<li>Tap on Two-Factor Authentication and choose whether to obtain verification via a text message or an authenticator app. </li>\n</ul>\n<p>You can add trusted devices or request a recovery code for when you intend to be somewhere without cellular coverage once 2FA has been activated on your Snapchat account. Safety key logins do not currently appear to be supported by Snapchat.</p>\n<h3 id=\"3-whatsapp\" style=\"position:relative;\"><a href=\"#3-whatsapp\" aria-label=\"3 whatsapp permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3. Whatsapp</h3>\n<p>To set up 2FA on your WhatsApp account, you will need to:</p>\n<ul>\n<li>Open WhatsApp on your device. </li>\n<li>Under the upper-right hamburger icon, find the Settings menu.</li>\n<li>Go to Look under Account > Two-step verification > Allow.</li>\n<li>You will be prompted to end a six-digit PIN to verify your account. If you forget your PIN, you can optionally add an email address.  </li>\n</ul>\n<p><img src=\"/39ac35cedabcd4630787872ba5f05da5/how-to-set-up-2fa-in-whatsapp.webp\" alt=\"how-to-set-up-2fa-in-whatsapp\"></p>\n<p>Source: lifewire</p>\n<p>It is important to have an associated email with your WhatsApp account as the service will not allow you to reverify yourself if you have used WhatsApp and forgotten your PIN within the last seven days. </p>\n<h3 id=\"4-outlook\" style=\"position:relative;\"><a href=\"#4-outlook\" aria-label=\"4 outlook permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>4. Outlook</h3>\n<p>To set up 2FA on your Outlook account, you will need to:</p>\n<ul>\n<li>Sign in to your Outlook account.</li>\n<li>Click on your name and then click View Account. </li>\n<li>Under the Basic Options, click on the link that says Explore more security options.</li>\n</ul>\n<p>If you have not set up 2FA yet, you can click on the link and proceed with that. You can switch to Microsoft Authenticator by clicking the Set up identity verification app if you already have it.</p>\n<h3 id=\"5-facebook\" style=\"position:relative;\"><a href=\"#5-facebook\" aria-label=\"5 facebook permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>5. Facebook</h3>\n<p>To set up 2FA on your Facebook account, you will need to:</p>\n<ul>\n<li>Sign in to your Facebook account.</li>\n<li>Click on Settings and choose Security and Login.</li>\n<li>Check for the use of two-factor authentication in the Setting Up Extra Security section. </li>\n<li>Enable the code generator.</li>\n</ul>\n<p>You can also use the Facebook mobile app for approving sign-ins on the web or set up a third-party authentication app for generating codes.</p>\n<p><img src=\"/eb68612c11a3ca42e9eb551f00d19ef5/how-to-set-up-2fa-in-facebook.webp\" alt=\"how-to-set-up-2fa-in-facebook\" title=\"image_tooltip\"></p>\n<p>Source: Facebook</p>\n<h3 id=\"6-twitter\" style=\"position:relative;\"><a href=\"#6-twitter\" aria-label=\"6 twitter permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>6. Twitter</h3>\n<p>To set up 2FA on your Twitter account, you will need to:</p>\n<ul>\n<li>Sign in to your Twitter account.</li>\n<li>Click on your Profile Icon and then click Settings and Privacy.</li>\n<li>Click the checkbox next to Verify login requests, under the Security heading.</li>\n<li>Verify your mobile number and then click Set up a code generator app. </li>\n<li>Scan the QR code with the third-party authenticator app. </li>\n</ul>\n<p><img src=\"/2b7d47441c9592473ead62eec3bc328e/how-to-set-up-2fa-in-twitter.webp\" alt=\"how-to-set-up-2fa-in-twitter\"></p>\n<h3 id=\"7-apple-icloud\" style=\"position:relative;\"><a href=\"#7-apple-icloud\" aria-label=\"7 apple icloud permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>7. Apple iCloud</h3>\n<ul>\n<li>You can log in to your account at <a href=\"https://appleid.apple.com/\">appleid</a>, then search for Two-Factor Authentication under Security.</li>\n<li>The next step would be to verify your location, and it will send a code to your other Apple devices.</li>\n<li><strong>iOS</strong></li>\n</ul>\n<p>To set up 2FA on your iOS account, the steps will be a bit different. Majorly, it will depend on how you have updated your iOS software. </p>\n<ul>\n<li>For users using iOS 10.3 or later versions, click on Settings > your Name > Password &#x26; Security. </li>\n<li>You can turn on 2FA to receive a text message with a code every time you log in. </li>\n</ul>\n<p>For users using iOS 10.2 or earlier versions, go to Settings under iCloud > Apple ID > Password &#x26; Security.</p>\n<ul>\n<li><strong>macOS</strong></li>\n</ul>\n<p>Similar to iOS, a few of the steps may vary depending on the version of macOS.</p>\n<ul>\n<li>If you are using Catalina, click the Apple icon, then click System Preferences > Apple ID. </li>\n<li>The next step would be to click on Password &#x26; Security under your name and finally click Turn On Two-Factor Authentication.</li>\n</ul>\n<h3 id=\"8-instagram\" style=\"position:relative;\"><a href=\"#8-instagram\" aria-label=\"8 instagram permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>8. Instagram</h3>\n<p>In 2017, two-factor authentication was added by Instagram to the mobile app, which can be activated via the web. If you want to activate 2FA on your mobile device, you need to go to Profile and click on the menu and look for Settings &#x26; Security. There you will find two-factor authentication. </p>\n<p>With Instagram, you also get to choose between SMS-based verification and a code sent to the authentication app. </p>\n<p><img src=\"/060fc08c13c80a32d15c7ce396d7cee9/how-to-set-up-2fa-in-instagram.webp\" alt=\"how-to-set-up-2fa-in-instagram\" title=\"image_tooltip\"></p>\n<p>Source: Kaspersky</p>\n<h2 id=\"why-is-2fa-important\" style=\"position:relative;\"><a href=\"#why-is-2fa-important\" aria-label=\"why is 2fa important permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>Why is 2FA important?</strong></h2>\n<p>As cybercriminals are getting smarter, 2FA has become more mandatory than ever. Without it, you might end up leaving your <a href=\"https://www.loginradius.com/blog/identity/2020/12/login-security/\">accounts vulnerable to hackers</a> for sealing your personal information, hacking your online credit card details, and accessing your bank account. By adding the additional step to your account, you get the edge to prevent hackers from accessing your account. </p>\n<h2 id=\"common-2fa-mistakes-to-avoid\" style=\"position:relative;\"><a href=\"#common-2fa-mistakes-to-avoid\" aria-label=\"common 2fa mistakes to avoid permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Common 2FA Mistakes to Avoid</h2>\n<p>Using SMS as the Sole Method is a common mistake, as SMS codes are vulnerable to interception through SIM swapping attacks. It is advised to use authenticator apps or hardware tokens for added security.</p>\n<p>Not Storing Backup Codes Securely renders them useless if lost or compromised. It is crucial to store backup codes in a secure location, such as a password manager or a locked safe.</p>\n<p>Using Predictable Codes is another mistake, as codes generated by apps can be predictable if not set up correctly. It is important to ensure apps are configured for random, time-based codes rather than sequential ones.</p>\n<p>Ignoring Biometric 2FA Options is a missed opportunity for added security. Biometric methods offer high security but may not be utilized if available on devices.</p>\n<p>Sharing 2FA Codes undermines the purpose of 2FA. Users should be educated not to share codes with anyone, including family and friends, to maintain security.</p>\n<h2 id=\"comparison-of-popular-authenticator-apps\" style=\"position:relative;\"><a href=\"#comparison-of-popular-authenticator-apps\" aria-label=\"comparison of popular authenticator apps permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Comparison of Popular Authenticator Apps</h2>\n<p>Google Authenticator is known for its simple setup with QR codes and offline functionality. However, it lacks backup or sync options and does not support multi-device use.</p>\n<p>Microsoft Authenticator supports both Microsoft accounts and third-party apps. It offers cloud backup for easy recovery. However, it requires a Microsoft account and may not be as straightforward for non-Microsoft services.</p>\n<p>Authy provides multi-device support and offers cloud backup and sync for easy recovery. However, it requires an account for backup, and some users prefer fully offline solutions.</p>\n<p>HDE OTP (One-Time Password) is secure and easy-to-use, working offline for added convenience. However, it is less widely adopted than other options and offers limited additional features.</p>\n<p>YubiKey, a Hardware Token, boasts high-security standards and does not rely on mobile devices. However, it can be costly for individual users and poses a risk of being lost or damaged.</p>\n<p>Users can consider these factors when choosing the most suitable authenticator app based on their needs for security, convenience, and compatibility with various services.</p>\n<h2 id=\"setting-up-2fa-login-with-loginradius-adaptive-2fa-mfa-solution\" style=\"position:relative;\"><a href=\"#setting-up-2fa-login-with-loginradius-adaptive-2fa-mfa-solution\" aria-label=\"setting up 2fa login with loginradius adaptive 2fa mfa solution permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>Setting Up 2FA Login with LoginRadius Adaptive 2FA/ MFA solution</strong></h2>\n<p><img src=\"/6ab433d25be7ff28d21a54b8139febf2/setting-up-2fa-with-loginradius.webp\" alt=\"setting-up-2fa-with-loginradius\"></p>\n<p>LoginRadius provides multi-factor authentication via SMS, email, automated phone calls, account <a href=\"https://www.loginradius.com/blog/identity/2019/01/best-practices-choosing-good-security-questions/\">security questions</a>, and authenticator apps to allow you a customized user experience.  </p>\n<p>Based on your business, you can choose to use LoginRadius's Identity Platform's Multi-factor authentication, which is an easy process. </p>\n<p>Currently, LoginRadius provides its support authentication methods via SMS workflow and Google Authenticator workflow.</p>\n<h3 id=\"for-sms-workflow\" style=\"position:relative;\"><a href=\"#for-sms-workflow\" aria-label=\"for sms workflow permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>For SMS Workflow</h3>\n<p>You can enable 2FA <a href=\"https://www.loginradius.com/docs/api/v2/customer-identity-api/multi-factor-authentication/sms-authenticator/mfa-validate-otp/\">SMS verification</a> from the LoginRadius admin console. There's also an option to choose your preferred SMS template and SMS provider.</p>\n<p>As the first step, you'll need to apply a first verification factor, like standard email and password login, username and password, automated phone call, or access token. The second factor can be a one-time password or code sent via SMS. </p>\n<p><a href=\"https://www.loginradius.com/resource/ebook/buyers-guide-to-multi-factor-authentication/\"><img src=\"/6189ed241659d7be186ca0c44dd9e974/buyer-guide-to-multi-factor-authentication-ebook.webp\" alt=\"buyer-guide-to-multi-factor-authentication-ebook\"></a></p>\n<h3 id=\"google-authenticator-workflow\" style=\"position:relative;\"><a href=\"#google-authenticator-workflow\" aria-label=\"google authenticator workflow permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Google Authenticator Workflow</h3>\n<p>For enabling Google Authenticator, the <a href=\"https://www.loginradius.com/integrations/google-authenticator/\">first step will be</a> to set up your ID in the admin console for Google to identify your website or application on the authenticator.</p>\n<p>Next, you will need to set up your QR code specifications or make MFA mandatory. </p>\n<p>Similar to the SMS workflow, you can select standard email and password login, username, password, automated phone call, or access token as the verification factor.</p>\n<h2 id=\"final-thoughts\" style=\"position:relative;\"><a href=\"#final-thoughts\" aria-label=\"final thoughts permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Final Thoughts</h2>\n<p>With <a href=\"https://www.loginradius.com/blog/identity/2019/10/cybersecurity-attacks-business/\">cybercrimes on the rise</a>, it is essential to make your online security measures more robust. Hence, to protect your account and the history, you need to learn how to set up 2fa login on your accounts for an additional safety cover. It not only protects your online social accounts but other accounts as well.</p>\n<h2 id=\"faqs\" style=\"position:relative;\"><a href=\"#faqs\" aria-label=\"faqs permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>FAQs</h2>\n<p><strong>1. How do I enable 2FA login?</strong></p>\n<p>2FA login can be enabled once you have a reliable identity management solution. In the system dashboard, under authentication, you can find 2FA and enable the same.</p>\n<p><strong>2. How do I activate my 2FA code?</strong></p>\n<p>Choose your method (SMS or authenticator app) during setup, then link the code to your account.</p>\n<p><strong>3. What is 2FA and how do you set it up?</strong></p>\n<p>2FA adds a second verification step (like a code from an app). Set it up by downloading an authenticator app, scanning a QR code, and entering the code generated.</p>\n<p><strong>4. Is 2FA easy to use?</strong></p>\n<p>Yes, 2FA is user-friendly. It involves entering a code or approving a notification on your phone during logins.</p>\n<p><a href=\"https://www.loginradius.com/contact-us?utm_source=blog&#x26;utm_medium=web&#x26;utm_campaign=how-to-setup-2fa-in-online-accounts\"><img src=\"/8fce571f703a5970dbb1359a2fe0e51a/book-a-demo-loginradius.webp\" alt=\"book-a-demo-loginradius\"></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"January 12, 2021","updated_date":null,"description":"2FA is one of the best security methods that use two layers to verify a consumer’s identity. This means, rather than simply entering the password to log into an account, two-factor authentication requires a code to be sent via text message to a consumer's phone number or generated through an app","title":"How to Set Up Two-factor Authentication on All Your Online Accounts?","tags":["2fa","mfa","cx"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.408450704225352,"src":"/static/7633d1f15469d3c7adb2d4be805f653e/176df/how-to-setup-2fa-online-accounts.webp","srcSet":"/static/7633d1f15469d3c7adb2d4be805f653e/61e93/how-to-setup-2fa-online-accounts.webp 200w,\n/static/7633d1f15469d3c7adb2d4be805f653e/1f5c5/how-to-setup-2fa-online-accounts.webp 400w,\n/static/7633d1f15469d3c7adb2d4be805f653e/176df/how-to-setup-2fa-online-accounts.webp 767w","sizes":"(max-width: 767px) 100vw, 767px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.webp"}}}},{"node":{"excerpt":"Fundamentally, digital transformation is the accumulation of modern tools and processes to solve market challenges and provides…","fields":{"slug":"/identity/what-is-digital-transformation/"},"html":"<p>Fundamentally, digital transformation is the accumulation of modern tools and processes to solve market challenges and provides possibilities for upbeat consumer intimacy.</p>\n<p>When it comes to businesses, every era brings its own <em>buzzword</em>. </p>\n<p>For example, for the '90s, it was the internet. Towards the beginning of this century, it was social media. And now, it's digital transformation. </p>\n<p>Companies need to gear up and leverage technologies to satisfy their employees and consumers today. </p>\n<p>We can further gauge the importance of organizations having to invest in new-age transformation, when former Executive Chairman of Cisco System, <a href=\"https://www.linkedin.com/in/johnchambersjc?challengeId=AQGj82b-dklBrwAAAXbhY6du4U1xpb-eEQscCsXGTjVf1-tgV8O429bPJ6qulSCN0WBxVHl9o5Yd8iLIunNKF65tAy_kvO9Jzg&#x26;submissionId=e49444cc-aa38-5816-7489-798dda357e18\">John Chambers</a> stated, \"At least 40% of all businesses will die by 2025, if they don't figure out how to change their entire company to accommodate new technologies.\" </p>\n<p>But despite such affirmatives, digital transformation has a long way to go. In this blog, we have summarized its importance for organizations, what has changed during the pandemic, and what to look forward to in 2021. </p>\n<p>Let's start with the definition.</p>\n<h2 id=\"what-is-digital-transformation\" style=\"position:relative;\"><a href=\"#what-is-digital-transformation\" aria-label=\"what is digital transformation permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is Digital Transformation</h2>\n<p>Digital transformation is the process of leveraging digital technology to develop new business processes and consumer experiences to meet the changing market dynamics or to alter the existing ones. </p>\n<p>Beyond that, it is also an aggregation of cultural change that expects companies to experiment often and not get demotivated when new practices and not accepted in public. </p>\n<p>However, note that every company reimagines transformation differently. It isn't easy to define a concept that applies to all. </p>\n<p>You can start by outlining your organization's problem statement, opportunities, and goals. In most cases, that revolves around:</p>\n<ul>\n<li>Utilizing digital technologies</li>\n<li>Reducing friction</li>\n<li>Increasing productivity</li>\n<li>Improving consumer experience </li>\n<li>Elevating the scope of profitability</li>\n</ul>\n<p>Digital transformation is interconnected. One innovation leads to another. So when process improvements happen, it leads to better product and service gains. When consumers grow accustomed to those changes, they demand more, and the cycle continues.</p>\n<p>All-in-all, you need to understand what digital transformation really means for your organization and what you should do to articulate it.</p>\n<h2 id=\"why-is-digital-transformation-crucial-for-enterprises\" style=\"position:relative;\"><a href=\"#why-is-digital-transformation-crucial-for-enterprises\" aria-label=\"why is digital transformation crucial for enterprises permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Why is Digital Transformation Crucial for Enterprises</h2>\n<p><a href=\"https://www.loginradius.com/blog/identity/2018/11/enterprise-needs-digital-business-transformation-strategy/\">Organizations may idealize</a> digital transformation for many reasons. But the most likely explanation has to be <em>survival</em>. </p>\n<p>Think of it this way. The more simplicity you bring for consumers, the more likely are your chances of survival. </p>\n<p>The <a href=\"https://info.themanufacturer.com/amr-2020\">Annual Manufacturing Report 2020</a> showcases that senior manufacturing executives are clearly prioritizing digital transformation. The finding shows: </p>\n<ul>\n<li>87% of companies prefer digital technologies for future prosperity.</li>\n<li>89% of companies acknowledge how digital technologies improve their inbound and outbound supply chain relationships.</li>\n<li>91% of companies agree that digitalization has made their employees more productive.</li>\n<li>87% of companies find that digital technology has further accelerated innovation. </li>\n<li>66% of companies are already considering cloud computing, and 63% are inclining towards automation. </li>\n<li>Almost one in two businesses are implementing some form of cybersecurity policies. </li>\n</ul>\n<p>The world of business is changing. Organizations are willing to experiment, adopt, and adapt to new technologies. </p>\n<p>So, where do you stand? Are you still going traditional? </p>\n<p>Are you developers migrating to the cloud environment? Are you already making technological decisions? Or are you still waiting for a wake-up call? </p>\n<p>Wherever you are... START! </p>\n<h2 id=\"has-digital-transformation-changed-with-the-covid-19-pandemic\" style=\"position:relative;\"><a href=\"#has-digital-transformation-changed-with-the-covid-19-pandemic\" aria-label=\"has digital transformation changed with the covid 19 pandemic permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Has Digital Transformation Changed With the COVID-19 Pandemic</h2>\n<p><img src=\"/9651bde62b52ab9214c352d8c1531fb8/digital-transformation-changed-with-covid-19-pandemic.webp\" alt=\"digital-transformation-changed-with-covid-19-pandemic\"></p>\n<p>The answer is <em>yes</em>. The COVID-19 pandemic has pushed businesses over the \"technology\" edge forever. </p>\n<p>According to <a href=\"https://www.mckinsey.com/business-functions/strategy-and-corporate-finance/our-insights/how-covid-19-has-pushed-companies-over-the-technology-tipping-point-and-transformed-business-forever#\">McKinsey Global Survey</a>, the virus has accelerated the digitization of consumer and supply-chain interactions by three to four years. Also, the share of companies digitally-enabling product manufacture has accelerated by seven years.</p>\n<p>The survey also shows that the rates of digital adoption are three times likelier now than before the crisis.</p>\n<p><img src=\"/d95788af09734c4e2d296eb89a14161e/covid-19-stats-digital-transformation.webp\" alt=\"covid-19-stats-digital-transformation\"></p>\n<p>Source: Mckinsey</p>\n<p>Needless-to-say, the global pandemic has exposed the clear digital divide between companies across the globe. </p>\n<p>On one side, some businesses have invested in digital enablement as part of their <a href=\"https://www.loginradius.com/blog/identity/2020/03/loginradius-business-continuity-covid-19-outbreak/\">continuity plan</a> (and fared with almost zero setbacks). On the other side, there are those companies that are struggling to achieve the bare minimum. </p>\n<h2 id=\"what-will-the-structure-for-digital-transformation-look-like-in-2021\" style=\"position:relative;\"><a href=\"#what-will-the-structure-for-digital-transformation-look-like-in-2021\" aria-label=\"what will the structure for digital transformation look like in 2021 permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What Will the Structure for Digital Transformation Look Like in 2021</h2>\n<p>Looking ahead to 2021, digital transformation is set to <a href=\"/blog/growth/4-things-consider-starting-digital-transformation/\">become a crucial topic of discussion</a> in all boardrooms. </p>\n<p>Speaking of the positives, <a href=\"https://www.mckinsey.com/~/media/McKinsey/Industries/Retail/Our%20Insights/Perspectives%20on%20retail%20and%20consumer%20goods%20Number%208/Perspectives-on-Retail-and-Consumer-Goods_Issue-8.pdf\">63% of the McKinsey survey</a> respondents were affirmative that countries will pick up pace after the setback of 2020 and do better six months from now. </p>\n<p>Meanwhile, the global outlook has also bounced back. </p>\n<p>As businesses race to adjust to the new normal, we anticipate the following parameters to play out exceptionally on the global canvas. </p>\n<h3 id=\"digital-nationalism-will-be-the-buzzword\" style=\"position:relative;\"><a href=\"#digital-nationalism-will-be-the-buzzword\" aria-label=\"digital nationalism will be the buzzword permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Digital nationalism will be the buzzword.</h3>\n<p>Lately, new, emerging technologies are being responsible for a huge part of any country's economic value. This clearly means that businesses (no matter the size) are investing in big tech solutions to retain their edge in their respective industries. </p>\n<p>However, in these trying times, it is also crucial that countries invest in digital products and services that aid in national security and the economy at large. We should anticipate strengthened regulatory structures and increased scrutiny on activities related to merger and acquisition (M&#x26;A).</p>\n<p><a href=\"https://www.loginradius.com/resource/customer-identity-the-core-of-digital-transformation/\"><img src=\"/d45b10c2827e315e3e240d8b332af5d7/customer-identity-the-core-of-digital-transformation.webp\" alt=\"customer-identity-the-core-of-digital-transformation\"></a></p>\n<h3 id=\"futuristic-workspaces-will-rule\" style=\"position:relative;\"><a href=\"#futuristic-workspaces-will-rule\" aria-label=\"futuristic workspaces will rule permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Futuristic workspaces will rule.</h3>\n<p>The COVID-19 pandemic seems to have hit the reset button on how people work. We are witnessing a changing approach of people towards jobs, mobility, and versatile work models. </p>\n<p>Nonetheless, we expect to see new work delivery models, along with a major transformation in employment constructs. Most of these latest models will be driven by digital realization platforms.</p>\n<h3 id=\"tech-debts-will-be-channelized\" style=\"position:relative;\"><a href=\"#tech-debts-will-be-channelized\" aria-label=\"tech debts will be channelized permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Tech debts will be channelized.</h3>\n<p>Technology debts is a common liability witnessed in large enterprises. This happens because businesses go through multiple cycles of tech acquisitions and implementations over time. </p>\n<p>The ongoing crisis may provide leaders with an opportunity to carefully assess their tech environment and recognize opportunities where such debts can be withdrawn. So, companies can leverage the cash flow for future digital investments when debts are taken care of. </p>\n<h3 id=\"digital-skills-will-take-the-lead\" style=\"position:relative;\"><a href=\"#digital-skills-will-take-the-lead\" aria-label=\"digital skills will take the lead permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Digital skills will take the lead.</h3>\n<p>Technologies will drive digital transformation, and they will also power a competitive edge for businesses. Only those with a triad of skills, viz. digital, professional, domain, and functional skills, will rule the future. </p>\n<p>For companies, this is an ideal time to focus on a digital talent pool and use the opportunity to create a universal foundation of digital skills.</p>\n<h3 id=\"digital-labour-will-witness-a-paradigm-shift\" style=\"position:relative;\"><a href=\"#digital-labour-will-witness-a-paradigm-shift\" aria-label=\"digital labour will witness a paradigm shift permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Digital labour will witness a paradigm shift.</h3>\n<p>The world was already onboarding digital labor and bots. But when COVID-19 happened, this shift towards automation further intensified. </p>\n<p>Now, companies will want to exploit digital channels that can stay unaffected in the event of a crisis and minimize dependency on workers.</p>\n<p>Moving on.</p>\n<p>Digital transformation will be a powerful lever in the response of companies to the current crisis. Therefore, it is expected of companies to formulate plans that will give them the ability to adapt their business models in accordance with the rapidly evolving business environment. </p>\n<ul>\n<li><strong>Understand your channel</strong>: Understand, in particular, which intermediary sites impact purchasing and how consumers toggle between channels.</li>\n<li><strong>Set targets</strong>: This includes monthly targets for direct sales, as well as indirect sales.</li>\n<li><strong>Identify target prospects and prioritize them</strong>: Targeting the right demographics or personas is important. And digital media makes micro-targeting possible for your business.</li>\n<li><strong>Leverage the use of channels</strong>: Articulate the advantages of using multiple digital platforms. </li>\n<li><strong>Highlight the differences, build suggestions</strong>: This involves the differences between online platforms and other channels. </li>\n<li><strong>Offer integration between channels</strong>: Seamlessly integrate different channels throughout the consumer journey.</li>\n<li><strong>Review competitors</strong>: Find out who your competitors are targeting and where do you lag.</li>\n<li><strong>Develop channel partners</strong>: Identify the leading players and influencers in your business ecosystem, and form strategic alliances.</li>\n</ul>\n<h2 id=\"what-drives-digital-transformation\" style=\"position:relative;\"><a href=\"#what-drives-digital-transformation\" aria-label=\"what drives digital transformation permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What Drives Digital Transformation</h2>\n<p><img src=\"/7205225229cb286f30fb10e24b3655df/what-drives-digital-transformation.webp\" alt=\"what-drives-digital-transformation\"></p>\n<p>As we speak of digital transformation or digital conversion, we are often focused on technology. With technology evolving so rapidly, it is tempting to believe it's the main force that has been driving digital transformation all along the way.</p>\n<p>But is it really so?</p>\n<p>Turns out, <em>no</em>, it isn't. </p>\n<p>According to <a href=\"https://www.pwc.com/us/en/library/digital-iq.html\">PwC's CFO Pulse survey</a>, nearly 50% of the organizations list consumer engagement and loyalty as their leading influencers when it comes to adopting digital transformation strategies in their company. </p>\n<p>This means companies that are undergoing digital transformation are also creating highly engaged consumers. According to <a href=\"https://www.prnewswire.com/news-releases/rosetta-consulting-study-shows-that-customer-engagement-increases-market-share-and-drives-revenue-growth-267184761.html\">Rosetta Consulting Study</a>, these consumers are:</p>\n<ul>\n<li>Six times more likely to experiment with new products and services launched by their favorite brand.</li>\n<li>Four times more likely to refer a brand to their friends and connections. </li>\n<li>Two times more likely to buy from their favorite brand, even when a competitor has a better product. </li>\n</ul>\n<p>There is one thing clear—_consumers _are running the show today. </p>\n<p>Businesses need to understand who these new kinds of digital customers are in order to offer better experiences and win big.</p>\n<p>You have to rethink new ways of interacting with your consumers. This means:</p>\n<ul>\n<li><strong>For B2B sales teams</strong>: Replace cold calling with social selling. You need to be always active where your consumers are. So, where else can you find them other than social media? Instead of waiting for them to contact you, take the first step, and reach out to them. Lure them to build a relationship with your brand.</li>\n<li><strong>For marketing teams</strong>: Cut off your expenses on offline marketing activities. No one uses billboards and direct mails anymore. Your consumers will benefit from highly personalized, data-driven marketing strategies instead.</li>\n<li><strong>For customer service teams</strong>: Your consumer's phone is not the only medium anymore. From social media, forums, and communities to review sites, there is a wide range of channels to seek support.</li>\n</ul>\n<h3 id=\"get-started-with-digital-transformation\" style=\"position:relative;\"><a href=\"#get-started-with-digital-transformation\" aria-label=\"get started with digital transformation permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Get Started with Digital Transformation</h3>\n<ul>\n<li><strong>Personalize your consumer experience.</strong></li>\n</ul>\n<p>Today's consumers want businesses to regard them as a distinctive individual and consider their personal preferences and purchasing background. </p>\n<p><a href=\"https://www.accenture.com/us-en/about/accenture-interactive-index\">According to Accenture</a>, 75% of consumers admit that they are more likely to purchase from an organization that:</p>\n<ul>\n<li>Identifies them by their name.</li>\n<li>Knows their purchase history.</li>\n<li>Recommends products based on their purchase history.</li>\n</ul>\n<p>Consumers today do mind companies using their data to make their lives easier. </p>\n<p>Moreso, as businesses, you should invest in a CRM system. They help you analyze data based on consumer's previous interactions. </p>\n<p>For example, you can get a clear understanding of your consumers by analyzing their product requests. This information can then be used to produce highly tailored messages, resulting in a more personalized experience.</p>\n<ul>\n<li><strong>Offer instant gratification.</strong></li>\n</ul>\n<p>Speed is more important than ever. Consumers expect responses from companies within seconds. They also anticipate the same response time on weekends as on weekdays—on-demand, 24 hours a day, 7 days per week.</p>\n<ul>\n<li><strong>Define your digital vision.</strong></li>\n</ul>\n<p>Identify why you are shifting and what you plan to accomplish. This is the basic component that will lead the rest of your journey.</p>\n<ul>\n<li><strong>Map your digital journey.</strong></li>\n</ul>\n<p>You must build a vision of how digitalization applies to your processes and where it can make a difference in achieving better consumer experiences. </p>\n<ul>\n<li><strong>Understand your digital maturity.</strong></li>\n</ul>\n<p>Perform a digital maturity assessment to find how much you have fared in leveraging digital transformation and the areas where you require improvement. </p>\n<h2 id=\"digital-transformation-trends-to-watch-out-in-2021\" style=\"position:relative;\"><a href=\"#digital-transformation-trends-to-watch-out-in-2021\" aria-label=\"digital transformation trends to watch out in 2021 permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Digital Transformation Trends to Watch Out in 2021</h2>\n<p><img src=\"/a7406fa8046513abca6a9f5d824038fa/digital-transformation-trends-to-watch-out-in-2021.webp\" alt=\"digital-transformation-trends-to-watch-out-in-2021\"></p>\n<p>2020 witnessed a massive undertaking of digital transformation across industries. Simultaneously, digital transformation fatigue became a regular appearance. </p>\n<p>Therefore, it is high time that you introspect your team and understand if they are getting tired or less engaged.</p>\n<p>2021 will also see the best of digital transformation in transit. Many have already stated the journey, and the rest is expected to follow soon. </p>\n<p>The uncertain way of global pandemic has introduced new patterns. Businesses and IT leaders should be aware of what's in the making. The following key digital transformation trends will take over the upcoming new normal in 2021.  </p>\n<h3 id=\"explosion-of-customer-data-platforms-cdp\" style=\"position:relative;\"><a href=\"#explosion-of-customer-data-platforms-cdp\" aria-label=\"explosion of customer data platforms cdp permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Explosion of Customer Data Platforms (CDP).</h3>\n<p>Data is growing exponentially, and it definitely won't stop anytime shortly. Data warehouse, analytics platforms, and visualization software will not lose significance. Still, at the same time, the world is about to witness a rapid adoption of customer data platforms (CDP) in 2021. </p>\n<p>So, what are these CDPs? A CDP is a packaged software that collects and organizes data from all available sources, tags it, and makes it accessible for anybody who wants to use it. </p>\n<p>Now that business processes have become much more decentralized, courtesy of the new work-from-home models and the ongoing growth of data collection, CDPs will become increasingly important in 2021. </p>\n<p>Companies such as Adobe, SAP, Oracle, and Microsoft are already invested heavily to bring new CDPs to the market.</p>\n<h3 id=\"automation-will-increase-financial-proficiency\" style=\"position:relative;\"><a href=\"#automation-will-increase-financial-proficiency\" aria-label=\"automation will increase financial proficiency permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Automation will increase financial proficiency.</h3>\n<p>As the world is trying to recover from the pandemic, financial institutions are particularly concerned about their shrinking revenue and loan losses. This has encouraged them to lean towards automation and robotics. </p>\n<p>While still in its earliest stages, Robotic Process Automation (RPA) can increase productivity by providing a cost-effective substitute to Human Resources. </p>\n<p>Other recorded advantages of RPA include improved consumer experiences, flexibility, upgraded precision, and proficiency in work. </p>\n<h3 id=\"utilization-of-ai\" style=\"position:relative;\"><a href=\"#utilization-of-ai\" aria-label=\"utilization of ai permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Utilization of AI.</h3>\n<p>When the pandemic hit, AI and data were suddenly liberalized and accelerated to a massive extent. It happened almost overnight that governments and organizations found themselves working together to establish a quicker way to avoid the spread of the virus.</p>\n<p>Everyone was turning their heads to AI, machine learning, and data. So, what began as an emergency in 2020 will continue to scale in 2021 and is likely to spread across a wide variety of opportunities. AI will be addressing global and business issues quicker, better, and on a broader scale.</p>\n<p>While many may still consider AI to be more of a future trend, it is already here and driving our everyday lives. For example, when you receive recommendations on Netflix or while shopping on Amazon, that's the work of an AI.  </p>\n<h3 id=\"quantum-computing-will-go-mainstream\" style=\"position:relative;\"><a href=\"#quantum-computing-will-go-mainstream\" aria-label=\"quantum computing will go mainstream permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Quantum computing will go mainstream.</h3>\n<p>2020 witnessed a number of achievements from various pioneers in the quantum industry, including IBM, Amazon, <a href=\"https://www.cnet.com/news/honeywell-fires-up-the-h1-its-second-generation-quantum-computer/\">Honeywell</a>, and Google.</p>\n<p>These companies have been favoring quantum advantage or supremacy by claiming that a quantum computer can calculate hundreds or thousands of times faster than a classical computer. Also, the technology in question is efficient enough to complete calculations that classical supercomputers can not do at all. </p>\n<p>Quantum computing was also at the forefront of digital transformation during the pandemic endeavors to stop the spread of infection, as well as the development of therapeutics and future vaccines. </p>\n<p>2021 will be no different. Quantum computing will continue to rise and bring more efficiencies to the table</p>\n<h3 id=\"work-from-home-will-outlast-the-pandemic\" style=\"position:relative;\"><a href=\"#work-from-home-will-outlast-the-pandemic\" aria-label=\"work from home will outlast the pandemic permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Work From Home will outlast the pandemic.</h3>\n<p>For quite a while, employees were pushing for greater job flexibility, and organizations opting to allow remote work were only a handful. In 2020, when the pandemic caught most companies off-guard, telecommuting seemed the only rational solution.</p>\n<p>Now, even when things are gradually getting back to normal, organizations are still allowing people to work from home—as a possible shield to protect from future outbreaks. Large tech organizations like <a href=\"https://www.indiatvnews.com/business/news-google-extends-work-from-home-policy-till-september-2021-671463\">Google</a> and Facebook have already extended their remote arrangements for parts of 2021. </p>\n<p>Now that companies know how remote setups work for them, also how they are more productive despite physical distance, work from home models may continue to exist for a few more years, and maybe beyond. </p>\n<h3 id=\"cybersecurity-will-gain-momentum\" style=\"position:relative;\"><a href=\"#cybersecurity-will-gain-momentum\" aria-label=\"cybersecurity will gain momentum permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Cybersecurity will gain momentum.</h3>\n<p>Between January and April 2020 alone, there was a <a href=\"https://www.mcafee.com/enterprise/en-us/assets/reports/rp-cloud-adoption-and-risk-report-work-from-home-edition.pdf\">630% rise in cyberattacks</a> on cloud accounts and a 238% rise in banks. Cybersecurity was the talk of the town throughout the pandemic. </p>\n<p>Because there were fewer employees onsite on the same network, it became crucial for companies to upgrade their cybersecurity strategies and extend them beyond their corporate network. </p>\n<p>Despite the attacks, 2021 may witness an accelerated workload migration to the cloud. A <a href=\"https://www.gartner.com/smarterwithgartner/the-cios-guide-to-distributed-cloud/\">Gartner analysis</a> finds \"distributed cloud\" may take over along with some profound security implications.  </p>\n<h2 id=\"the-role-of-culture-in-digital-transformation\" style=\"position:relative;\"><a href=\"#the-role-of-culture-in-digital-transformation\" aria-label=\"the role of culture in digital transformation permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>The Role of Culture in Digital Transformation</h2>\n<p><img src=\"/90f9d93b16a0ec83bee9af335a8f502f/the-role-of-culture-in-digital-transformation.webp\" alt=\"the-role-of-culture-in-digital-transformation\"></p>\n<p>Culture in digital transformation has no mysterious or unseen presence. Digital is about embedding culture into business operations to succeed, and not just update technology, redesign products, and improve client relationships. </p>\n<p>So, if you fail to align your business initiatives with employee values and expectations, you end up generating additional risks to your company's culture. The consequences include slow adoption of digital technologies, lost productivity, loss of market competitiveness, and an ultimate decrease in ROI. </p>\n<p>And that's not how digital transformation functions. You need a more systematic and collaborative attitude towards cultural change instead.  </p>\n<p>For organizations trying to shape their digital aspirations, what's lacking is transparent and realistic guidance on shaping their culture for the road ahead. </p>\n<p>Our best tip for any organization will be to invest in a sustained effort that allows teams to cultivate a more profound passion and empathy for their business.</p>\n<h2 id=\"how-do-you-measure-roi-on-digital-transformation\" style=\"position:relative;\"><a href=\"#how-do-you-measure-roi-on-digital-transformation\" aria-label=\"how do you measure roi on digital transformation permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How Do You Measure ROI on Digital Transformation</h2>\n<p>The ability to define and calculate the return on investment (ROI) of digital transformation can be very difficult for transformation leaders. </p>\n<p>After all, it is not possible to measure consumer experiences. Instead, you need to assess your business as a whole and consider the changes in your processes and workflows.</p>\n<p>How do you start? Simple. By creating a strong investment case. The following steps below will help you build a practical ROI model for your business. </p>\n<p><strong>Step 1: Narrow down your objectives for digital transformation</strong>: Do you want to digitize your data? Integrate touchpoints? Increase productivity in operations? Or repeat purchases? </p>\n<p>It can be one or a combination of many objectives. Jot down your roadmap to understand what KPIs you should measure. </p>\n<p><strong>Step 2: Define your cost centers</strong>: List out all your business areas where you have incorporated digital transformation. </p>\n<p>For example, it will include not just your IT department (which is an obvious choice for your technology upgrade). You should also consider the additional cost of training your employees to help them understand your new web portal.</p>\n<p><strong>Step 3: Allocate a figure to all consumer metrics</strong>: Make sure to include all potential impacts on sales from improvements in consumer experience like: </p>\n<ul>\n<li>Consumer churn</li>\n<li>Repeat purchases</li>\n<li>Referrals</li>\n<li>Satisfaction scores</li>\n<li>Operational costs (training, recruitment)</li>\n<li>Employee incentive schemes</li>\n</ul>\n<p><strong>Step 4: Set realistic timelines and milestones</strong>: When will you calculate the progress of each aspect of your digital transformation? The timeline is essential.</p>\n<p>For example, if you are launching a new self-serve application, your inbound call levels are bound to decrease in the first year. But your KPIs will gradually pick up as consumers enjoy the benefits of your product. Therefore, do not set your aspirations too high in the beginning. </p>\n<h2 id=\"meet-the-industry-experts\" style=\"position:relative;\"><a href=\"#meet-the-industry-experts\" aria-label=\"meet the industry experts permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Meet the Industry Experts</h2>\n<p>We have caught a few digital transformation leaders in action as they offer valuable perspective and guidance. </p>\n<ul>\n<li><strong><a href=\"https://www.linkedin.com/in/jimdswanson/\">Jim Swanson</a>, CIO at Johnson &#x26; Johnson</strong>: We talk about automating operations, people, and new business models. You could have all those things – but if leadership and culture aren't at heart, it fails.</li>\n<li><strong><a href=\"https://www.linkedin.com/in/dhinchcliffe\">Dion Hinchcliffe</a>, VP at Constellation Research</strong>: The top IT executives today must match the pace of change, fall behind, or lead the pack. That's the existential issue at stake, where bold action must be actively supported by out-of-the-box experimentation and pathfinding. </li>\n<li><strong><a href=\"https://www.linkedin.com/in/brysonkoehler\">Bryson Koehler</a>, CTO at Equifax</strong>: If you look at the vast majority of startups, they're not starting with giant, shrink-wrapped software packages as their company's base. If you're trying to create innovation inside a large enterprise, you shouldn't start with it either. You're not here to run the mainframe anymore. </li>\n<li><strong><a href=\"https://www.linkedin.com/in/svengerjets\">Sven Gerjets</a>, CTO at Mattel</strong>: If you don't have an organization that is supportive and entirely onboard with the transformation efforts, it's impossible to succeed. You need to have leaders that know what \"good\" looks like. </li>\n</ul>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>Digital transformation is an amalgamation of strategy, roadmap, goals, stakeholders, and all the parameters needed to succeed. </p>\n<p>Right now, businesses are rapidly including the creative use of data, be it via analytics, IoT, or machine learning etc. for their transformation activities. Clearly, in many ways, digital-led transitions are evolving and are here to stay. </p>\n<p>Only the adapters will survive!</p>\n<p><a href=\"https://www.loginradius.com/contact-us?utm_source=blog&#x26;utm_medium=web&#x26;utm_campaign=what-is-digital-transformation\"><img src=\"/8fce571f703a5970dbb1359a2fe0e51a/book-a-demo-loginradius.webp\" alt=\"book-a-demo-loginradius\"></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"January 11, 2021","updated_date":null,"description":"Digital transformation is the process of leveraging digital technology to develop new business processes and consumer experiences to meet the changing market dynamics or to alter the existing ones. So, has the dynamics changed with the COVID-19 pandemic? You are about to find out.","title":"What is Digital Transformation","tags":["digital transformation","cybersecurity","cx"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.408450704225352,"src":"/static/527e95c356974fb1a265602727128923/176df/what-is-digital-transformation.webp","srcSet":"/static/527e95c356974fb1a265602727128923/61e93/what-is-digital-transformation.webp 200w,\n/static/527e95c356974fb1a265602727128923/1f5c5/what-is-digital-transformation.webp 400w,\n/static/527e95c356974fb1a265602727128923/176df/what-is-digital-transformation.webp 767w","sizes":"(max-width: 767px) 100vw, 767px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.webp"}}}},{"node":{"excerpt":"No conversation on digital security is complete without a well-rounded discussion on how to choose a strong password.  Passwords are the…","fields":{"slug":"/identity/how-to-choose-a-secure-password/"},"html":"<p>No conversation on digital security is complete without a well-rounded discussion on how to choose a strong password. </p>\n<p>Passwords are the digital keys to our daily lives. They are the gateway to our professional services, our network of friends, and all our financial applications. </p>\n<p>No wonder we want to keep our passwords private and secure! </p>\n<p>If someone gains access to your email ID, they can easily opt for the \"forgot your password?\" link on (for example, an online shopping or banking site) you use. </p>\n<p>Also, if a cybercriminal successfully hacks into your social media account, they can post fraudulent messages asking for money or sending out links to scammer websites. </p>\n<p>So, what's the solution? A good password. </p>\n<p>But before finding how to choose a strong password in 2021, let's first look at the most common methods of how passwords are being hacked today.    </p>\n<h2 id=\"how-does-a-password-get-hacked-top-5-threats\" style=\"position:relative;\"><a href=\"#how-does-a-password-get-hacked-top-5-threats\" aria-label=\"how does a password get hacked top 5 threats permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How Does a Password Get Hacked? Top 5 Threats</h2>\n<p>Hackers utilize numerous techniques to crack your passwords. One technique is to gain access by guessing the password directly. </p>\n<p>They could do it by closely following your social media presence, security questions, and similar details. This is why industry experts do not favor the use of personal details on passwords. </p>\n<p>Other tactics that hackers use include: </p>\n<h3 id=\"1-phishing-attacks\" style=\"position:relative;\"><a href=\"#1-phishing-attacks\" aria-label=\"1 phishing attacks permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. Phishing attacks</h3>\n<p>Phishing is a <a href=\"https://www.loginradius.com/blog/identity/2020/10/social-engineering-attacks/\">social engineering attack</a> that occurs when the hacker dupes a victim into opening an email using fraudulent ads or scareware tactics. </p>\n<p>Unfortunately, such attacks are no longer just an email problem. It has somewhat expanded to instant/ text messages, social networks, videoconferencing, and gaming applications. </p>\n<p>As phishing threats grew to over 50,000 a day around December 2020, <a href=\"https://www.slashnext.com/blog/zero-hour-phishing-attack-on-googles-app-engine-targeting-office-365-users-pushes-holiday-spike-above-100/\">SlashNext Threat Labs reported</a> a 30% increase throughout 2019. </p>\n<p>Both organizations and individuals should know how to choose a strong password and take a zero-trust approach beyond domain credibility. </p>\n<h3 id=\"2-dictionary-attack\" style=\"position:relative;\"><a href=\"#2-dictionary-attack\" aria-label=\"2 dictionary attack permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. Dictionary attack</h3>\n<p>A dictionary attack is a method of attacking the victim's account by entering every word in a dictionary as a password. They usually run through a list of common words and phrases or easy to guess passwords. </p>\n<p>Users frequently reuse their passwords or do not change them even after a breaching attempt. That makes this form of attack easy to execute. </p>\n<p>In fact, the <a href=\"https://enterprise.verizon.com/resources/reports/dbir/2019/results-and-analysis/\">2019 Verizon Data Breach Investigations Report</a> (DBIR) reveals that compromised and reused passwords are involved in 80 percent of hacking-related breaches.</p>\n<h3 id=\"3-brute-force-attacks\" style=\"position:relative;\"><a href=\"#3-brute-force-attacks\" aria-label=\"3 brute force attacks permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3. Brute force attacks</h3>\n<p>Similar to a dictionary attack, brute force uses trial-and-error to guess the victim's login credentials, find a hidden web page, or access network resources. </p>\n<p>Later, those tainted accounts are used to send phishing emails, sell credentials to third parties, or spread fake content. </p>\n<p><a href=\"https://enterprise.verizon.com/resources/reports/dbir/2020/introduction/\">Verizon's Data Breach Investigations Report 2020</a> reveals that around 20% of breaches happening within SMBs involve brute force. The number is approximately 10% for large enterprises. </p>\n<p>The trend essentially remained unchanged in 2018 and 2019, but the coronavirus pandemic may have impacted the number last year.</p>\n<h3 id=\"4-keystroke-logging\" style=\"position:relative;\"><a href=\"#4-keystroke-logging\" aria-label=\"4 keystroke logging permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>4. Keystroke logging</h3>\n<p>Keystroke logging or keyboard capturing is the method of tracking and recording the keystrokes of the victim, thereby capturing any information typed during the session. </p>\n<p>The hacker uses tools to record the data captured by each keystroke, which are retrieved later on. Moreso, a majority of these tools can record calls, GPS data, copy-cut-paste clipboard, and microphone or camera footage. The recorded data are later used for phishing attacks, stalking, and identity theft. </p>\n<h3 id=\"5-man-in-the-middle-attacks\" style=\"position:relative;\"><a href=\"#5-man-in-the-middle-attacks\" aria-label=\"5 man in the middle attacks permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>5. Man-in-the-middle attacks</h3>\n<p>In this attack, the hacker positions themselves in the middle of a conversation between a user and an application to eavesdrop or impersonate a website or application. </p>\n<p>In return, the hacker <a href=\"https://www.loginradius.com/blog/identity/2019/09/prevent-credential-stuffing-attacks/\">steals the victim's login credentials</a>, account numbers, social security numbers, etc. </p>\n<p>SaaS businesses, e-commerce sites, and users of financial services majorly fall victim to man-in-the-middle attacks.  </p>\n<h2 id=\"the-dos-and-dont-on-how-to-choose-a-strong-password\" style=\"position:relative;\"><a href=\"#the-dos-and-dont-on-how-to-choose-a-strong-password\" aria-label=\"the dos and dont on how to choose a strong password permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>The Do's and Don't on How to Choose a Strong Password</h2>\n<p><img src=\"/4a2acc02f071d012bde568e04c19d226/do&#x27;s-and-don&#x27;t-to-choose-a-strong-password.webp\" alt=\"do&#x27;s-and-don&#x27;t-to-choose-a-strong-password\"></p>\n<p>What does a secure password look like? It is usually the one that cannot be guessed easily or cracked using software tools. </p>\n<p>Not that it should only be unique and complex, here is a collection of the do's and don't on how to choose a strong password to avoid being a victim of the attacks mentioned above.</p>\n<h3 id=\"the-dos\" style=\"position:relative;\"><a href=\"#the-dos\" aria-label=\"the dos permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>The Do's</h3>\n<p><strong>Use two-factor authentication (2FA)</strong>: <a href=\"https://www.loginradius.com/multi-factor-authentication/\">2FA</a> adds an additional layer of security to your existing account. Even if the hacker is able to crack your password, they will still have an extra layer to authenticate. </p>\n<p>The following are a few types of layers that businesses choose to provide:</p>\n<ul>\n<li>A PIN or password.</li>\n<li>A physical asset such as the last 4 digits of your credit card.</li>\n<li>An OTP sent to your mobile device.</li>\n<li>A biometric authenticator such as a fingerprint or voiceprint. </li>\n</ul>\n<p><strong>Follow standard password rules</strong>: There are a few basic rules on how to choose a strong password that you should closely follow.</p>\n<ul>\n<li>Short passwords are very easy to crack. Use a minimum of 10 characters.</li>\n<li>Include a mixture of numbers, capital letters, lower-case letters, and symbols to make the password difficult to crack. </li>\n</ul>\n<p><strong>Choose sufficiently random combinations of words</strong>: Yes, it is possible to use an easy-to-remember password and make it secure at the same time. The following are a few ways to do that:</p>\n<ul>\n<li>Pick a sentence that you probably won't forget, like \"When I was fifteen, I had my first international trip.\" Then use the first letters, add the numbers, and punctuation to make \"wIw15,ihmfit.\"</li>\n<li>Pick any three random words like Jack Book Pen. Choose your birth date, put the words together, and split up the date like 1jackbookpen4. Next, capitalize each letter and add a few special characters like 1J@ckBookPen4!</li>\n</ul>\n<p><strong>Pick something that does not make sense</strong>: How to choose a <a href=\"https://www.loginradius.com/blog/engineering/password-security-best-practices-compliance/\">strong password</a>? Go for something that has no meaning. For example, it could be:</p>\n<ul>\n<li>A familiar word using odd characters like phnybon instead of funnybone.</li>\n<li>A deliberately misspelled term like Win-G8 (Wooden Gate)</li>\n<li>Replace letters with the least expected symbols. Like for \"O\" use \"()\" instead of \"0\".</li>\n<li>Use phonetically pronounceable words that make no sense, like good-eits.</li>\n</ul>\n<p><strong>Change your passwords regularly</strong>: Also, do not reuse the same password for a long time. The more sensitive your data is, the more frequently you should change your password.</p>\n<p><a href=\"https://www.loginradius.com/resource/ebook/buyers-guide-to-multi-factor-authentication/\"><img src=\"/b319bf6ed09ba90828b27b6cc2c2eb75/EB-buyers-GD-to-MFA.webp\" alt=\"EB-buyers-GD-to-MFA\"></a></p>\n<p><strong>Always remember to log out</strong> of websites and devices once you are done using them. </p>\n<h3 id=\"the-donts\" style=\"position:relative;\"><a href=\"#the-donts\" aria-label=\"the donts permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>The Don’ts</h3>\n<ul>\n<li>Do not use your name in your passwords in any form - first, last, spelled backward, or nicknames.</li>\n<li>Do not use passwords that are fewer than eight characters.</li>\n<li>Do not use the name of your pets, friends, or close relatives.</li>\n<li>Do not use special dates like your birthdays and anniversaries. </li>\n<li>Do not use your phone number or office number.</li>\n<li>Do not use your user ID, even when spelled backward.</li>\n<li>Do not use acronyms, technical terms, or names of places.</li>\n<li>Do not use names from popular culture like Harry_Potter, Hogwarts. </li>\n<li>Do not use all numeric passwords like your license plate numbers.</li>\n<li>Do not use dictionary words. </li>\n<li>Do not use commonly used passwords like 123456, qwerty, 11111111, asdfgh.</li>\n<li>Do not write down your passwords or share them with anyone else.</li>\n<li>Do not save your passwords in unfamiliar computers or browsers.</li>\n<li>Do not use the secret question option. It does not make any sense to use a strong password and back it up with an easily guessable security question.</li>\n<li>Do not use obvious substitutions like \"H0me\" for \"Home\" or \"D00R8377\" for \"DOORBELL.\"</li>\n</ul>\n<h2 id=\"the-20-worst-passwords-of-2020\" style=\"position:relative;\"><a href=\"#the-20-worst-passwords-of-2020\" aria-label=\"the 20 worst passwords of 2020 permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>The 20 Worst Passwords of 2020</h2>\n<p><a href=\"https://nordpass.com/most-common-passwords-list/\">According to Nordpass.com</a>, here are the 20 worst passwords of 2020. The list also offers an overview of how many times the password has been breached, among other parameters. </p>\n<p>Disclaimer: Stay away from these passwords. </p>\n<table>\n  <tr>\n   <td><strong>Position </strong>\n   </td>\n   <td><strong>Password </strong>\n   </td>\n   <td><strong>Number of users</strong>\n   </td>\n   <td><strong>Time to crack it</strong>\n   </td>\n   <td><strong>Times exposed</strong>\n   </td>\n  </tr>\n  <tr>\n   <td>1\n   </td>\n   <td>123456\n   </td>\n   <td>2,543,285\n   </td>\n   <td>Less than a second\n   </td>\n   <td>23,597,311\n   </td>\n  </tr>\n  <tr>\n   <td>2\n   </td>\n   <td>123456789\n   </td>\n   <td>961,435\n   </td>\n   <td>Less than a second\n   </td>\n   <td>7,870,694\n   </td>\n  </tr>\n  <tr>\n   <td>3\n   </td>\n   <td>picture1\n   </td>\n   <td>371,612\n   </td>\n   <td>Three hours\n   </td>\n   <td>11,190\n   </td>\n  </tr>\n  <tr>\n   <td>4\n   </td>\n   <td>password\n   </td>\n   <td>360,467\n   </td>\n   <td>Less than a second\n   </td>\n   <td>3,759,315\n   </td>\n  </tr>\n  <tr>\n   <td>5\n   </td>\n   <td>12345678\n   </td>\n   <td>322,187\n   </td>\n   <td>Less than a second\n   </td>\n   <td>2,944,615\n   </td>\n  </tr>\n  <tr>\n   <td>6\n   </td>\n   <td>111111\n   </td>\n   <td>230,507\n   </td>\n   <td>Less than a second\n   </td>\n   <td>3,124,368\n   </td>\n  </tr>\n  <tr>\n   <td>7\n   </td>\n   <td>123123\n   </td>\n   <td>189,327\n   </td>\n   <td>Less than a second\n   </td>\n   <td>2,238,694\n   </td>\n  </tr>\n  <tr>\n   <td>8\n   </td>\n   <td>12345\n   </td>\n   <td>188,268\n   </td>\n   <td>Less than a second\n   </td>\n   <td>2,389,787\n   </td>\n  </tr>\n  <tr>\n   <td>9\n   </td>\n   <td>1234567890\n   </td>\n   <td>171,724\n   </td>\n   <td>Less than a second\n   </td>\n   <td>2,264,884\n   </td>\n  </tr>\n  <tr>\n   <td>10\n   </td>\n   <td>senha\n   </td>\n   <td>167,728\n   </td>\n   <td>Ten seconds\n   </td>\n   <td>8,213\n   </td>\n  </tr>\n  <tr>\n   <td>11\n   </td>\n   <td>1234567\n   </td>\n   <td>165,909\n   </td>\n   <td>Less than a second\n   </td>\n   <td>2,516,606\n   </td>\n  </tr>\n  <tr>\n   <td>12\n   </td>\n   <td>qwerty\n   </td>\n   <td>156,765\n   </td>\n   <td>Less than a second\n   </td>\n   <td>3,946,737\n   </td>\n  </tr>\n  <tr>\n   <td>13\n   </td>\n   <td>abc123\n   </td>\n   <td>151,804\n   </td>\n   <td>Less than a second\n   </td>\n   <td>2,877,689\n   </td>\n  </tr>\n  <tr>\n   <td>14\n   </td>\n   <td>Million2\n   </td>\n   <td>143,664\n   </td>\n   <td>Three hours\n   </td>\n   <td>162,609\n   </td>\n  </tr>\n  <tr>\n   <td>15\n   </td>\n   <td>000000\n   </td>\n   <td>122,982\n   </td>\n   <td>Less than a second\n   </td>\n   <td>1,959,780\n   </td>\n  </tr>\n  <tr>\n   <td>16\n   </td>\n   <td>1234\n   </td>\n   <td>112,297\n   </td>\n   <td>Less than a second\n   </td>\n   <td>1,296,186\n   </td>\n  </tr>\n  <tr>\n   <td>17\n   </td>\n   <td>iloveyou\n   </td>\n   <td>106,327\n   </td>\n   <td>Less than a second\n   </td>\n   <td>1,645,337\n   </td>\n  </tr>\n  <tr>\n   <td>18\n   </td>\n   <td>aaron431\n   </td>\n   <td>90,256\n   </td>\n   <td>Three hours\n   </td>\n   <td>30,576\n   </td>\n  </tr>\n  <tr>\n   <td>19\n   </td>\n   <td>password1\n   </td>\n   <td>87,556\n   </td>\n   <td>Less than a second\n   </td>\n   <td>2,418,984\n   </td>\n  </tr>\n  <tr>\n   <td>20\n   </td>\n   <td>qqww1122\n   </td>\n   <td>85,476\n   </td>\n   <td>Fifty two minutes\n   </td>\n   <td>122,481\n   </td>\n  </tr>\n</table>\n<h2 id=\"5-tips-on-how-to-choose-a-strong-password-manager\" style=\"position:relative;\"><a href=\"#5-tips-on-how-to-choose-a-strong-password-manager\" aria-label=\"5 tips on how to choose a strong password manager permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>5 Tips on How to Choose a Strong Password Manager</h2>\n<p><img src=\"/8515c3127c9803c5124d8125057cecf7/how-to-choose-a-strong-password.webp\" alt=\"how-to-choose-a-strong-password\"></p>\n<p>A password manager helps you auto-generate strong passwords and stores them in encrypted, centralized locations on your behalf. You can access all your passwords with a master password. </p>\n<p>A lot of password managers are free to use and provide optional features such as synchronizing new passwords across several devices. If allowed, they also audit users’ actions to ensure that they are not repeating their passwords in multiple locations. </p>\n<p>So, (to be on the right track), how to choose a strong password manager? Well, it should at least have the following core features:</p>\n<ul>\n<li><strong>Storage</strong>: While some password managers store passwords in a local hard-drive, some others use cloud storage. The latter is usually preferable if your employees or users use multiple devices. They can access their account credentials from any device with an internet connection. Also, if their devices are stolen, they won't lose their passwords. </li>\n<li><strong>Encryption</strong>: Go for a strong <a href=\"https://www.loginradius.com/blog/engineering/encryption-and-hashing/\">encryption standard</a>. The next time you wonder how to choose a strong password manager, go for the one that uses 256-bit Advanced Encryption Standard (AES) encryption.  </li>\n<li><strong>Easy-to-use</strong>: The password manager you choose should have an intuitive interface so that it's easy to use. Otherwise, your users or employees will stick to their old habits of creating weak, familiar passwords. Some managers also offer automated password changers that automatically change old passwords to new stronger ones.</li>\n<li><strong>Security</strong>: It should support two-factor authentication, track password usage, and generate audit reports. The password manager should also end sessions when a device is idle for a predefined amount of time. Also, ensure it has a built-in VPN and the ability to restrict access to blacklisted Internet sites. </li>\n<li>\n<p><strong>Value</strong>: The password manager should also have additional nice-to-have features:</p>\n<ul>\n<li>Automated support for directory services integration.</li>\n<li>The ability to generate a portable vault.</li>\n<li>An account recovery feature in case of forgotten master passwords.</li>\n<li>The ability to encrypt and store sensitive files in secure vaults. </li>\n</ul>\n</li>\n</ul>\n<h2 id=\"reduce-password-vulnerabilities-using-the-loginradius-password-management-solution\" style=\"position:relative;\"><a href=\"#reduce-password-vulnerabilities-using-the-loginradius-password-management-solution\" aria-label=\"reduce password vulnerabilities using the loginradius password management solution permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Reduce Password Vulnerabilities Using the LoginRadius Password Management Solution</h2>\n<p>To answer the popular question \"how to choose a strong password in 2021\", LoginRadius offers a range of robust Password Policy features. </p>\n<p><a href=\"https://www.loginradius.com/\">The CIAM platform</a> captures the following categories of password management in the LoginRadius Admin Console:</p>\n<ul>\n<li><strong>Password Expiration</strong>: You can customize how often you want your consumers to reset their passwords. There's a password expiry configuration setting to help you out.</li>\n<li><strong>Password History</strong>: You can configure the number of unique passwords a consumer must set before allowing them to reuse one of their older passwords. </li>\n<li><strong>Password Complexity</strong>: You can configure the password complexity for your consumer's account by forcing validation rules, preventing them from using common passwords and dictionary words.</li>\n<li><strong>Password Compliance Check</strong>: You can identify which consumers are abiding by your password complexity requirements and flag those who aren't. </li>\n</ul>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>By now, you know how to choose a strong password. However, hackers will still try to crack your passwords, no matter how secure you are trying to make them. </p>\n<p>Follow the steps listed above to make your passwords as strong and unique as possible. Remember, if your password is too easy to remember, it is probably not secure at all.</p>\n<p><a href=\"https://www.loginradius.com/contact-us?utm_source=blog&#x26;utm_medium=web&#x26;utm_campaign=how-to-choose-a-secure-password\"><img src=\"/8fce571f703a5970dbb1359a2fe0e51a/book-a-demo-loginradius.webp\" alt=\"book-a-demo-loginradius\"></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"January 06, 2021","updated_date":null,"description":"Passwords are the digital keys to our daily lives. They are the gateway to our professional services, and our network of friends. So, what does a secure password look like? Here is a collection of the do's and don't on how to choose a strong password to avoid being a victim of cyberattack.","title":"The Do's and Don'ts of Choosing a Secure Password","tags":["data security","password management","ciam solution","cx"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.3986013986013985,"src":"/static/5f6051708c66e72baac79bef4567e9b4/176df/how-to-choose-a-secure-password-in-2021.webp","srcSet":"/static/5f6051708c66e72baac79bef4567e9b4/61e93/how-to-choose-a-secure-password-in-2021.webp 200w,\n/static/5f6051708c66e72baac79bef4567e9b4/1f5c5/how-to-choose-a-secure-password-in-2021.webp 400w,\n/static/5f6051708c66e72baac79bef4567e9b4/176df/how-to-choose-a-secure-password-in-2021.webp 767w","sizes":"(max-width: 767px) 100vw, 767px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.webp"}}}},{"node":{"excerpt":"One fairly popular question that got asked on programming bulletin boards has to do with the similarities and differences between React’s…","fields":{"slug":"/engineering/react-constructor-get-initial-state/"},"html":"<p>One fairly popular question that got asked on programming bulletin boards has to do with the similarities and differences between React’s <code>constructor</code> and the built in method <code>getInitialState</code>. While the simple answer to this question is indeed simple: “getInitialState is the ES5 friendly method to define the initial state of a React component,” there are a couple more details around <code>getInitialState</code> as well as React’s ES5 support that are interesting and useful to highlight.</p>\n<h2 id=\"constructor-vs-getinitialstate-with-or-without-classes\" style=\"position:relative;\"><a href=\"#constructor-vs-getinitialstate-with-or-without-classes\" aria-label=\"constructor vs getinitialstate with or without classes permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Constructor vs getInitialState: With or without Classes:</h2>\n<p>One of the fundamental differences between ES5 and ES6 in regards to React implementation is the new <code>class</code> keyword. It allows definition of React components as classes, which is a familiar data structure for anyone who has had experience with more traditional object-oriented languages such as Java or C++. The class structure also allows for natural organization of the component’s elements like state, props, lifecycle methods and member functions. However, ES5 did not provide the same convenience. So instead of defining a React component as a class:</p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"javascript\" data-index=\"0\"><code class=\"grvsc-code\"><span class=\"grvsc-line\"><span class=\"mtk4\">class</span><span class=\"mtk1\"> </span><span class=\"mtk10\">HelloWorld</span><span class=\"mtk1\"> </span><span class=\"mtk4\">extends</span><span class=\"mtk1\"> </span><span class=\"mtk10\">React</span><span class=\"mtk1\">.</span><span class=\"mtk10\">Component</span><span class=\"mtk1\"> {</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">  </span><span class=\"mtk11\">render</span><span class=\"mtk1\">() {</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span><span class=\"mtk15\">return</span><span class=\"mtk1\"> </span><span class=\"mtk17\">&lt;</span><span class=\"mtk4\">span</span><span class=\"mtk17\">&gt;</span><span class=\"mtk1\">Hello World</span><span class=\"mtk17\">&lt;/</span><span class=\"mtk4\">span</span><span class=\"mtk17\">&gt;</span><span class=\"mtk1\">;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">  }</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">}</span></span></code></pre>\n<p>You would rely on a helper module called <code>create-react-class</code>:</p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"javascript\" data-index=\"1\"><code class=\"grvsc-code\"><span class=\"grvsc-line\"><span class=\"mtk4\">var</span><span class=\"mtk1\"> </span><span class=\"mtk12\">createReactClass</span><span class=\"mtk1\"> = </span><span class=\"mtk11\">require</span><span class=\"mtk1\">(</span><span class=\"mtk8\">&#39;create-react-class&#39;</span><span class=\"mtk1\">);</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk4\">var</span><span class=\"mtk1\"> </span><span class=\"mtk12\">HelloWorld</span><span class=\"mtk1\"> = </span><span class=\"mtk11\">createReactClass</span><span class=\"mtk1\">({</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">  </span><span class=\"mtk11\">render</span><span class=\"mtk12\">:</span><span class=\"mtk1\"> </span><span class=\"mtk4\">function</span><span class=\"mtk1\">() {</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span><span class=\"mtk15\">return</span><span class=\"mtk1\"> </span><span class=\"mtk17\">&lt;</span><span class=\"mtk4\">span</span><span class=\"mtk17\">&gt;</span><span class=\"mtk1\">Hello World</span><span class=\"mtk17\">&lt;/</span><span class=\"mtk4\">span</span><span class=\"mtk17\">&gt;</span><span class=\"mtk1\">;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">  }</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">});</span></span></code></pre>\n<p>And it is within the object passed into <code>create-react-class</code> that you could define an initial state by populating the <code>getInitialState</code> attribute:</p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"javascript\" data-index=\"2\"><code class=\"grvsc-code\"><span class=\"grvsc-line\"><span class=\"mtk4\">var</span><span class=\"mtk1\"> </span><span class=\"mtk12\">HelloWorld</span><span class=\"mtk1\"> = </span><span class=\"mtk11\">createReactClass</span><span class=\"mtk1\">({</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">  </span><span class=\"mtk11\">getInitialState</span><span class=\"mtk12\">:</span><span class=\"mtk1\"> </span><span class=\"mtk4\">function</span><span class=\"mtk1\">() {</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span><span class=\"mtk15\">return</span><span class=\"mtk1\"> {</span><span class=\"mtk12\">name:</span><span class=\"mtk1\"> </span><span class=\"mtk4\">this</span><span class=\"mtk1\">.</span><span class=\"mtk12\">props</span><span class=\"mtk1\">.</span><span class=\"mtk12\">name</span><span class=\"mtk1\">};</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">  },</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">  </span><span class=\"mtk11\">render</span><span class=\"mtk12\">:</span><span class=\"mtk1\"> </span><span class=\"mtk4\">function</span><span class=\"mtk1\">() {</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span><span class=\"mtk15\">return</span><span class=\"mtk1\"> </span><span class=\"mtk17\">&lt;</span><span class=\"mtk4\">span</span><span class=\"mtk17\">&gt;</span><span class=\"mtk1\">Hello </span><span class=\"mtk4\">{this</span><span class=\"mtk1\">.</span><span class=\"mtk12\">state</span><span class=\"mtk1\">.</span><span class=\"mtk12\">name</span><span class=\"mtk4\">}</span><span class=\"mtk17\">&lt;/</span><span class=\"mtk4\">span</span><span class=\"mtk17\">&gt;</span><span class=\"mtk1\">;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">  }</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">});</span></span></code></pre>\n<p>Which, in ES6 implementation would be the equivalent of:</p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"javascript\" data-index=\"3\"><code class=\"grvsc-code\"><span class=\"grvsc-line\"><span class=\"mtk4\">class</span><span class=\"mtk1\"> </span><span class=\"mtk10\">HelloWorld</span><span class=\"mtk1\"> </span><span class=\"mtk4\">extends</span><span class=\"mtk1\"> </span><span class=\"mtk10\">React</span><span class=\"mtk1\">.</span><span class=\"mtk10\">Component</span><span class=\"mtk1\"> {</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">  </span><span class=\"mtk4\">constructor</span><span class=\"mtk1\">(</span><span class=\"mtk12\">props</span><span class=\"mtk1\">) {</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span><span class=\"mtk4\">super</span><span class=\"mtk1\">(</span><span class=\"mtk12\">props</span><span class=\"mtk1\">);</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span><span class=\"mtk4\">this</span><span class=\"mtk1\">.</span><span class=\"mtk12\">state</span><span class=\"mtk1\"> = {</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">      </span><span class=\"mtk12\">name:</span><span class=\"mtk1\"> </span><span class=\"mtk12\">props</span><span class=\"mtk1\">.</span><span class=\"mtk12\">name</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    }</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">  }</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">  </span><span class=\"mtk11\">render</span><span class=\"mtk1\">() {</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span><span class=\"mtk15\">return</span><span class=\"mtk1\"> </span><span class=\"mtk17\">&lt;</span><span class=\"mtk4\">span</span><span class=\"mtk17\">&gt;</span><span class=\"mtk1\">Hello </span><span class=\"mtk4\">{this</span><span class=\"mtk1\">.</span><span class=\"mtk12\">state</span><span class=\"mtk1\">.</span><span class=\"mtk12\">name</span><span class=\"mtk4\">}</span><span class=\"mtk17\">&lt;/</span><span class=\"mtk4\">span</span><span class=\"mtk17\">&gt;</span><span class=\"mtk1\">;</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">  }</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">}</span></span></code></pre>\n<h2 id=\"autobinding\" style=\"position:relative;\"><a href=\"#autobinding\" aria-label=\"autobinding permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Autobinding</h2>\n<p>One difference worth noting is that the <code>create-react-class</code> method automatically binds <code>this</code> to every attribute method. This no longer holds true if you define React components using the common ES6 class syntax, making it so that you have to manually bind <code>this</code> to internal methods:</p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"javascript\" data-index=\"4\"><code class=\"grvsc-code\"><span class=\"grvsc-line\"><span class=\"mtk4\">class</span><span class=\"mtk1\"> </span><span class=\"mtk10\">HelloWorld</span><span class=\"mtk1\"> </span><span class=\"mtk4\">extends</span><span class=\"mtk1\"> </span><span class=\"mtk10\">React</span><span class=\"mtk1\">.</span><span class=\"mtk10\">Component</span><span class=\"mtk1\"> {</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">  </span><span class=\"mtk4\">constructor</span><span class=\"mtk1\">(</span><span class=\"mtk12\">props</span><span class=\"mtk1\">) {</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span><span class=\"mtk4\">super</span><span class=\"mtk1\">(</span><span class=\"mtk12\">props</span><span class=\"mtk1\">);</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span><span class=\"mtk4\">this</span><span class=\"mtk1\">.</span><span class=\"mtk12\">state</span><span class=\"mtk1\"> = {</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">      </span><span class=\"mtk12\">name:</span><span class=\"mtk1\"> </span><span class=\"mtk12\">props</span><span class=\"mtk1\">.</span><span class=\"mtk12\">name</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    }</span></span>\n<span class=\"grvsc-line\"></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span><span class=\"mtk4\">this</span><span class=\"mtk1\">.</span><span class=\"mtk12\">changeName</span><span class=\"mtk1\"> = </span><span class=\"mtk4\">this</span><span class=\"mtk1\">.</span><span class=\"mtk12\">changeName</span><span class=\"mtk1\">.</span><span class=\"mtk11\">bind</span><span class=\"mtk1\">(</span><span class=\"mtk4\">this</span><span class=\"mtk1\">);</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">  }</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">  </span><span class=\"mtk11\">changeName</span><span class=\"mtk1\">() {</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span><span class=\"mtk4\">this</span><span class=\"mtk1\">.</span><span class=\"mtk11\">setState</span><span class=\"mtk1\">({ </span><span class=\"mtk12\">name:</span><span class=\"mtk1\"> </span><span class=\"mtk8\">&quot;World&quot;</span><span class=\"mtk1\"> });</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">  }</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">  ...</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">}</span></span></code></pre>\n<p>Or otherwise use the “arrow function” shorthand which takes care of binding:</p>\n<pre class=\"grvsc-container dark-default-dark\" data-language=\"javascript\" data-index=\"5\"><code class=\"grvsc-code\"><span class=\"grvsc-line\"><span class=\"mtk4\">class</span><span class=\"mtk1\"> </span><span class=\"mtk10\">HelloWorld</span><span class=\"mtk1\"> </span><span class=\"mtk4\">extends</span><span class=\"mtk1\"> </span><span class=\"mtk10\">React</span><span class=\"mtk1\">.</span><span class=\"mtk10\">Component</span><span class=\"mtk1\"> {</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">  </span><span class=\"mtk4\">constructor</span><span class=\"mtk1\">(</span><span class=\"mtk12\">props</span><span class=\"mtk1\">) {</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span><span class=\"mtk4\">super</span><span class=\"mtk1\">(</span><span class=\"mtk12\">props</span><span class=\"mtk1\">);</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span><span class=\"mtk4\">this</span><span class=\"mtk1\">.</span><span class=\"mtk12\">state</span><span class=\"mtk1\"> = {</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">      </span><span class=\"mtk12\">name:</span><span class=\"mtk1\"> </span><span class=\"mtk12\">props</span><span class=\"mtk1\">.</span><span class=\"mtk12\">name</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    }</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">  }</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">  </span><span class=\"mtk11\">changeName</span><span class=\"mtk1\"> = () </span><span class=\"mtk4\">=&gt;</span><span class=\"mtk1\"> {</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">    </span><span class=\"mtk4\">this</span><span class=\"mtk1\">.</span><span class=\"mtk11\">setState</span><span class=\"mtk1\">({ </span><span class=\"mtk12\">name:</span><span class=\"mtk1\"> </span><span class=\"mtk8\">&quot;World&quot;</span><span class=\"mtk1\"> });</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">  }</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">  ...</span></span>\n<span class=\"grvsc-line\"><span class=\"mtk1\">}</span></span></code></pre>\n<h2 id=\"parting-words\" style=\"position:relative;\"><a href=\"#parting-words\" aria-label=\"parting words permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Parting Words</h2>\n<p>Since the update to ES6, there have been multiple new React iterations. You could now forgo the <code>constructor</code> declaration altogether and just declare <code>state</code> inline as a class member, or utilize React Hooks as a new way to initialize states. However, the ES5 support remains useful for legacy systems and adds to the overall flexibility of React as a toolset.</p>\n<p>You can read more about React's ES5 support <a href=\"https://reactjs.org/docs/react-without-es6.html\">in the official doc entry here</a>, and <a href=\"https://reactjs.org/blog/2015/01/27/react-v0.13.0-beta-1.html\">the v0.13.0 beta release blog entry here</a>, for the respective ES6 changes.</p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n  .dark-default-dark {\n    background-color: #1E1E1E;\n    color: #D4D4D4;\n  }\n  .dark-default-dark .mtk4 { color: #569CD6; }\n  .dark-default-dark .mtk1 { color: #D4D4D4; }\n  .dark-default-dark .mtk10 { color: #4EC9B0; }\n  .dark-default-dark .mtk11 { color: #DCDCAA; }\n  .dark-default-dark .mtk15 { color: #C586C0; }\n  .dark-default-dark .mtk17 { color: #808080; }\n  .dark-default-dark .mtk12 { color: #9CDCFE; }\n  .dark-default-dark .mtk8 { color: #CE9178; }\n</style>","frontmatter":{"date":"January 05, 2021","updated_date":null,"description":"No ES6? No problem. getInitialState is the ES5 friendly method to define the initial state of a React component.","title":"Constructor vs getInitialState in React","tags":["JavaScript","React"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5037593984962405,"src":"/static/d152aa4ad7b599edbdd9b6465d8f014b/58556/index.webp","srcSet":"/static/d152aa4ad7b599edbdd9b6465d8f014b/61e93/index.webp 200w,\n/static/d152aa4ad7b599edbdd9b6465d8f014b/1f5c5/index.webp 400w,\n/static/d152aa4ad7b599edbdd9b6465d8f014b/58556/index.webp 800w,\n/static/d152aa4ad7b599edbdd9b6465d8f014b/2eb2f/index.webp 865w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Nathan Nguyen","github":"nathannguyenn","avatar":null}}}},{"node":{"excerpt":"Engineering as marketing is an especially under-used medium, and when implemented correctly, it has proven to be very useful. It's under…","fields":{"slug":"/growth/engineering-as-marketing/"},"html":"<p>Engineering as marketing is an especially under-used medium, and when implemented correctly, it has proven to be very useful. It's under-used because it's very costly and can not suit traditional marketing or development plans. Imagine two weeks of iterations or tests where the critical route is to create a small project. It just doesn't work, either in terms of time or budget.</p>\n<p>Engineering as Marketing is about using your engineering time (or that of your team) to create useful resources such as calculators, checkers or checklists, widgets, and even micro-sites that bring potential customers in need of your company.</p>\n<p>In the long-term, producing tools that your target audience finds useful will do wonders for your business. Ideally, organizations should expand exponentially to make this tool free for their users.</p>\n<p><strong>Here are some reasons why a business will produce high growth with free tools:</strong></p>\n<ul>\n<li>Engineering, like marketing, is close to content marketing in the sense that you are creating assets. Free instruments can virally expand. And as the years go by, free resources will stay important to your users.</li>\n<li>And if your customers have the money to purchase software, a lucrative choice is still open. </li>\n<li>You have to build trust. It would be best if you showed your clients that you not only appreciate their concerns but are also willing to provide them with tangible value.</li>\n</ul>\n<h2 id=\"five-engineering-as-marketing-strategies\" style=\"position:relative;\"><a href=\"#five-engineering-as-marketing-strategies\" aria-label=\"five engineering as marketing strategies permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Five Engineering as Marketing Strategies</h2>\n<p>There are obstacles when it comes to engineering commercialization. It takes effort to develop and sustain an effective marketing plan for an engineering company, from selecting the correct tactics to writing the best sales copy.</p>\n<p>Digital marketing is a vital part of how an engineering company can be sold. This is how most individuals now find information: for almost all, including businesses to work with, they turn to the Internet. So you could struggle to attract potential leads if your engineering company is not well-represented or easy to find online. Not just that, you're going to lose them to your rivals.</p>\n<p>Create a more robust marketing approach with these five engineering marketing strategies for your engineering company:</p>\n<h3 id=\"1-create-high-quality-content\" style=\"position:relative;\"><a href=\"#1-create-high-quality-content\" aria-label=\"1 create high quality content permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. Create High-Quality Content</h3>\n<p>The quality content, which can include anything from blog posts and videos to marketing guides and ebooks, is loved by search engines and social website users.</p>\n<p>You will hit the most eligible prospects as they are already looking online by producing and publishing useful material. And after finding helpful content posted by your business, people will be more likely to want to find more information about your engineering company.</p>\n<h3 id=\"2-utilize-social-evidence\" style=\"position:relative;\"><a href=\"#2-utilize-social-evidence\" aria-label=\"2 utilize social evidence permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. Utilize Social Evidence</h3>\n<p>One of the most relevant and frequently ignored tips is to use data from close to your future customers but have started using your device and are super excited about it. People prefer to trust what other individuals have already learned and checked and have something useful to share. Only add a couple of constructive reviews and comments on the website, and your conversion rates will see a boost.</p>\n<p>Many B2B companies wonder why social media accounts should be started. <a href=\"https://www.loginradius.com/blog/identity/2018/11/reconsidering-social-login-security-privacy-angle/\">Social media provides</a> a perfect way to connect with current and future clients, regardless of the industry or business model.</p>\n<h3 id=\"3-leveraging-seo\" style=\"position:relative;\"><a href=\"#3-leveraging-seo\" aria-label=\"3 leveraging seo permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3. Leveraging SEO</h3>\n<p>One of the easiest ways to boost your engineering company's online exposure is search engine optimization or SEO. It should be one of your top priorities when <a href=\"https://www.visme.co/marketing-plan/\">designing your overall marketing plan</a>.</p>\n<p>SEO requires making improvements to specific items on your website to increase the probability that the phrases you are targeting will rank well. These improvements may include adding keywords to your page names, updating and adding copies to your site, quicker loading of your pages, enhancing the layout of your site, and so on.</p>\n<h3 id=\"4-launch-an-email-newsletter\" style=\"position:relative;\"><a href=\"#4-launch-an-email-newsletter\" aria-label=\"4 launch an email newsletter permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>4. Launch an Email Newsletter</h3>\n<p>Email newsletters are a perfect way to communicate with prospective customers, keep in contact with current customers, and improve your link with both groups. While past email marketing tactics may have included making hard sales pitches, and you may think of e-commerce emails as being about sales specials or discounts, it is all about adding value to engineering email marketing.</p>\n<h3 id=\"5-the-power-of-online-reviews\" style=\"position:relative;\"><a href=\"#5-the-power-of-online-reviews\" aria-label=\"5 the power of online reviews permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>5. The Power of Online Reviews</h3>\n<p>An increasingly significant feature of marketing engineering services is online feedback. Reviews are the modern-day word of mouth counterpart, and a successful review will help the company attract new customers. On the opposite, your chances of attracting fresh customers can be hurt by not getting feedback.</p>\n<p>You should track your company's online feedback and respond to the questions people have about them. Try to take the feedback constructively and focus on improving any missed areas of your service.</p>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>You can incorporate a range of Internet marketing approaches with a little practice and some experimentation into a detailed strategy that increases your company's exposure and credibility, attracting more leads and inspiring more potential customers to select your company for their engineering needs.</p>\n<p>If it blends into the overall story with goal and vision, the use of resources that might already be available in the organization is promising. Marketing as Engineering is at the top of the funnel region in the marketing funnel.</p>\n<p>If you build the lead magnets so that they deliver a quick win and do not give too many possibilities to the consumer, you lay the foundation stone for throwing out a net in which you can attract the long-term attention of prospective customers to yourself.</p>\n<p><a href=\"https://www.loginradius.com/contact-us?utm_source=blog&#x26;utm_medium=web&#x26;utm_campaign=engineering-as-marketing\"><img src=\"/8fce571f703a5970dbb1359a2fe0e51a/book-a-demo-loginradius.webp\" alt=\"book-a-demo-loginradius\"></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"January 05, 2021","updated_date":null,"description":"Engineering as Marketing is about utilising engineering time to build helpful tools such as calculators, checkers or checklists, widgets, and even micro-sites that introduce your business to potential customers.","title":"Engineering As Marketing: 5 Growth Hack Strategies For Modern Businesses","tags":null,"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.7699115044247788,"src":"/static/17839d77db7a64dfea6b8948595e2ae5/58556/engineering-as-marketing.webp","srcSet":"/static/17839d77db7a64dfea6b8948595e2ae5/61e93/engineering-as-marketing.webp 200w,\n/static/17839d77db7a64dfea6b8948595e2ae5/1f5c5/engineering-as-marketing.webp 400w,\n/static/17839d77db7a64dfea6b8948595e2ae5/58556/engineering-as-marketing.webp 800w,\n/static/17839d77db7a64dfea6b8948595e2ae5/99238/engineering-as-marketing.webp 1200w,\n/static/17839d77db7a64dfea6b8948595e2ae5/7c22d/engineering-as-marketing.webp 1600w,\n/static/17839d77db7a64dfea6b8948595e2ae5/0be01/engineering-as-marketing.webp 4206w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.webp"}}}}]},"markdownRemark":{"excerpt":"Identity is evolving, and developers are at the forefront of this transformation. Every day brings a new learning—adapting to new standards…","fields":{"slug":"/identity/developer-first-identity-provider-loginradius/"},"html":"<p>Identity is evolving, and developers are at the forefront of this transformation. Every day brings a new learning—adapting to new standards and refining approaches to building secure, seamless experiences.</p>\n<p>We’re here to support developers on that journey. We know how important simplicity, efficiency, and well-structured documentation are when working with identity and access management solutions. That’s why we’ve redesigned the <a href=\"https://www.loginradius.com/\">LoginRadius website</a>—to be faster, more intuitive, and developer-first in every way.</p>\n<p>The goal? Having them spend less time searching and more time building.</p>\n<h2 id=\"whats-new-and-improved-on-the-loginradius-website\" style=\"position:relative;\"><a href=\"#whats-new-and-improved-on-the-loginradius-website\" aria-label=\"whats new and improved on the loginradius website permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What’s New and Improved on the LoginRadius Website?</h2>\n<p>LoginRadius’ vision is to give developers a product that simplifies identity management so they can focus on building, deploying, and scaling their applications. To enhance this experience, we’ve spent the last few months redesigning our interface— making navigation more intuitive and reassuring that essential resources are easily accessible.</p>\n<p>Here’s a closer look at what’s new and why it’s important:</p>\n<h3 id=\"a-developer-friendly-dark-theme\" style=\"position:relative;\"><a href=\"#a-developer-friendly-dark-theme\" aria-label=\"a developer friendly dark theme permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>A Developer-Friendly Dark Theme</h3>\n<p><img src=\"/f46881583c7518a93bb24e94c32320de/a-developer-friendly-dark-theme.webp\" alt=\"This image shows how LoginRadius offers several authentication methods like traditional login, social login, passwordless login, passkeys and more in a dark mode.\">    </p>\n<p>Developers spend long hours working in dark-themed IDEs and terminals, so we’ve designed the LoginRadius experience to be developer-friendly and align with that preference.</p>\n<p>The new dark mode reduces eye strain, enhances readability, and provides a seamless transition between a coding environment and our platform. Our new design features a clean, modern aesthetic with a consistent color scheme and Barlow typography, ensuring better readability. High-quality graphics and icons are thoughtfully placed to enhance the content without adding visual clutter.</p>\n<p>So, whether you’re navigating our API docs or configuring authentication into your system, our improved interface will make those extended development hours more comfortable and efficient.</p>\n<h3 id=\"clear-categorization-for-loginradius-capabilities\" style=\"position:relative;\"><a href=\"#clear-categorization-for-loginradius-capabilities\" aria-label=\"clear categorization for loginradius capabilities permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Clear Categorization for LoginRadius Capabilities</h3>\n<p><img src=\"/e5358b82be414940f3fb146013845933/capabilities.webp\" alt=\"This image shows a breakdown of all the LoginRadius CIAM capabilities, including authentication, security, UX, scalability and multi-brand management.\"></p>\n<p>We’ve restructured our website to provide a straightforward breakdown of our customer identity and access management platform capabilities, helping you quickly find what you need:</p>\n<ul>\n<li>Authentication: Easily understand <a href=\"https://www.loginradius.com/blog/identity/authentication-option-for-your-product/\">how to choose the right login method</a>, from traditional passwords and OTPs to social login, federated SSO, and passkeys with few lines of code.</li>\n<li>Security: Implement no-code security features like bot detection, IP throttling, breached password alerts, DDoS protection, and adaptive MFA to safeguard user accounts.</li>\n<li>User Experience: Leverage AI builder, hosted pages, and drag-and-drop workflows to create smooth, branded sign-up and login experiences.</li>\n<li>High Performance &#x26; Scalability: Confidently scale with sub-100ms API response times, 100% uptime, 240K+ RPS, and 28+ global data center regions.</li>\n<li>Multi-Brand Management: Efficiently manage multiple identity apps, choosing isolated or shared data stores based on your brand’s unique needs.</li>\n</ul>\n<p>This structured layout ensures you can quickly understand each capability and how it integrates into your identity ecosystem.</p>\n<h3 id=\"developer-first-navigation\" style=\"position:relative;\"><a href=\"#developer-first-navigation\" aria-label=\"developer first navigation permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Developer-First Navigation</h3>\n<p><img src=\"/a8c155c2b6faf3d5f4b4de4e2b14d763/developers-menu.webp\" alt=\"This image shows the LoginRadius menu bar, highlighting the developer dropdown.\">   </p>\n<p>We’ve been analyzing developer workflows to identify how you access key resources. That’s why we redesigned our navigation with one goal in mind: to reduce clicks and make essential resources readily available.</p>\n<p>The new LoginRadius structure puts APIs, SDKs, and integration guides right at the menu bar under the Developers dropdown so you can get started faster. Our Products, Solutions, and Customer Services are also clearly categorized, helping development teams quickly find the right tools and make informed decisions.</p>\n<h3 id=\"quick-understanding-of-integration-benefits\" style=\"position:relative;\"><a href=\"#quick-understanding-of-integration-benefits\" aria-label=\"quick understanding of integration benefits permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Quick Understanding of Integration Benefits</h3>\n<p><img src=\"/b2f9a964a2da0ea83e2f8596b833bba7/we-support-your-tech-stack.webp\" alt=\"This image shows a list of popular programming languages and frameworks offered by LoginRadius.\"></p>\n<p>Developers now have a clear view of the tech stack available with LoginRadius, designed to support diverse business needs.</p>\n<p>Our platform offers pre-built SDKs for Node.js, Python, Java, and more, making CIAM integration seamless across popular programming languages and frameworks.</p>\n<h2 id=\"over-to-you-now\" style=\"position:relative;\"><a href=\"#over-to-you-now\" aria-label=\"over to you now permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Over to You Now!</h2>\n<p>Check out our <a href=\"https://www.loginradius.com/\">revamped LoginRadius website</a> and see how the improved experience makes it easier to build, scale, and secure your applications.</p>\n<p>Do not forget to explore the improved navigation and API documentation, and get started with our free trial today. We’re excited to see what you’ll build with LoginRadius!</p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"February 21, 2025","updated_date":null,"description":"LoginRadius’ vision is to give developers a product that simplifies identity management so they can focus on building, deploying, and scaling their applications. To enhance this experience, we’ve redesigned our website interface, making navigation more intuitive and reassuring that essential resources are easily accessible.","title":"Revamped & Ready: Introducing the New Developer-First LoginRadius Website","tags":["Developer tools","API","Identity Management","User Authentication"],"pinned":true,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.7857142857142858,"src":"/static/80b4e4fbe176a10a327d273504607f32/58556/hero-section.webp","srcSet":"/static/80b4e4fbe176a10a327d273504607f32/61e93/hero-section.webp 200w,\n/static/80b4e4fbe176a10a327d273504607f32/1f5c5/hero-section.webp 400w,\n/static/80b4e4fbe176a10a327d273504607f32/58556/hero-section.webp 800w,\n/static/80b4e4fbe176a10a327d273504607f32/99238/hero-section.webp 1200w,\n/static/80b4e4fbe176a10a327d273504607f32/7c22d/hero-section.webp 1600w,\n/static/80b4e4fbe176a10a327d273504607f32/1258b/hero-section.webp 2732w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.webp"}}}},"pageContext":{"limit":6,"skip":636,"currentPage":107,"type":"///","numPages":164,"pinned":"ee8a4479-3471-53b1-bf62-d0d8dc3faaeb"}},"staticQueryHashes":["1171199041","1384082988","2100481360","23180105","528864852"]}