{"componentChunkName":"component---src-templates-blog-list-template-js","path":"/35","result":{"data":{"allMarkdownRemark":{"edges":[{"node":{"excerpt":"Introduction Today's customers live online and don't limit their lives to a particular app or website. They want to use any device and…","fields":{"slug":"/identity/what-is-dynamic-authorization/"},"html":"<h2 id=\"introduction\" style=\"position:relative;\"><a href=\"#introduction\" aria-label=\"introduction permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Introduction</h2>\n<p>Today's customers live online and don't limit their lives to a particular app or website. They want to use any device and access any resource from any place, at any time, or anywhere in the world. </p>\n<p>With this new, flexible digital freedom comes a whole new world of friction for businesses and enterprises — the conflict of continually entering usernames, passwords, and other credentials, even across the multiple devices customers use today.</p>\n<p><a href=\"https://www.loginradius.com/authentication/\">Authenticating users</a> based on how they access your applications is what we call dynamic authorization, and it's vital that you get it right. </p>\n<p>Dynamic authorization is a solution that allows you to strike the right balance between experience and security by unifying your customer profiles across multiple systems so that you have access to accurate information about each individual customer.</p>\n<p>In this article, we will explain how dynamic authorization works and discuss why it's important for your organization.</p>\n<h2 id=\"what-is-dynamic-authorization-and-how-does-it-work\" style=\"position:relative;\"><a href=\"#what-is-dynamic-authorization-and-how-does-it-work\" aria-label=\"what is dynamic authorization and how does it work permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is Dynamic Authorization and How Does it Work?</h2>\n<p>Dynamic authorization is a way to ensure that only authorized users have access to sensitive data and services. It's a process in which the application provides data to the central authorization system that identifies the nature of the request, such as a user ID and a target service or data. From there, the authorization system takes responsibility for collecting all additional data required to make the right authorization decision.</p>\n<p>Dynamic authorization is designed to reduce security risks by providing an extra layer of protection for your most important information.  It is a method of authentication that allows mobile apps to make requests for user data without actually asking for it. You only need to define your criteria once and then let the system decide based on what happens later on in the process.</p>\n<p>Dynamic authorizationensures that every employee has only the right amount of access to information based on their role in the company, which is critical to <a href=\"https://www.loginradius.com/security/\">preventing accidental data leaks</a> or hacking attempts. In addition to giving you complete control over who can see what data, it also allows for granular control over how data is accessed.</p>\n<h2 id=\"why-do-you-need-dynamic-authorization\" style=\"position:relative;\"><a href=\"#why-do-you-need-dynamic-authorization\" aria-label=\"why do you need dynamic authorization permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Why Do You Need Dynamic Authorization?</h2>\n<p>Dynamic authorization is a critical component of modern identity and access management (IAM) systems. Traditional IAM systems often rely on static access controls, which can be inflexible and difficult to manage as the number of users and resources grows. </p>\n<p>Dynamic authorization, on the other hand, enables fine-grained access control that can adapt to changing circumstances and user behavior.</p>\n<p>Dynamic authorization is particularly important for organizations that deal with sensitive data, such as financial or healthcare information. </p>\n<p>With dynamic authorization, organizations can implement access controls that are tailored to individual users, ensuring that only authorized users can access specific data or resources. </p>\n<p>This not only improves security but also helps organizations comply with regulations and data protection laws. Dynamic authorization can also streamline access management processes, reducing the burden on IT teams and improving user productivity.</p>\n<h2 id=\"benefits-of-dynamic-authorization-for-enterprises\" style=\"position:relative;\"><a href=\"#benefits-of-dynamic-authorization-for-enterprises\" aria-label=\"benefits of dynamic authorization for enterprises permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Benefits of Dynamic Authorization for Enterprises</h2>\n<h3 id=\"1-better-security-for-your-organization\" style=\"position:relative;\"><a href=\"#1-better-security-for-your-organization\" aria-label=\"1 better security for your organization permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. Better security for your organization</h3>\n<p>Dynamic authorization policies are the key to securing your enterprise environment. They allow you to define who can access what resources based on their role within the organization. The policies are updated in real-time as users change roles or lose access rights. This makes dynamic authorization an ideal solution for organizations that want to ensure their employees don't have inappropriate access to sensitive information or services.</p>\n<h3 id=\"2-achieving-seamless-experiences-is-the-key\" style=\"position:relative;\"><a href=\"#2-achieving-seamless-experiences-is-the-key\" aria-label=\"2 achieving seamless experiences is the key permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. Achieving seamless experiences is the key</h3>\n<p>Dynamic authorization helps you tailor logic around what your customers can see and do on your site or app, which leads to increased engagement, satisfaction, and revenue. With authorization in the background providing a more straightforward, seamless frontend experience for users - you can offer a personalized experience which keeps them coming back for more. You can also control what your customers see and do, leading to increased engagement and revenue.</p>\n<h3 id=\"3-better-compliance\" style=\"position:relative;\"><a href=\"#3-better-compliance\" aria-label=\"3 better compliance permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3. Better compliance</h3>\n<p>Dynamic authorization helps you stay ahead of regulations and protect your organization from data breaches. It's a system that allows you to control which attributes can be accessed, shared, and used by different users. It also maintains privacy consent enforcement mechanisms so only those with the appropriate permissions can access or use data.</p>\n<p>In other words, it ensures that if someone tries to access something they aren't supposed to, they won't be able to do it.</p>\n<p><a href=\"https://www.loginradius.com/resource/role-of-data-and-privacy-compliance-in-retail\"><img src=\"/0da2449ab79544dedbca51ea6d9c57a3/WP-compliance-retailers.webp\" alt=\"WP-compliance-retailers\"></a></p>\n<h2 id=\"how-can-dynamic-authorization-improve-customer-experience\" style=\"position:relative;\"><a href=\"#how-can-dynamic-authorization-improve-customer-experience\" aria-label=\"how can dynamic authorization improve customer experience permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How Can Dynamic Authorization Improve Customer Experience?</h2>\n<p>Customers should always be at the center of your business strategy. Providing security is essential but not as important as providing an experience that lets customers from coming back for more. </p>\n<p>As customers expect more seamless and convenient experiences, companies must provide them with the ability to quickly and easily access their accounts and services. And that's where dynamic authorization comes into play. It is maturing and gaining momentum. It offers organizations the capabilities they need to deliver the seamless and convenient experiences that today's customers expect.</p>\n<p>All this time, we have known that understanding the identity of the person making a transaction that who they are, and what they are doing empowers companies to serve their customers better. But today, we find that dynamic authorization has a far more significant impact on businesses, their customers, and users than most people realize. It tremendously affects how companies must operate in an increasingly competitive digital world.</p>\n<p>It gives you the opportunity to not only improve customer experiences but also increase sales, create better products and services and ultimately transform your business into a data-driven one.</p>\n<h2 id=\"how-to-do-dynamic-authorizations-right\" style=\"position:relative;\"><a href=\"#how-to-do-dynamic-authorizations-right\" aria-label=\"how to do dynamic authorizations right permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How To Do Dynamic Authorizations Right?</h2>\n<p>To implement dynamic authorization effectively, organizations need to follow a few key best practices. First, it's important to define a clear access control policy that reflects the organization's security and compliance requirements. This policy should be regularly reviewed and updated as needed.</p>\n<p>Second, organizations should use a centralized authorization server to manage access control policies and make authorization decisions. This can help ensure consistency across different applications and resources, and simplify administration.</p>\n<p>Third, organizations should use contextual information to inform access decisions. For example, they can consider the user's role, location, device, and behavior when determining whether to grant access to a particular resource.</p>\n<p>Finally, organizations should implement ongoing monitoring and auditing of access events to identify and remediate any potential security issues. By following these best practices, organizations can ensure that their dynamic authorization system provides strong security and compliance capabilities while still being flexible and user-friendly.</p>\n<h2 id=\"in-conclusion\" style=\"position:relative;\"><a href=\"#in-conclusion\" aria-label=\"in conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>In Conclusion</h2>\n<p>Dynamic authorization can adapt quickly to changing business requirements now and in the future. It provides the flexibility you need to maintain an effective data security program while meeting your customer's expectations. </p>\n<p>With solutions that enable dynamic policy changes, you can easily adapt to changes in your business environment, control access to sensitive data, and minimize loss of control over that data. This allows you to confidently navigate business processes, knowing that you are fully prepared for any data security or compliance challenges.</p>\n<p><a href=\"https://www.loginradius.com/contact-us?utm_source=blog&#x26;utm_medium=web&#x26;utm_campaign=what-is-dynamic-authorization\"><img src=\"/8fce571f703a5970dbb1359a2fe0e51a/book-a-demo-loginradius.webp\" alt=\"book-a-demo-loginradius\"></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"November 17, 2022","updated_date":null,"description":"Dynamic authorization rewards customers with the security they need and effectively improves their experience with your brand. It helps to meet your customer’s needs and, at the same time, gives you much more control over how users access your services.","title":"What is Dynamic Authorization & Why Does it Matter?","tags":["dynamic authorization","compliance","cx"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5625,"src":"/static/abb36a95f53cbb5b5c71f2ed3f580d6a/7f8e9/dynamic-authorization.webp","srcSet":"/static/abb36a95f53cbb5b5c71f2ed3f580d6a/61e93/dynamic-authorization.webp 200w,\n/static/abb36a95f53cbb5b5c71f2ed3f580d6a/1f5c5/dynamic-authorization.webp 400w,\n/static/abb36a95f53cbb5b5c71f2ed3f580d6a/7f8e9/dynamic-authorization.webp 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.webp"}}}},{"node":{"excerpt":"Introduction Cybersecurity best practices aren’t a luxury anymore, especially in a digital era when remote working is swiftly becoming the…","fields":{"slug":"/identity/attack-surface-vs-attack-vector/"},"html":"<h2 id=\"introduction\" style=\"position:relative;\"><a href=\"#introduction\" aria-label=\"introduction permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Introduction</h2>\n<p>Cybersecurity best practices aren’t a luxury anymore, especially in a digital era when remote working is swiftly becoming the new normal. </p>\n<p>Cybercriminals are always searching for opportunities to exploit sensitive business information or customer data for various reasons, including financial benefits. And hence, businesses must understand and incorporate some essential cybersecurity aspects. </p>\n<p>The basics begin with understanding the difference between attack surface and attack vector. Once you know the difference between the two, you’re good to proceed to the next step, i.e., vulnerability management. </p>\n<p>Vulnerability management is essential in security, but more is needed. Attack surface and attack vector are two terms that can help you understand where vulnerabilities are most likely to occur, so you can <a href=\"https://blog.loginradius.com/identity/tips-from-loginradius-security-expert-2022/\">improve your security posture</a> and reduce risk.</p>\n<p>Let’s learn the differences between attack surface and vector and how businesses can reinforce their security structure. </p>\n<h2 id=\"attack-surface-vs-attack-vector---what-is-the-difference\" style=\"position:relative;\"><a href=\"#attack-surface-vs-attack-vector---what-is-the-difference\" aria-label=\"attack surface vs attack vector   what is the difference permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Attack Surface vs. Attack Vector - What is the Difference?</h2>\n<p>There are many ways that hackers can gain access to your network and steal data, but one of the most common is through a vulnerability. A vulnerability is a weakness in a system or application that allows an attacker to bypass security controls and execute malicious code.</p>\n<p>While these vulnerabilities can take on many forms, there are two main types: attack surface and vector. While both are important to understand, it’s important to note that they are not interchangeable terms.</p>\n<p>Attack surface refers to the number of points along an attack path that could potentially be vulnerable. If a bad actor has to take multiple steps before reaching your data or an endpoint, it is more difficult for them to succeed in their attacks. </p>\n<p>When assessing how secure your organization is against cyber threats, consider how many ways attackers can enter your system—and what those entry points might be.</p>\n<p>Attack vectors are specific types of threats that enter through those points of entry: they're things like malicious websites or email phishing scams that try to trick people into clicking on links or opening attachments, which allows malware onto devices or networks. </p>\n<h3 id=\"attack-surface-access-points\" style=\"position:relative;\"><a href=\"#attack-surface-access-points\" aria-label=\"attack surface access points permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Attack Surface Access Points</h3>\n<p>The surface access points are all the possible access points that cybercriminals can use to enter your system and exploit your data. Some of the common surface access points include: </p>\n<ul>\n<li><strong>APIs (Application Programming Interfaces)</strong></li>\n</ul>\n<p>The client-side applications, including mobile and web applications, directly communicate with the application's server-side through a <a href=\"https://blog.loginradius.com/identity/risk-management-with-holistic-apis/\">smart API</a>. And a little loophole in designing, developing, and testing the APIs could leave an entry gateway for bad actors. Hence, brands must ensure robust security while configuring and deploying APIs. </p>\n<ul>\n<li><strong>Networks</strong></li>\n</ul>\n<p>All network interaction points can be pretty vulnerable to cyberattacks. These include WiFi, IoT, remote access, clouds, servers, and VPNs. Ensuring stringent authentication security at every level within a network could mitigate the associated risks. </p>\n<ul>\n<li><strong>Users/Employees and Devices</strong></li>\n</ul>\n<p>Targeting employees and users and their devices is one of the most common ways hackers attack an enterprise to exploit sensitive information. Cybercriminals are always hunting for user/employee credentials and other ways to steal personal details from corporate devices. </p>\n<h3 id=\"attack-vector-access-points\" style=\"position:relative;\"><a href=\"#attack-vector-access-points\" aria-label=\"attack vector access points permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Attack Vector Access Points</h3>\n<p>The list goes endless regarding the number of attack vector access points. Here are some of the most common attack vectors:</p>\n<ul>\n<li><strong>Phishing Attacks</strong></li>\n</ul>\n<p>Phishing attacks are targeted attacks in which cybercriminals use social engineering tricks to access credentials and other important information. These attacks can be minimized by ensuring your employees/users are provided with frequent training on cybersecurity hygiene. </p>\n<ul>\n<li><strong>Credential Stuffing</strong></li>\n</ul>\n<p><a href=\"https://blog.loginradius.com/identity/prevent-credential-stuffing-attacks/\">Credential stuffing</a> is an automated injection of usernames and passwords already compromised in pairs to gain access to accounts. Attackers use the hit-and-trial methodology to access an account with compromised passwords. </p>\n<ul>\n<li><strong>Brute-Force Attacks</strong></li>\n</ul>\n<p>If a user/employee compromises their credentials, fraudsters will exploit the same to gain access to the business network. Brute force attacks cause losses worth millions of dollars every year. </p>\n<h2 id=\"final-thoughts\" style=\"position:relative;\"><a href=\"#final-thoughts\" aria-label=\"final thoughts permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Final Thoughts</h2>\n<p>Choosing a robust security mechanism is essential to overall security hygiene within an organization. However, knowing the fundamental differences between attack surface and vector makes all the difference. </p>\n<p>Once a business knows potential threat vectors, it can deploy stringent authentication security mechanisms to mitigate the risks.  </p>\n<p><a href=\"https://www.loginradius.com/contact-us?utm_source=blog&#x26;utm_medium=web&#x26;utm_campaign=attack-surface-vs-attack-vector\"><img src=\"/8fce571f703a5970dbb1359a2fe0e51a/book-a-demo-loginradius.webp\" alt=\"book-a-demo-loginradius\"></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"November 11, 2022","updated_date":null,"description":"Vulnerability management is essential in security, but more is needed. Attack surface and attack vector are two terms that can help you understand where vulnerabilities are most likely to occur, so you can improve your security posture and reduce risk.","title":"What’s the Difference Between Attack Surface and Attack Vector?","tags":["surface attack","attack vector","login security"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.7094017094017093,"src":"/static/ab03e5073b8ec82a3f2936e774a0fd07/7f8e9/attack-vector.webp","srcSet":"/static/ab03e5073b8ec82a3f2936e774a0fd07/61e93/attack-vector.webp 200w,\n/static/ab03e5073b8ec82a3f2936e774a0fd07/1f5c5/attack-vector.webp 400w,\n/static/ab03e5073b8ec82a3f2936e774a0fd07/7f8e9/attack-vector.webp 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"Vishal Sharma","github":null,"avatar":null}}}},{"node":{"excerpt":"Introduction Identification refers to who a person is and whether they can prove it. Standard identity documents like national IDs, birth…","fields":{"slug":"/growth/digital-identity-key-to-economic-growth/"},"html":"<h2 id=\"introduction\" style=\"position:relative;\"><a href=\"#introduction\" aria-label=\"introduction permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Introduction</h2>\n<p>Identification refers to who a person is and whether they can prove it. Standard identity documents like national IDs, birth certificates, passports, voter IDs, and driving licenses generally exist in physical form. However, <a href=\"https://www.loginradius.com/authentication/\">newer forms of remote authentication</a> via digital platforms are gaining acceptance by national or local governments, private or nonprofit organizations, and individual entities as valid IDs. </p>\n<p>By their design, verifying details in an ID document against an individual’s application and photograph prove their identity and allow them to access a service. Verification of traditional forms of identification is easily achieved face-to-face with the individual. However, the situation gets complicated when they need to verify their physical self against a digital identity.</p>\n<p>In this article, we’ll look at digital identification, the risks, and how it can help with growth on an inclusion and economic level.</p>\n<h2 id=\"what-is-digital-identification\" style=\"position:relative;\"><a href=\"#what-is-digital-identification\" aria-label=\"what is digital identification permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is Digital Identification?</h2>\n<p>A digital ID is a digitized representation of legal identity, and unlike traditional paper-based IDs, digital identification allows for remote verification via digital channels. ID-issuing entities include national or local governments, nonprofit or private organizations, consortiums, or individual platform providers.</p>\n<p>Many digital identification and <a href=\"https://www.loginradius.com/authentication/\">authentication technologies</a> apply, including username and password combinations, intelligent devices, RFID, security tokens, or PINs.</p>\n<p>The features of digital ID are:</p>\n<ul>\n<li>Authenticated and verified to a high degree of assurance to meet both government and private-sector institutions’ standards</li>\n<li>Unique and corresponding to a single entity</li>\n<li>Established with the consent of the user</li>\n<li>Protecting the privacy of users and giving them control over their data through built-in safeguards</li>\n</ul>\n<h2 id=\"how-digital-ids-help-with-inclusive-economic-growth\" style=\"position:relative;\"><a href=\"#how-digital-ids-help-with-inclusive-economic-growth\" aria-label=\"how digital ids help with inclusive economic growth permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How Digital IDs Help With Inclusive Economic Growth?</h2>\n<p><a href=\"https://www.mckinsey.com/capabilities/mckinsey-digital/our-insights/digital-identification-a-key-to-inclusive-growth\">According to a report</a>, nations that implement and encourage the use of digital identities can potentially increase their GDPs between 3 and 13 percent. Moreover, the development is inclusive, where everyone has an equal opportunity to prosper economically.</p>\n<p>Here’s how implementing digital identities produce economic growth:</p>\n<h3 id=\"1-strengthening-transparency-and-service-delivery\" style=\"position:relative;\"><a href=\"#1-strengthening-transparency-and-service-delivery\" aria-label=\"1 strengthening transparency and service delivery permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. Strengthening transparency and service delivery</h3>\n<p>Digital ID can play a role in unlocking noneconomic value and potentially bringing progress towards achieving the ideals of transparency and rights protection. Digital identification helps to promote increased and inclusive access to healthcare, education, and labor markets. </p>\n<p>Furthermore, it can aid in safe migration and promote greater civic participation. A good example is Estonia, which delivers more than 90% of public services digitally. More than 30% of people vote online, <a href=\"https://estoniaevoting.org/\">and 20% say</a> they would never vote at a physical polling station. </p>\n<p>Digital ID could also help enforce rights enshrined in the law. For instance, in India, the right of its people to claim government-subsidized food from ration stores is protected. A remote ID system authenticates their identity instead of leaving the task to the discretion of local government officials.</p>\n<h3 id=\"2-better-access-to-public-services\" style=\"position:relative;\"><a href=\"#2-better-access-to-public-services\" aria-label=\"2 better access to public services permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. Better access to public services</h3>\n<p>The political world and corporations continue to push for various digital ID initiatives to support transformation by ensuring secure online access to public services. Improved access to public services through electronic identification facilitates trade and economic growth. </p>\n<p>A good example is the European Union, which adopted the eIDAS regulation that facilitates trust services, electronic ID, and the easy exchange of administrative documents throughout the region. The European digital identity, available to EU citizens and all European businesses, allows users to quickly access public services within any of the Union’s member states.</p>\n<h3 id=\"3-reduced-fraud-and-leakage\" style=\"position:relative;\"><a href=\"#3-reduced-fraud-and-leakage\" aria-label=\"3 reduced fraud and leakage permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3. Reduced fraud and leakage</h3>\n<p>Digital identification can help to lower fraud rates in transactions across the private and public sectors. For instance, there may be decreased payroll fraud rates from worker interactions or lower levels of identity fraud in taxpayer, consumer, and beneficiary transactions.</p>\n<p>The most significant sources of <a href=\"https://www.loginradius.com/blog/identity/enterprise-needs-digital-business-transformation-strategy/\">value that digital ID offers</a> to the government and the private sector are reduced fraud, cost savings, improved productivity, increased sales of various goods and services, and boosted tax revenue. </p>\n<p>At face value, these advantages appear to benefit institutions primarily. However, individuals are also likely to see value through lower prices, government revenue redirected toward social development, higher accountability of officials, and improved service delivery. Furthermore, while digital identity verification providers are not required by law to comply with the PCI standards (meant to protect cardholder data in financial transactions), most do, giving consumers the assurance that their PII is in safe hands.</p>\n<p>The fact that individuals are becoming savvier to the <a href=\"https://blog.loginradius.com/identity/pros-cons-reusable-digital-identity/\">benefits of digital ID</a> is seen with most consumers looking for banking accounts that <a rel=\"nofollow\" href=\"https://www.creditdonkey.com/best-business-checking-account.html\"> come with essential security features </a> such as Multi-Factor Authentication (MFA), among other digital identification features.</p>\n<p><a href=\"https://www.loginradius.com/resource/ebook/buyers-guide-to-multi-factor-authentication/\"><img src=\"/b319bf6ed09ba90828b27b6cc2c2eb75/EB-GD-to-MFA.webp\" alt=\"EB-GD-to-MFA\"></a></p>\n<h3 id=\"4-financial-inclusion\" style=\"position:relative;\"><a href=\"#4-financial-inclusion\" aria-label=\"4 financial inclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>4. Financial inclusion</h3>\n<p>The increased use of technology within the financial services sector raises questions about digital identity and ID verification platforms’ role in ensuring financial inclusion. These concerns are particularly keen when digital financial solutions and digital ID systems have come to the fore as drivers of economic development.</p>\n<p>Robust and outcome-based digital identification assurance standards can help many who suffer from financial exclusion through a lack of access to traditional government-issued ID documents. These individuals can access digital identification credentials at less stringent identity assurance levels for appropriate low-risk applications and use the IDs to obtain financial services.</p>\n<h2 id=\"what-are-the-risks-of-digital-ids\" style=\"position:relative;\"><a href=\"#what-are-the-risks-of-digital-ids\" aria-label=\"what are the risks of digital ids permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What are the Risks of Digital IDs?</h2>\n<p>Every great technology has its flaws, and digital identity is no exception. It has the potential for misuse and comes with a few pretty significant risks: </p>\n<ul>\n<li>An authoritarian government could use it to gain political and social control.</li>\n<li>A private sector company might use the information to influence consumers in ways they neither desire nor understand.</li>\n<li>McKinsey Global Institute estimates that synthetic identity fraud is the fastest-growing financial crime in the US and results in losses of <a rel=\"nofollow\" href=\"https://www.mckinsey.com/capabilities/risk-and-resilience/our-insights/fighting-back-against-synthetic-identity-fraud\"> more than $6 billion </a> annually.</li>\n<li>Because many low-assurance interactions use digital IDs, there is the potential for <a href=\"https://blog.loginradius.com/identity/phishing-for-identity/\">phishing scams</a> and other cybersecurity breaches, posing a high risk to the digital economy.</li>\n</ul>\n<p>The risks above mean that policymakers, platform providers, and organizations that use the digital ecosystem must grapple with the dangers of the connectivity and information sharing required by digital identification solutions.</p>\n<h2 id=\"in-conclusion\" style=\"position:relative;\"><a href=\"#in-conclusion\" aria-label=\"in conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>In Conclusion</h2>\n<p>Besides enabling social and civic empowerment, digital identification is critical for measurable and inclusive economic growth. Although most people are familiar with the apparent benefits of digitizing identification processes, it’s less well understood that private and public services, and the necessary identity verification to use them, are linked to individual progress and overall nation-building. </p>\n<p>Through sound design principles and policy enforcement, digital protects individual rights from abuse and creates economic benefits for states, institutions, and people.</p>\n<p><a href=\"https://www.loginradius.com/contact-us?utm_source=blog&#x26;utm_medium=web&#x26;utm_campaign=digital-identity-key-to-economic-growth\"><img src=\"/8fce571f703a5970dbb1359a2fe0e51a/book-a-demo-loginradius.webp\" alt=\"book-a-demo-Consultation\"></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"November 09, 2022","updated_date":null,"description":"A digital ID is a digitized representation of legal identity, and unlike traditional paper-based IDs, digital identification allows for remote verification via digital channels.  In this article, we’ll look at  how digital identification can help with growth on an economic level.","title":"How Digital Identification Could Be the Key to Inclusive and Economic Growth?","tags":["digital identity","mfa","cx","data security"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5267175572519085,"src":"/static/ff32459971e03d0712f3a3f179618465/7f8e9/digital-id.webp","srcSet":"/static/ff32459971e03d0712f3a3f179618465/61e93/digital-id.webp 200w,\n/static/ff32459971e03d0712f3a3f179618465/1f5c5/digital-id.webp 400w,\n/static/ff32459971e03d0712f3a3f179618465/7f8e9/digital-id.webp 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"Alex Williams","github":null,"avatar":null}}}},{"node":{"excerpt":"Introduction The world has been through many changes in the last few years. We've gone from analog to digital, brick-and-mortar to online…","fields":{"slug":"/identity/secure-data-amidst-identity-crisis-via-identity-based-access/"},"html":"<h2 id=\"introduction\" style=\"position:relative;\"><a href=\"#introduction\" aria-label=\"introduction permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Introduction</h2>\n<p>The world has been through many changes in the last few years. We've gone from analog to digital, brick-and-mortar to online retail, and face-to-face interactions to social media. </p>\n<p>And although this evolution of our everyday life has made it easier for us, it's also made things more complicated for businesses and organizations that handle private information and data daily. </p>\n<p>Data leaks from big organizations have become common, but not because we need the tools to prevent them. We have better technology and identity management tools, but the problem is that conventional identity management tools aren’t potent enough to shield modern threat vectors. </p>\n<p>There’s a need for a <a href=\"https://www.loginradius.com/\">robust identity management solution</a> that combines existing authentication strategies such as two-factor authentication, biometric authentication, one-time passwords, and password rotation policies to help secure an organization's infrastructure.</p>\n<p>Let’s uncover the aspects of leveraging identity authentication and why businesses must put their best foot forward in adopting robust identity and access management solutions combining multiple authentication mechanisms. </p>\n<h2 id=\"flaws-in-the-conventional-password-based-authentication-systems\" style=\"position:relative;\"><a href=\"#flaws-in-the-conventional-password-based-authentication-systems\" aria-label=\"flaws in the conventional password based authentication systems permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Flaws in the Conventional Password-Based Authentication Systems</h2>\n<p>The current password-based authentication system isn't keeping end users and businesses safe against malicious cyber attacks. </p>\n<p>Despite the popularity of password-based authentication systems, researchers have pointed out that these systems pose a significant threat to security. </p>\n<p>Several significant security breaches have recently raised the alarm about the vulnerability of such systems and the risk brought in by password-based authentication. But are we any closer to finding better replacements?</p>\n<p>Cybercriminals can quickly access confidential information stored on servers by stealing passwords from database servers or accessing web applications, such as password management tools. </p>\n<p>There's another way, a better way, to protect your organization's customer data. It's called <a href=\"https://www.loginradius.com/multi-factor-authentication/\">multi-factor authentication</a> (MFA). It's an authentication mechanism that provides additional security by requiring a user to provide multiple layers of authentication before granting access.</p>\n<p>However, the way businesses leverage MFA makes all the difference. Let’s understand how businesses can get the best out of their MFA mechanisms. </p>\n<h2 id=\"multi-factor-authentication-mfa---the-key-to-secure-digital-identities\" style=\"position:relative;\"><a href=\"#multi-factor-authentication-mfa---the-key-to-secure-digital-identities\" aria-label=\"multi factor authentication mfa   the key to secure digital identities permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Multi-Factor Authentication (MFA) - The Key to Secure Digital Identities</h2>\n<p>There are many ways you can keep your accounts secure, but there's one thing that's always a significant first step: multi-factor authentication.</p>\n<p>Multi-factor authentication (MFA) ensures that even if someone gets your password and tries to log into your account, they still won't be able to because they'll need another layer of authentication before they can access it.</p>\n<p>There are many different ways you can do this—from security questions to one-time passwords—but whatever method you choose, MFA is always a great way to provide secure access by verifying user identities.</p>\n<p>However, adding biometric authentication through facial recognition or fingerprint authentication could do wonders regarding reinforcing security. </p>\n<p>Every individual has a unique biometric identity, so using it for authentication mitigates the chances of a data breach. </p>\n<p>Hence, adding biometric authentication in the multi-factor authentication could help organizations secure their sensitive business information since the chances of data breaches or account takeover decrease significantly. </p>\n<p><a href=\"https://www.loginradius.com/resource/mobile-biometric-authentication-datasheet\"><img src=\"/38f418df5cabbcfe8bd70a1fd421c4ff/DS-mob-bio-auth.webp\" alt=\"DS-mob-bio-auth\"></a></p>\n<h2 id=\"why-is-multi-factor-authentication-an-essential-component-of-infrastructure-security\" style=\"position:relative;\"><a href=\"#why-is-multi-factor-authentication-an-essential-component-of-infrastructure-security\" aria-label=\"why is multi factor authentication an essential component of infrastructure security permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Why is Multi-factor authentication an Essential Component of Infrastructure Security?</h2>\n<h3 id=\"1-secures-consumer-identities\" style=\"position:relative;\"><a href=\"#1-secures-consumer-identities\" aria-label=\"1 secures consumer identities permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>#1. Secures consumer identities</h3>\n<p>MFA is an essential tool for protecting consumer data from identity theft. By implementing this measure, the security of the traditional username and password login is supplemented by an additional layer of protection. </p>\n<p>Cybercriminals will have difficulty cracking OTP since it is sent via SMS or an automated phone call. A consumer needs two pieces of information to access their resource. MFA adds a sense of mindfulness to authentication.</p>\n<h3 id=\"2-helps-meet-regulatory-compliance\" style=\"position:relative;\"><a href=\"#2-helps-meet-regulatory-compliance\" aria-label=\"2 helps meet regulatory compliance permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>#2. Helps meet regulatory compliance</h3>\n<p>Implementing multi-factor authentication can be crucial when complying with specific industry regulations. </p>\n<p>For example, PCI-DSS requires MFA to be implemented in certain situations to prevent unauthorized users from accessing systems. So, even when application updates lead to unknown and unattended consequences, MFA compliance ensures that it remains virtually non-intrusive.</p>\n<h3 id=\"3-builds-customer-trust\" style=\"position:relative;\"><a href=\"#3-builds-customer-trust\" aria-label=\"3 builds customer trust permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>#3. Builds customer trust</h3>\n<p>Another great benefit of leveraging MFA is that it helps build long-lasting relationships with customers. </p>\n<p>Since MFA offers excellent security and helps businesses adhere to global compliances, it helps build trust in present customers and potential clients. Therefore, businesses that <a href=\"https://blog.loginradius.com/identity/loginradius-creates-trusted-digital-experience/\">build customer trust</a> shouldn’t forget to incorporate MFA into their platforms. </p>\n<h2 id=\"final-thoughts\" style=\"position:relative;\"><a href=\"#final-thoughts\" aria-label=\"final thoughts permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Final Thoughts</h2>\n<p>The modern threat landscape has increased the challenges for businesses to reinforce their cybersecurity posture, especially when brands think of securing digital identities. </p>\n<p>And adding robust layers of multi-factor authentication through biometric authentication can help minimize the risks as it mitigates the chances of account takeover and sensitive data breach. </p>\n<p><a href=\"https://www.loginradius.com/contact-us?utm_source=blog&#x26;utm_medium=web&#x26;utm_campaign=secure-data-amidst-identity-crisis-via-identity-based-access\"><img src=\"/8fce571f703a5970dbb1359a2fe0e51a/book-a-demo-loginradius.webp\" alt=\"LoginRadius Book a Demo\"></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"November 09, 2022","updated_date":null,"description":"The conventional identity-management tools aren’t potent enough to shield modern threat vectors. There’s a need for a robust identity management solution that combines existing authentication strategies such as two-factor authentication, biometrics, one-time passwords etc. to help secure an organization's infrastructure.","title":"How Identity-Based Access Ensures Robust Infrastructure Security Amidst the Growing Identity Crisis?","tags":["identity management","robust security","mfa","cx"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5151515151515151,"src":"/static/b3a3eb429723859e415a00ce9fa71559/7f8e9/id-crisis.webp","srcSet":"/static/b3a3eb429723859e415a00ce9fa71559/61e93/id-crisis.webp 200w,\n/static/b3a3eb429723859e415a00ce9fa71559/1f5c5/id-crisis.webp 400w,\n/static/b3a3eb429723859e415a00ce9fa71559/7f8e9/id-crisis.webp 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.webp"}}}},{"node":{"excerpt":"Introduction Cybersecurity has been the biggest priority for businesses for years. And in a post-COVID world, many organizations have…","fields":{"slug":"/identity/what-is-a-2fa-bypass-attack/"},"html":"<h2 id=\"introduction\" style=\"position:relative;\"><a href=\"#introduction\" aria-label=\"introduction permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Introduction</h2>\n<p>Cybersecurity has been the biggest priority for businesses for years. And in a post-COVID world, many organizations have reinforced their overall cybersecurity hygiene. </p>\n<p>However, cybercriminals are working to compromise weak defense lines, especially in newly-adopted remote-working environments. Hence, increasing the overall threat vector in the digital world. </p>\n<p>And one new threat, i.e., the 2FA bypass attack, is creating severe challenges for organizations embarking on a digital transformation journey. </p>\n<p>2FA bypass attacks are cyberattacks intended for <a href=\"https://www.loginradius.com/blog/identity/corporate-account-takeover-attacks/\">account takeover</a> when hackers have already accessed the credentials of a particular account, and they bypass the second layer of authentication in several ways. </p>\n<p>2FA bypass attacks aren’t uncommon these days, and every organization is putting its best efforts into mitigating the chances of a compromised user/client account. </p>\n<p>Let’s understand the aspects associated with 2FA bypass attacks and how businesses can shield themselves from the growing  number of threats. </p>\n<h2 id=\"what-is-a-2fa-bypass-attack-how-can-it-adversely-impact-your-business\" style=\"position:relative;\"><a href=\"#what-is-a-2fa-bypass-attack-how-can-it-adversely-impact-your-business\" aria-label=\"what is a 2fa bypass attack how can it adversely impact your business permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is a 2FA bypass Attack? How Can it Adversely Impact Your Business?</h2>\n<p>2FA bypass attacks are cyberattacks resulting from compromised credentials and compromised additional layers of authentication, including <a href=\"https://www.loginradius.com/resource/passwordless-login-magic-link-otp-datasheet\">SMS-based OTP authentication</a> and email authentication. </p>\n<p>Many businesses face financial and reputational damages when their users’ or employees’ accounts are compromised due to 2FA bypassing. </p>\n<p>Cybercriminals attack weak defense systems once they have acquired the user ID and password and then initiate a process to bypass the second layer of authentication.</p>\n<p>If you’re not careful about protecting your data from such attacks, there could be dire consequences for your business and your customers’ safety.</p>\n<p>For example, hackers might use stolen user credentials to access confidential information about employees or clients; this could lead to financial loss for businesses or identity theft for customers.</p>\n<p>Hackers may also use stolen credentials to create fake accounts on social media platforms like Facebook or Twitter; this could lead to reputation loss for businesses and cyberbullying or harassment of customers by selling their details on the dark web. </p>\n<h2 id=\"types-of-2fa-bypass-attacks\" style=\"position:relative;\"><a href=\"#types-of-2fa-bypass-attacks\" aria-label=\"types of 2fa bypass attacks permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Types of 2FA Bypass Attacks</h2>\n<h3 id=\"1-sms-based-attacks\" style=\"position:relative;\"><a href=\"#1-sms-based-attacks\" aria-label=\"1 sms based attacks permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. SMS-based attacks</h3>\n<p>An SMS-based attack could either be initiated by a SIM swap or interception of the SS7 network. And this SS7 protocol is quite a common choice within most network providers and can be quickly exploited since it has several security flaws. </p>\n<p>It allows attackers to intercept text messages containing OTPs sent by users. There are various ways to do it: hacking into mobile networks or intercepting them during transit. This can happen if your mobile provider has been compromised or an attacker has gained access to your phone number through social engineering tactics like SIM swaps.</p>\n<h3 id=\"2-duplicate-code-generator-attacks\" style=\"position:relative;\"><a href=\"#2-duplicate-code-generator-attacks\" aria-label=\"2 duplicate code generator attacks permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>#2. Duplicate code-generator attacks</h3>\n<p>These kinds of attacks are intended to exploit multi-factor authentication. Hence, when a user receives an OTP, hackers may alter the seed value generated by the authentication mechanism to create a duplicate OTP. </p>\n<p>Also, various fake applications are available in the market, leveraging phishing practices and generating codes or accessing the codes sent on the user’s smartphone. And minor negligence while analyzing these apps could lead to a greater security risk. </p>\n<h3 id=\"3-man-in-the-middle-attacks\" style=\"position:relative;\"><a href=\"#3-man-in-the-middle-attacks\" aria-label=\"3 man in the middle attacks permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>#3. Man-in-the-middle attacks</h3>\n<p>A <a href=\"https://www.loginradius.com/blog/engineering/top-cyber-threats-in-2022/\">man-in-the-middle</a> (MiTM) attack occurs when an attacker intercepts and distributes messages between two participants who think they are interacting directly and securely. </p>\n<p>Participants who send emails, instant messages, or video conferencing are unaware that an attacker has inserted themselves into the conversation and is collecting and manipulating their information.</p>\n<p>These kinds of attacks may affect the privacy of a user/employee and may result in fatal consequences. </p>\n<h2 id=\"how-risk-based-authentication-rba-works-best-for-2fa-bypass-attacks\" style=\"position:relative;\"><a href=\"#how-risk-based-authentication-rba-works-best-for-2fa-bypass-attacks\" aria-label=\"how risk based authentication rba works best for 2fa bypass attacks permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How Risk-Based Authentication (RBA) Works Best for 2FA Bypass Attacks?</h2>\n<p>Risk-based authentication (RBA), also called adaptive authentication, monitors consumers’ identity and access using stringent rules. The objective is to authenticate a user profile before allowing access to ensure it is not a threat. These restrictions become more stringent with increasing risks.</p>\n<p><a href=\"https://www.loginradius.com/resource/an-enterprises-guide-to-risk-based-authentication/\"><img src=\"/801da6af3b32c69be7197a9381fe67b9/GD-to-RBA.webp\" alt=\"GD-to-RBA\"></a></p>\n<p>Risk-based authentication works on a model that requires permission and response. A user asks for permission to access a file or software. In response, the file or software responds by presenting options to log in using an ID and password or sending mail or OTP to a registered contact number.</p>\n<h2 id=\"in-conclusion\" style=\"position:relative;\"><a href=\"#in-conclusion\" aria-label=\"in conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>In Conclusion</h2>\n<p>With the growing threat vector and an increasing number of cyberattacks through 2FA bypass, brands must ensure their overall cybersecurity posture is potent enough to handle a threat. </p>\n<p>Also, with robust security mechanisms, including risk-based authentication, businesses can stay assured and protected against any multi-factor bypass attacks. </p>\n<p><a href=\"https://www.loginradius.com/contact-us?utm_source=blog&#x26;utm_medium=web&#x26;utm_campaign=what-is-a-2fa-bypass-attack\"><img src=\"/8fce571f703a5970dbb1359a2fe0e51a/book-a-demo-loginradius.webp\" alt=\"book-a-demo-loginradius\"></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"November 04, 2022","updated_date":null,"description":"2FA bypass attacks are cyberattacks intended for account takeover when hackers have already accessed the credentials of a particular account, and they bypass the second layer of authentication in several ways. This post covers how businesses can shield themselves from the growing number of such threats.","title":"2FA Bypass Attacks- Everything You Should Know","tags":["2fa bypass","cyberattacks","risk based authentication"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.8867924528301887,"src":"/static/cb2ff019153cd33a0211e65bd6745245/7f8e9/2fa-bypass.webp","srcSet":"/static/cb2ff019153cd33a0211e65bd6745245/61e93/2fa-bypass.webp 200w,\n/static/cb2ff019153cd33a0211e65bd6745245/1f5c5/2fa-bypass.webp 400w,\n/static/cb2ff019153cd33a0211e65bd6745245/7f8e9/2fa-bypass.webp 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.webp"}}}},{"node":{"excerpt":"Introduction Gone are the days when investing in data privacy and security were viewed strictly as the cost of reducing data breaches and…","fields":{"slug":"/growth/what-is-digital-privacy/"},"html":"<h2 id=\"introduction\" style=\"position:relative;\"><a href=\"#introduction\" aria-label=\"introduction permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Introduction</h2>\n<p>Gone are the days when investing in data privacy and security were viewed strictly as the cost of reducing data breaches and privacy threats; many CISOs now see it through the lens of innovation and opportunity. </p>\n<p>A <a href=\"https://www.fticonsulting.com/about/newsroom/press-releases/new-fti-consulting-survey-reveals-leading-corporate-data-privacy-risks-priorities-and-change-initiatives\">survey by FTI Consulting shows</a> that 75% of organizations have made significant changes to their data privacy programs. This is a number that’s expected to surge in 2022 and beyond. </p>\n<p>Moreover, global spending on information security and risk management services is forecasted to grow at 12.4% to reach $150.4 billion in 2021. It is primarily because organizations today are more open to investing heavily in reinventing their cybersecurity infrastructure. </p>\n<p>However, the accelerated pace of rethinking cybersecurity infrastructure doesn’t necessarily indicate a desire to improve threat prevention alone; it also demonstrates that businesses are concerned about delivering value to their customers by building trust. </p>\n<p>Yes, our modern ROI-focused world demands a more sophisticated and mature view of digital privacy to accelerate the growth of a digital business. And this can be achieved by leveraging crucial untouched data to deliver seamless user experiences. </p>\n<p>Whether we talk about <a href=\"https://blog.loginradius.com/identity/5-ways-to-handle-a-data-breach/\">mitigating losses from data thefts</a>, achieving operational efficiency, or increasing customer loyalty, investing in digital privacy has offered new business growth opportunities in the past couple of years. </p>\n<p>As such, it’s vital to understand how businesses can invoke the true potential of digital privacy and the metrics to measure the ROI through digital privacy. </p>\n<p>Let’s hash it out.</p>\n<h2 id=\"what-is-digital-privacy\" style=\"position:relative;\"><a href=\"#what-is-digital-privacy\" aria-label=\"what is digital privacy permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What Is Digital Privacy?</h2>\n<p>Digital privacy is often defined as the level of privacy an individual has regarding their personal information online and in the digital world. When talking about digital privacy in the context of an organization’s cyber security, it’s all about what organizations must do to protect users’ personal and sensitive data in all virtual contexts and situations.</p>\n<p>The concept of digital privacy centers on the fact that professional or personal affairs of collecting information may leave digital footprints. For instance, many users don’t realize that data relating to their identities and internet habits are consistently being monitored, stored, and managed. </p>\n<p>To avoid the misuse of users' personal information and ensure maximum security, certain global data regulation compliances for digital privacy must be met by organizations collecting, storing, processing, and managing users' details online. </p>\n<p>For instance, data protection and privacy regulations, including the European Union’s (EU’s) <a href=\"https://blog.loginradius.com/identity/consent-management/\">General Data Protection Regulation</a> (GDPR) and <a href=\"https://blog.loginradius.com/identity/ccpa-introduction/\">California Consumer Privacy Act</a> (CCPA),  are already becoming more stringent. They demand businesses operating in their region comply with their respective data privacy policies. Failing to abide by these regulations may lead to hefty fines, and customers may also lose trust in the brand. </p>\n<p>Digital privacy protects all the information that exists in digital form and is created or shared while using the internet through any device, including mobile phones and PCs. These types of data include: </p>\n<ul>\n<li>names</li>\n<li>addresses</li>\n<li>contact information</li>\n<li>bank details</li>\n<li>digital photographs</li>\n</ul>\n<p>It’s crucial for businesses that collect user information to secure their customers’ personal information. This can be done, for example, by incorporating robust and compliant security mechanisms, including multi-factor authentication and encryption, both of which add layers to the security of data. </p>\n<p>Multi-factor authentication (MFA) ensures user/customer information isn’t accessed by unauthorized individuals, even if one line of defense (passwords) is compromised. With MFA, users receive a one-time password, typically via email/ SMS text message or push notifications, that they need to enter to authenticate. </p>\n<p>There’s also the angle of using <a href=\"https://www.loginradius.com/passwordless-login/\">passwordless authentication</a>, which helps mitigate the risks associated with password breaches and account takeovers resulting from phishing scams and other credential-based attacks. </p>\n<h2 id=\"business-advantages-of-digital-privacy-beyond-compliance\" style=\"position:relative;\"><a href=\"#business-advantages-of-digital-privacy-beyond-compliance\" aria-label=\"business advantages of digital privacy beyond compliance permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Business Advantages of Digital Privacy Beyond Compliance</h2>\n<p>Businesses operating in different parts of the world couldn’t deny that meeting all the data privacy and security compliances is the toughest nut to crack. And things become quite challenging in an era when data localization is swiftly becoming the first condition to operate in a country, state, or region. </p>\n<p>However, digital privacy has more to offer besides the security and privacy advantages; it navigates overall business success. </p>\n<p><a href=\"https://www.loginradius.com/resource/role-of-data-and-privacy-compliance-in-retail\"><img src=\"/0da2449ab79544dedbca51ea6d9c57a3/WP-compliance-retailers.webp\" alt=\"WP-compliance-retailers\"></a></p>\n<p>According to a consumer data protection and privacy survey conducted by <a href=\"https://www.mckinsey.com/business-functions/risk-and-resilience/our-insights/the-consumer-data-opportunity-and-the-privacy-imperative\">McKinsey</a>, half of the respondents agreed that they are most likely to trust a business/organization that asks for only information relevant to its products/services. </p>\n<p>Also, the brands that requested a limited amount of personal information were considered more reliable. These specific markers signal to consumers that an organization is concerned about the privacy of its customers and taking a thoughtful data management approach. </p>\n<p>And the same survey also revealed that half of the consumer respondents trust companies that quickly respond to breaches and hacks or disclose such incidents to the public. </p>\n<p>These practices are crucial for companies since the impact of data/privacy breaches may hamper overall business performance.  In a nutshell, leading brands are now learning that data privacy and protection can create business advantages. </p>\n<h2 id=\"final-thoughts-on-why-digital-privacy-is-integral-to-your-business\" style=\"position:relative;\"><a href=\"#final-thoughts-on-why-digital-privacy-is-integral-to-your-business\" aria-label=\"final thoughts on why digital privacy is integral to your business permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Final Thoughts On Why Digital Privacy Is Integral to Your Business</h2>\n<p>So far, we’ve learned that businesses that don’t prioritize privacy investments lag behind their competitors and are likely to miss opportunities of building customer loyalty and trust. </p>\n<p>Reinventing your organization’s digital privacy policy could do wonders for your brand as it renders returns and helps demonstrate robust accountability and governance to employees, clients, and stakeholders. </p>\n<p>In conclusion, we’ve found that building a foundation of strong digital privacy within your organization:</p>\n<ul>\n<li>Encourages exponential business growth over time </li>\n<li>Ensures your business remains compliant with data privacy and security regulations </li>\n<li>Mitigates the chances of reputational damages (and can increase customer trust)</li>\n<li>Improves lead generation and conversions and ensures returning customers</li>\n<li>Reduces operational costs and improves efficiency</li>\n</ul>\n<p>Brands can’t afford to lose a single customer because of non-compliance issues. Hence, it won’t be a good decision for businesses to miss out on the chance to stay ahead of the competition. </p>\n<p><a href=\"https://www.loginradius.com/contact-us?utm_source=blog&#x26;utm_medium=web&#x26;utm_campaign=what-is-digital-privacy\"><img src=\"/8fce571f703a5970dbb1359a2fe0e51a/book-a-demo-loginradius.webp\" alt=\"book-a-demo-Consultation\"></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"November 03, 2022","updated_date":null,"description":"Investing in privacy isn’t just a matter of mitigating risks pertaining to data breaches; it’s also about navigating business success by building trust and offering value to customers through enhanced security and protections. Let’s understand how businesses can invoke the true potential of digital privacy.","title":"Decoding the Business Advantage of Digital Privacy for Customers","tags":null,"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":2.127659574468085,"src":"/static/f5a52ed9d907cfce912b52e7fd023286/7f8e9/digi-privacy.webp","srcSet":"/static/f5a52ed9d907cfce912b52e7fd023286/61e93/digi-privacy.webp 200w,\n/static/f5a52ed9d907cfce912b52e7fd023286/1f5c5/digi-privacy.webp 400w,\n/static/f5a52ed9d907cfce912b52e7fd023286/7f8e9/digi-privacy.webp 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"Alok Patidar","github":null,"avatar":null}}}}]},"markdownRemark":{"excerpt":"Identity is evolving, and developers are at the forefront of this transformation. Every day brings a new learning—adapting to new standards…","fields":{"slug":"/identity/developer-first-identity-provider-loginradius/"},"html":"<p>Identity is evolving, and developers are at the forefront of this transformation. Every day brings a new learning—adapting to new standards and refining approaches to building secure, seamless experiences.</p>\n<p>We’re here to support developers on that journey. We know how important simplicity, efficiency, and well-structured documentation are when working with identity and access management solutions. That’s why we’ve redesigned the <a href=\"https://www.loginradius.com/\">LoginRadius website</a>—to be faster, more intuitive, and developer-first in every way.</p>\n<p>The goal? Having them spend less time searching and more time building.</p>\n<h2 id=\"whats-new-and-improved-on-the-loginradius-website\" style=\"position:relative;\"><a href=\"#whats-new-and-improved-on-the-loginradius-website\" aria-label=\"whats new and improved on the loginradius website permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What’s New and Improved on the LoginRadius Website?</h2>\n<p>LoginRadius’ vision is to give developers a product that simplifies identity management so they can focus on building, deploying, and scaling their applications. To enhance this experience, we’ve spent the last few months redesigning our interface— making navigation more intuitive and reassuring that essential resources are easily accessible.</p>\n<p>Here’s a closer look at what’s new and why it’s important:</p>\n<h3 id=\"a-developer-friendly-dark-theme\" style=\"position:relative;\"><a href=\"#a-developer-friendly-dark-theme\" aria-label=\"a developer friendly dark theme permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>A Developer-Friendly Dark Theme</h3>\n<p><img src=\"/f46881583c7518a93bb24e94c32320de/a-developer-friendly-dark-theme.webp\" alt=\"This image shows how LoginRadius offers several authentication methods like traditional login, social login, passwordless login, passkeys and more in a dark mode.\">    </p>\n<p>Developers spend long hours working in dark-themed IDEs and terminals, so we’ve designed the LoginRadius experience to be developer-friendly and align with that preference.</p>\n<p>The new dark mode reduces eye strain, enhances readability, and provides a seamless transition between a coding environment and our platform. Our new design features a clean, modern aesthetic with a consistent color scheme and Barlow typography, ensuring better readability. High-quality graphics and icons are thoughtfully placed to enhance the content without adding visual clutter.</p>\n<p>So, whether you’re navigating our API docs or configuring authentication into your system, our improved interface will make those extended development hours more comfortable and efficient.</p>\n<h3 id=\"clear-categorization-for-loginradius-capabilities\" style=\"position:relative;\"><a href=\"#clear-categorization-for-loginradius-capabilities\" aria-label=\"clear categorization for loginradius capabilities permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Clear Categorization for LoginRadius Capabilities</h3>\n<p><img src=\"/e5358b82be414940f3fb146013845933/capabilities.webp\" alt=\"This image shows a breakdown of all the LoginRadius CIAM capabilities, including authentication, security, UX, scalability and multi-brand management.\"></p>\n<p>We’ve restructured our website to provide a straightforward breakdown of our customer identity and access management platform capabilities, helping you quickly find what you need:</p>\n<ul>\n<li>Authentication: Easily understand <a href=\"https://www.loginradius.com/blog/identity/authentication-option-for-your-product/\">how to choose the right login method</a>, from traditional passwords and OTPs to social login, federated SSO, and passkeys with few lines of code.</li>\n<li>Security: Implement no-code security features like bot detection, IP throttling, breached password alerts, DDoS protection, and adaptive MFA to safeguard user accounts.</li>\n<li>User Experience: Leverage AI builder, hosted pages, and drag-and-drop workflows to create smooth, branded sign-up and login experiences.</li>\n<li>High Performance &#x26; Scalability: Confidently scale with sub-100ms API response times, 100% uptime, 240K+ RPS, and 28+ global data center regions.</li>\n<li>Multi-Brand Management: Efficiently manage multiple identity apps, choosing isolated or shared data stores based on your brand’s unique needs.</li>\n</ul>\n<p>This structured layout ensures you can quickly understand each capability and how it integrates into your identity ecosystem.</p>\n<h3 id=\"developer-first-navigation\" style=\"position:relative;\"><a href=\"#developer-first-navigation\" aria-label=\"developer first navigation permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Developer-First Navigation</h3>\n<p><img src=\"/a8c155c2b6faf3d5f4b4de4e2b14d763/developers-menu.webp\" alt=\"This image shows the LoginRadius menu bar, highlighting the developer dropdown.\">   </p>\n<p>We’ve been analyzing developer workflows to identify how you access key resources. That’s why we redesigned our navigation with one goal in mind: to reduce clicks and make essential resources readily available.</p>\n<p>The new LoginRadius structure puts APIs, SDKs, and integration guides right at the menu bar under the Developers dropdown so you can get started faster. Our Products, Solutions, and Customer Services are also clearly categorized, helping development teams quickly find the right tools and make informed decisions.</p>\n<h3 id=\"quick-understanding-of-integration-benefits\" style=\"position:relative;\"><a href=\"#quick-understanding-of-integration-benefits\" aria-label=\"quick understanding of integration benefits permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Quick Understanding of Integration Benefits</h3>\n<p><img src=\"/b2f9a964a2da0ea83e2f8596b833bba7/we-support-your-tech-stack.webp\" alt=\"This image shows a list of popular programming languages and frameworks offered by LoginRadius.\"></p>\n<p>Developers now have a clear view of the tech stack available with LoginRadius, designed to support diverse business needs.</p>\n<p>Our platform offers pre-built SDKs for Node.js, Python, Java, and more, making CIAM integration seamless across popular programming languages and frameworks.</p>\n<h2 id=\"over-to-you-now\" style=\"position:relative;\"><a href=\"#over-to-you-now\" aria-label=\"over to you now permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Over to You Now!</h2>\n<p>Check out our <a href=\"https://www.loginradius.com/\">revamped LoginRadius website</a> and see how the improved experience makes it easier to build, scale, and secure your applications.</p>\n<p>Do not forget to explore the improved navigation and API documentation, and get started with our free trial today. We’re excited to see what you’ll build with LoginRadius!</p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"February 21, 2025","updated_date":null,"description":"LoginRadius’ vision is to give developers a product that simplifies identity management so they can focus on building, deploying, and scaling their applications. To enhance this experience, we’ve redesigned our website interface, making navigation more intuitive and reassuring that essential resources are easily accessible.","title":"Revamped & Ready: Introducing the New Developer-First LoginRadius Website","tags":["Developer tools","API","Identity Management","User Authentication"],"pinned":true,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.7857142857142858,"src":"/static/80b4e4fbe176a10a327d273504607f32/58556/hero-section.webp","srcSet":"/static/80b4e4fbe176a10a327d273504607f32/61e93/hero-section.webp 200w,\n/static/80b4e4fbe176a10a327d273504607f32/1f5c5/hero-section.webp 400w,\n/static/80b4e4fbe176a10a327d273504607f32/58556/hero-section.webp 800w,\n/static/80b4e4fbe176a10a327d273504607f32/99238/hero-section.webp 1200w,\n/static/80b4e4fbe176a10a327d273504607f32/7c22d/hero-section.webp 1600w,\n/static/80b4e4fbe176a10a327d273504607f32/1258b/hero-section.webp 2732w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.webp"}}}},"pageContext":{"limit":6,"skip":204,"currentPage":35,"type":"///","numPages":164,"pinned":"ee8a4479-3471-53b1-bf62-d0d8dc3faaeb"}},"staticQueryHashes":["1171199041","1384082988","2100481360","23180105","528864852"]}