{"componentChunkName":"component---src-templates-blog-list-template-js","path":"/identity/62","result":{"data":{"allMarkdownRemark":{"edges":[{"node":{"excerpt":"Authenticity, accountability, and excellent customer experience are the building blocks that sustain customer loyalty in the long run…","fields":{"slug":"/identity/consumer-data-privacy-security/"},"html":"<p>Authenticity, accountability, and excellent customer experience are the building blocks that sustain customer loyalty in the long run. Businesses need to be vocal about how responsible they are when it comes to consumer data privacy and security.</p>\n<p>Needless-to-say, brands that put consumers in charge of how their data is collected and used can reduce customer churn by a considerable margin.</p>\n<p>Following the popularity of the EU's General Data Protection Regulation (GDPR) that went live in May 2018, other countries worldwide have been catching up and taking action.</p>\n<p>2020 started in the right direction with the <a href=\"https://www.loginradius.com/blog/2019/05/ccpa-introduction/\">California Consumer Privacy Act (CCPA)</a>. This year we should expect even more stringent legislation concerning data protection rights for consumers.</p>\n<p>Next in line is the <a href=\"http://www.mainelegislature.org/legis/bills/getPDF.asp?paper=SP0275&#x26;item=9&#x26;snum=129\">privacy law of Maine</a>, which is scheduled to come into force in July 2020. The legislation would mandate broadband internet service providers (ISPs) to receive explicit, affirmative consent from a customer before accessing their personal data, including their browsing history.</p>\n<p><em>A question arises.</em></p>\n<h2 id=\"what-does-the-latest-data-privacy-inclusions-say-about-consumers\" style=\"position:relative;\"><a href=\"#what-does-the-latest-data-privacy-inclusions-say-about-consumers\" aria-label=\"what does the latest data privacy inclusions say about consumers permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What Does the Latest Data Privacy Inclusions Say About Consumers</h2>\n<p>There is a common belief among consumers that today's data protection is more complicated than it was in the past. Here are a few statistics that highlight the statement.</p>\n<ul>\n<li>84% of <a href=\"https://www.cisco.com/c/dam/global/en_uk/products/collateral/security/cybersecurity-series-2019-cps.pdf\">Cisco Consumer Privacy Survey</a> respondents showed that they care about the privacy of their data, as well as other users' data, and want more control over how their data is being used. 80% of this group also said they were willing to act to protect it.</li>\n<li>48% of consumer data privacy respondents suggested that they had already changed organizations or providers because of their data policies or data sharing activities, in the same report.</li>\n<li>According to the <a href=\"https://www.pewresearch.org/internet/2019/11/15/americans-and-privacy-concerned-confused-and-feeling-lack-of-control-over-their-personal-information/\">Pew Research Center</a>, 79% of respondents said they are very or somewhat worried about how companies use the data they collect. In contrast, 64 percent said they have the same degree of concern about the collection of government data.</li>\n<li>81% of respondents feel they have no control over the collected data in the same report. </li>\n<li>According to another <a href=\"https://www.salesforce.com/company/news-press/stories/2019/06/061219-g/\">research by Salesforce</a>, 46% of respondents feel they have completely lost control over their own data.</li>\n<li>A ground-breaking reality is that today consumers trust companies far less than they used to in the past. 79% of Americans are not sure how companies will respond when it comes to handling and protecting their personal information.</li>\n<li>Approximately seven-in-ten or more say they are either not too confident or not at all that companies will take responsibility when their data is compromised or misused, states the Pew Research Center.</li>\n</ul>\n<h2 id=\"biggest-data-privacy-pain-points-of-consumers\" style=\"position:relative;\"><a href=\"#biggest-data-privacy-pain-points-of-consumers\" aria-label=\"biggest data privacy pain points of consumers permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Biggest Data Privacy Pain Points of Consumers</h2>\n<p>This goes without saying that consumer data privacy is broadly transforming businesses today, and it is the responsibility of companies to manage the information they collect. Consumers are becoming more and more conscious about what kinds of data they share — and with whom.</p>\n<p>Stakes are high for companies that handle data. Even consumers who aren't directly affected pay attention to the way such companies <a href=\"https://www.loginradius.com/blog/2020/05/cyber-threats-business-risk-covid-19/\">respond to the data breach</a>. They are majorly concerned about the following pain points.</p>\n<h3 id=\"misuse-of-sensitive-data\" style=\"position:relative;\"><a href=\"#misuse-of-sensitive-data\" aria-label=\"misuse of sensitive data permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>Misuse of sensitive data</strong></h3>\n<p>Data breaches have a greater reputational and financial consequence when sensitive personal data is involved. This contains information relating to political opinion, ethnic or racial origin, religious beliefs, genetic data, and biometric data.</p>\n<p>Misuse of sensitive data can cause far more harm than the names, addresses, and financial information.</p>\n<h3 id=\"trading-of-personal-data\" style=\"position:relative;\"><a href=\"#trading-of-personal-data\" aria-label=\"trading of personal data permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>Trading of personal data</strong></h3>\n<p>The controversial corner of the web, called the \"<a href=\"https://en.wikipedia.org/wiki/Dark_web\">dark web</a>,\" is widely known for trading stolen data, which can only be accessed via specific browsers. Hackers may be searching simply for a way into the networks of customers. </p>\n<p>They can attack computers/phones by imitating popular brands and stealing personal information without people even realizing it!</p>\n<h3 id=\"data-breach-due-to-human-error\" style=\"position:relative;\"><a href=\"#data-breach-due-to-human-error\" aria-label=\"data breach due to human error permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>Data breach due to human error</strong></h3>\n<p>There is a well-documented history of human error, causing data breaches. Sadly, it is often people who allow access to encrypted channels and sensitive information for attackers. An attacker can undoubtedly take advantage of zero-day vulnerabilities to break into a network, but in most cases, their performance requires capitalizing human error.</p>\n<p>According to Verizon's <a href=\"https://enterprise.verizon.com/resources/reports/2019-data-breach-investigations-report.pdf\">2019 Data Breach Investigations Report</a> (DBIR), 21% of breaches were a result of casual events like misdelivery, loss, and other kinds of human-initiated errors.</p>\n<h2 id=\"impact-of-consumer-data-privacy-on-businesses\" style=\"position:relative;\"><a href=\"#impact-of-consumer-data-privacy-on-businesses\" aria-label=\"impact of consumer data privacy on businesses permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Impact of Consumer Data Privacy on Businesses</h2>\n<p>Today, consumers are more mindful of the effect data privacy has on their personal lives than ever before. But how do companies respond to this change in consumer thinking — and more relevantly, how does it impact the way they do business?</p>\n<p>New consumer data privacy regulations have been affecting every aspect of a business. Organizations must manage consumer interactions with privacy demands, develop new organizational positions to manage regulatory interactions, and educate employees on the current regulations.</p>\n<p><a href=\"https://www.loginradius.com/resource/the-ccpa-and-customer-identity\"><img src=\"/9c25eefa99516056172d7876231fa5fb/WP-CCPA-consumer-identity.webp\" alt=\"WP-CCPA-consumer-identity\"></a></p>\n<p>In general, consumer data privacy laws have three different impacts on every organization.</p>\n<ul>\n<li><strong>Operational Impact</strong> – What are the new ways to conduct business to comply with new privacy laws?</li>\n<li><strong>Technology Impact</strong> – What are the new capabilities to enable compliance and minimize risk to reputation?</li>\n<li><strong>Organizational Impact</strong> – Are there any new roles that need to be created to enable data privacy?</li>\n</ul>\n<p>The laws regulating data privacy are in the preliminary stages, with more revisions and iterations to come. The new compliance requirements offer organizations the opportunity to evaluate other data opportunities and build more robust data management strategies.</p>\n<h2 id=\"impact-of-data-privacy-on-consumers\" style=\"position:relative;\"><a href=\"#impact-of-data-privacy-on-consumers\" aria-label=\"impact of data privacy on consumers permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Impact of Data Privacy on Consumers</h2>\n<p>Consumers are starting to realize that data is the currency that allows free or near-free services, and they are carefully thinking about the drawbacks of sharing personal data.</p>\n<p>Data regulations like <a href=\"https://www.loginradius.com/blog/2019/09/ccpa-vs-gdpr-the-compliance-war/\">GDPR and CCPA</a> surfaced and were enacted because companies were not as cautious as they needed to be when it came to consumer data security. </p>\n<p>Here's how data regulations are leveling-up their customer experience game:</p>\n<ul>\n<li><strong>Trust and transparency</strong>: When consumers understand the specifics of who, what, where, when, and why data collection strategies, it's much simpler to have them on board and create the trust for brand loyalty.</li>\n<li><strong>First-party relationships</strong>: Consumers are the gatekeepers at this stage in the evolution of marketing. It takes transparency, strong tactics, and reliable marketing tools for brands to obtain customer consent.</li>\n<li><strong>Data review rights</strong>: Speaking of more vibrant and more dynamic customer experience, brands are inclining towards implementing data privacy - improving the consumer relationship through the purchaser's journey on multiple levels.</li>\n</ul>\n<p>Consumers have the authority to set a brand apart from its competitors. So, when they see that efforts are made to keep their personal information safe and secure, they appreciate it.</p>\n<h2 id=\"list-of-popular-data-privacy-laws-and-acts-around-the-world\" style=\"position:relative;\"><a href=\"#list-of-popular-data-privacy-laws-and-acts-around-the-world\" aria-label=\"list of popular data privacy laws and acts around the world permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>List of Popular Data Privacy Laws and Acts Around the World</h2>\n<p><img src=\"/e8dc6a92a654330664d9daf0ee9c1674/Different-data-privacy-laws-and-acts.webp\" alt=\"Different data privacy laws and acts\"></p>\n<h4 id=\"the-european-unions-data-privacy-laws\" style=\"position:relative;\"><a href=\"#the-european-unions-data-privacy-laws\" aria-label=\"the european unions data privacy laws permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>The European Union's Data Privacy Laws</strong></h4>\n<ul>\n<li><strong>GDPR 2018</strong>: A regulation requiring companies to protect EU citizens' personal data and privacy for transactions conducted within the EU member states.</li>\n</ul>\n<h4 id=\"the-us-data-privacy-laws\" style=\"position:relative;\"><a href=\"#the-us-data-privacy-laws\" aria-label=\"the us data privacy laws permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>The US Data Privacy Laws</strong></h4>\n<ul>\n<li><strong>COPAA 2000</strong>: A regulation imposing requirements on website operators or online services that collected children's personal data under the age of 13.</li>\n<li><strong>CCPA 2020</strong>: A law allowing users to request a copy of their data, delete it when they no longer want companies to have it, and mandate that companies do not sell their data to third parties.</li>\n<li><strong>US Privacy Act of 1974</strong>: A law imposing restrictions on data held by government agencies. </li>\n</ul>\n<h4 id=\"data-privacy-in-healthcare\" style=\"position:relative;\"><a href=\"#data-privacy-in-healthcare\" aria-label=\"data privacy in healthcare permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>Data Privacy in Healthcare</strong></h4>\n<ul>\n<li><strong>HIPAA 1996:</strong> A law protecting patients' sensitive healthcare information from being disclosed without consent.</li>\n</ul>\n<h4 id=\"data-privacy-for-financial-institutions\" style=\"position:relative;\"><a href=\"#data-privacy-for-financial-institutions\" aria-label=\"data privacy for financial institutions permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>Data Privacy for Financial Institutions</strong></h4>\n<ul>\n<li><strong>GLBA 1999</strong>: A law protecting financial nonpublic personal information and requiring financial institutions to explain how they share personal information of customers.</li>\n</ul>\n<h4 id=\"other-data-privacy-laws\" style=\"position:relative;\"><a href=\"#other-data-privacy-laws\" aria-label=\"other data privacy laws permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>Other Data Privacy Laws</strong></h4>\n<ul>\n<li><strong>Privacy rule 2000</strong>: A law fortifying HIPPA and protecting the private healthcare information of the public. </li>\n<li><strong>SOX 2002</strong>: A law protecting individuals from unconstitutional practices by corporations. </li>\n<li><strong>FISMA 2002</strong>: A comprehensive framework protecting government data, operations and assets from unlawful use</li>\n<li><strong>ISO 27001 2013</strong>: A regulatory framework imposing security on any kind of digital information.</li>\n</ul>\n<h2 id=\"proactive-steps-for-companies-to-prevent-privacy-hack\" style=\"position:relative;\"><a href=\"#proactive-steps-for-companies-to-prevent-privacy-hack\" aria-label=\"proactive steps for companies to prevent privacy hack permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Proactive Steps for Companies to Prevent Privacy Hack</h2>\n<p><a href=\"https://www.loginradius.com/blog/2019/10/cybersecurity-attacks-business/\">Cyber-attacks have become</a> a harsh reality for virtually every consumer and organization today. It doesn't matter anymore who the victim is, or what is the size of the organization that has fallen prey, the looming threat metrics about hackers' intention to steal data is real.</p>\n<p>What actions can companies take to prevent hackers and protect consumer assets?</p>\n<h3 id=\"take-data-mapping-seriously\" style=\"position:relative;\"><a href=\"#take-data-mapping-seriously\" aria-label=\"take data mapping seriously permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>Take data mapping seriously</strong></h3>\n<p>Companies need to know what customer data they need to get the job done. Because it so happens that companies do not use the data they collect from customers - not for analytics or even to address any future need. </p>\n<p>It is only reasonable for companies not to collect any unnecessary data. No wonder, a lot of companies are considering re-writing <a href=\"https://www.loginradius.com/security/\">their security policies</a>. </p>\n<h3 id=\"timely-risk-assessment\" style=\"position:relative;\"><a href=\"#timely-risk-assessment\" aria-label=\"timely risk assessment permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>Timely risk assessment</strong></h3>\n<p>Stay up-to-date on new risks and vulnerabilities in the data storage environment. Carry out regular assessments of all the significant aspects of the workplace environment - from remote access for employees to data storage to security policies. Make sure all procedures are adequate and current. </p>\n<h3 id=\"periodic-data-security-training\" style=\"position:relative;\"><a href=\"#periodic-data-security-training\" aria-label=\"periodic data security training permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>Periodic data security training</strong></h3>\n<p>Train your team according to industry-approved security practices. Make them understand how crucial is consumer data privacy and security to your business and what necessary steps can prevent breaches. Conduct periodical awareness training for the entire organization instead of confining to a particular group. </p>\n<h3 id=\"invest-in-data-compliance\" style=\"position:relative;\"><a href=\"#invest-in-data-compliance\" aria-label=\"invest in data compliance permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>Invest in data compliance</strong></h3>\n<p>As we move into the fourth industrial age, investing in consumer data privacy and compliance has become a top business priority. It is high time, organizations understand the value of data itself. This is where <a href=\"https://www.loginradius.com/blog/2020/05/consent-management/\">regulations like the GDPR</a> and CCPA comes into play. </p>\n<h3 id=\"optimal-infrastructure\" style=\"position:relative;\"><a href=\"#optimal-infrastructure\" aria-label=\"optimal infrastructure permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>Optimal infrastructure</strong></h3>\n<p>Organizations are working to build technology environments that can easily handle the growing amounts of data collected and engage in technical developments. A good practice is to store data based on the data type or classification. Reduced system footprints decrease the risk of breaches.</p>\n<h2 id=\"how-loginradius-keeps-your-customer-data-private-and-secure\" style=\"position:relative;\"><a href=\"#how-loginradius-keeps-your-customer-data-private-and-secure\" aria-label=\"how loginradius keeps your customer data private and secure permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How LoginRadius Keeps Your Customer Data Private and Secure</h2>\n<p><img src=\"/355bcd40d0e41b742b2f650aefcd4b9c/customer-data-private-and-secure.webp\" alt=\"How LoginRadius keeps your customer data private and secure\"></p>\n<p>One crucial aspect of an organization is the protection of the confidentiality and integrity of consumer data. LoginRadius provides layered security by limiting and monitoring access to consumer's data. The platform offers seamless security with <a href=\"https://www.loginradius.com/data-governance/\">features like data management</a> and real-time fraud analysis to improve customer experience and detect fraud attempts at the entrance.</p>\n<p>The <a href=\"https://www.loginradius.com/blog/2019/06/customer-identity-and-access-management/\">CIAM solution ensures</a> that fewer employees can access customer data and handle it. This further reduces the chance of accidental data leaks and secures consumer data privacy. Some of the global standards it adheres to include the GDPR in the EU and the <a href=\"https://www.loginradius.com/blog/identity/how-loginradius-helps-enterprises-stay-ccpa-compliant-in-2020/\">CCPA in California</a>.</p>\n<p>The LoginRadius is an identity management system that continues to support <a href=\"https://www.loginradius.com/compliances/\">global regulatory compliance</a> in the fight against data breaches, which are essential for delivering zero friction customer experience. A few of the common ones include:</p>\n<ul>\n<li><strong>PCI DSS</strong>-<strong>PCI SSC</strong> administered standard for payment transactions.</li>\n<li><strong>ISO 27001:2013</strong> – Information security management system.</li>\n<li><strong>ISO 27017:2015</strong> – Information security for cloud services.</li>\n<li><strong>ISO/IEC 27018:2019</strong> – PII Protection.</li>\n<li><strong>US Privacy Shield</strong> - Complaint resolution for EEA citizens.</li>\n<li><strong>NIST Cybersecurity Framework</strong> – Standardized security framework to manage and reduce cybersecurity risk.</li>\n<li><strong>ISAE 3000</strong> – International attestation standard for assurance over non-financial information.</li>\n<li><strong>AICPA SOC 2 (Type II)</strong> – System-level controls for Trust Services Criteria – security, availability, process integrity, confidentiality, and privacy.</li>\n</ul>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>Your consumer data privacy and security plan should comply with the rapid development of technology and the increasing cyber-attacks. Consider investing in compliance with the latest regulations to future-proof your consumer data protection plan.</p>\n<p><a href=\"https://www.loginradius.com/contact-us?utm_source=blog&#x26;utm_medium=web&#x26;utm_campaign=consumer-data-privacy-security\"><img src=\"/788a6a84e389edac18728007099fdc1d/Book-a-free-demo-request-1024x310.webp\" alt=\"book-a-free-demo-loginradius\"></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"June 17, 2020","updated_date":null,"description":"The building blocks that sustain customer loyalty in the long run are authenticity, accountability and excellent customer experience. Organizations need to be clear about how cautious they are when it comes to the privacy and protection of customer data.","title":"How LoginRadius Future-Proofs Consumer Data Privacy and Security","tags":["data privacy","cx","compliance"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.7699115044247788,"src":"/static/3341a4dec7ccc8a337c46d2b6f147200/7f8e9/consumer-data-privacy.webp","srcSet":"/static/3341a4dec7ccc8a337c46d2b6f147200/61e93/consumer-data-privacy.webp 200w,\n/static/3341a4dec7ccc8a337c46d2b6f147200/1f5c5/consumer-data-privacy.webp 400w,\n/static/3341a4dec7ccc8a337c46d2b6f147200/7f8e9/consumer-data-privacy.webp 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.webp"}}}},{"node":{"excerpt":"Introduction As enterprises advance towards digital maturity in the times of robust cloud-based systems and stringent online security…","fields":{"slug":"/identity/authentication-vs-authorization-infographic/"},"html":"<h2 id=\"introduction\" style=\"position:relative;\"><a href=\"#introduction\" aria-label=\"introduction permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Introduction</h2>\n<p>As enterprises advance towards digital maturity in the times of robust cloud-based systems and stringent online security, <em>authentication</em> and <em>authorization</em> are used in conjunction (also, often interchangeably) with each other.</p>\n<p>Though both the terms sound similar, they refer to entirely different security processes. Within the scope of <a href=\"https://www.loginradius.com/blog/2019/06/customer-identity-and-access-management/\">customer identity and access management (CIAM)</a>, authentication verifies a user's identity, while authorization validates if the user has access to perform a specific function.</p>\n<p>In other words, authentication is identifying users by confirming who they say they are, while authorization is the process of establishing the rights and privileges of a user.</p>\n<p>Both processes play equally important roles in securing sensitive data assets from breaches and unauthorized access.</p>\n<p>Here, we'll cover how they're defined and what distinguishes one from the other.</p>\n<h2 id=\"what-is-authentication\" style=\"position:relative;\"><a href=\"#what-is-authentication\" aria-label=\"what is authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is Authentication?</h2>\n<p>Authentication is the process of identifying users and validating who they claim to be. One of the most common and obvious factors to authenticate identity is a password. If the user name matches the password credential, it means the identity is valid, and the system grants access to the user.</p>\n<p>Interestingly, with enterprises going passwordless, many use modern authentication techniques like one-time passcodes (OTP) via SMS, or email, <a href=\"https://www.loginradius.com/blog/2019/05/what-is-single-sign-on/\">single sign-on (SSO)</a>, multi-factor authentication (MFA) and biometrics, etc. to authenticate users and deploy security beyond what passwords usually provide.</p>\n<h2 id=\"types-of-authentication\" style=\"position:relative;\"><a href=\"#types-of-authentication\" aria-label=\"types of authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Types of Authentication</h2>\n<p>Authentication is a crucial process that verifies the identity of users accessing a system, website, or application. There are several types of <a href=\"https://www.loginradius.com/authentication/\">authentication methods</a> employed in today's digital landscape to ensure secure access to sensitive data. The most common ones include:</p>\n<h3 id=\"password-based-authentication\" style=\"position:relative;\"><a href=\"#password-based-authentication\" aria-label=\"password based authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Password-based Authentication</h3>\n<p>This traditional method requires users to provide a unique combination of characters known only to them. While passwords are simple to implement, they are susceptible to security breaches if not managed properly.</p>\n<h3 id=\"multi-factor-authentication\" style=\"position:relative;\"><a href=\"#multi-factor-authentication\" aria-label=\"multi factor authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Multi-Factor Authentication</h3>\n<p><a href=\"https://www.loginradius.com/blog/identity/benefits-of-mfa/\">MFA enhances security</a> by combining two or more authentication factors, such as passwords, biometrics (fingerprint or facial recognition), or one-time codes sent to a user's registered device. This layered approach significantly reduces the risk of unauthorized access.</p>\n<h3 id=\"two-factor-authentication\" style=\"position:relative;\"><a href=\"#two-factor-authentication\" aria-label=\"two factor authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Two-Factor Authentication</h3>\n<p>2FA is a subset of MFA that employs two different authentication factors to verify user identity. Typically, this includes a password and a one-time code generated by a mobile app or sent via SMS.</p>\n<h3 id=\"biometric-authentication\" style=\"position:relative;\"><a href=\"#biometric-authentication\" aria-label=\"biometric authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Biometric Authentication</h3>\n<p>This cutting-edge method uses unique biological traits like fingerprints, iris scans, or facial features to validate a user's identity. Biometrics offer a high level of security and convenience, but they may raise privacy concerns.</p>\n<h3 id=\"token-based-authentication\" style=\"position:relative;\"><a href=\"#token-based-authentication\" aria-label=\"token based authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Token-based Authentication</h3>\n<p>Token-based systems use physical or virtual tokens to grant access. These tokens can be hardware devices or software applications that generate temporary codes for authentication.</p>\n<h2 id=\"advantages-of-authentication\" style=\"position:relative;\"><a href=\"#advantages-of-authentication\" aria-label=\"advantages of authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Advantages of Authentication</h2>\n<p>Effective authentication protocols offer numerous benefits to individuals, organizations, and online platforms, ensuring a secure and seamless user experience.</p>\n<h3 id=\"enhanced-security\" style=\"position:relative;\"><a href=\"#enhanced-security\" aria-label=\"enhanced security permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Enhanced Security</h3>\n<p>Authentication prevents unauthorized access and protects sensitive data from falling into the wrong hands, reducing the risk of data breaches and cyberattacks.</p>\n<h3 id=\"user-trust-and-confidence\" style=\"position:relative;\"><a href=\"#user-trust-and-confidence\" aria-label=\"user trust and confidence permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>User Trust and Confidence</h3>\n<p>Implementing robust authentication measures instills confidence in users, assuring them that their personal information is safe, thereby fostering trust in the platform or service.</p>\n<h3 id=\"regulatory-compliance\" style=\"position:relative;\"><a href=\"#regulatory-compliance\" aria-label=\"regulatory compliance permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Regulatory Compliance</h3>\n<p>In many industries, adhering to specific <a href=\"https://www.loginradius.com/blog/identity/stay-compliant-with-data-privacy-laws-2023/\">data protection regulations</a> and standards is mandatory. Proper authentication procedures aid in meeting compliance requirements.</p>\n<h3 id=\"reduced-fraud-and-identity-theft\" style=\"position:relative;\"><a href=\"#reduced-fraud-and-identity-theft\" aria-label=\"reduced fraud and identity theft permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Reduced Fraud and Identity Theft</h3>\n<p>By requiring users to verify their identity through authentication, the likelihood of fraudulent activities and identity theft is significantly minimized.</p>\n<h3 id=\"customizable-access-control\" style=\"position:relative;\"><a href=\"#customizable-access-control\" aria-label=\"customizable access control permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Customizable Access Control</h3>\n<p>Different authentication methods can be tailored to suit specific security needs, allowing organizations to grant appropriate levels of access to different user groups.</p>\n<h2 id=\"what-is-authorization\" style=\"position:relative;\"><a href=\"#what-is-authorization\" aria-label=\"what is authorization permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is Authorization?</h2>\n<p>Authorization happens after a user’s identity has been successfully authenticated. It is about offering full or partial access rights to resources like database, funds, and other critical information to get the job done.</p>\n<p>In an organization, for example, after an employee is verified and confirmed via ID and password authentication, the next step would be defining what resources the employee would have access to.</p>\n<h2 id=\"types-of-authorization\" style=\"position:relative;\"><a href=\"#types-of-authorization\" aria-label=\"types of authorization permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Types of Authorization</h2>\n<p>Authorization is a crucial aspect of identity and access management, ensuring that individuals or entities are granted appropriate access to resources and actions within a system. There are several types of authorization mechanisms that organizations implement to control access and protect sensitive information.</p>\n<h3 id=\"role-based-authorization\" style=\"position:relative;\"><a href=\"#role-based-authorization\" aria-label=\"role based authorization permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Role-Based Authorization</h3>\n<p>In this approach, access rights are assigned based on predefined roles or job functions within the organization. Users are grouped into specific roles, and each role is granted a set of permissions that align with the responsibilities of that role. This <a href=\"https://www.loginradius.com/user-management/\">simplifies access management</a> and reduces administrative overhead, especially in large enterprises.</p>\n<h3 id=\"attribute-based-authorization\" style=\"position:relative;\"><a href=\"#attribute-based-authorization\" aria-label=\"attribute based authorization permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Attribute-Based Authorization</h3>\n<p>This type of authorization evaluates access requests based on specific attributes of the user, such as their department, location, or clearance level. Access is granted or denied depending on whether the user's attributes match the defined criteria for accessing certain resources or performing particular actions.</p>\n<h3 id=\"rule-based-authorization\" style=\"position:relative;\"><a href=\"#rule-based-authorization\" aria-label=\"rule based authorization permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Rule-Based Authorization</h3>\n<p>Rule-based authorization enforces access control based on predefined rules and conditions. These rules specify the circumstances under which access should be granted or denied. Organizations can define complex access policies using rule-based authorization to cater to unique business requirements.</p>\n<h3 id=\"mandatory-access-control-mac\" style=\"position:relative;\"><a href=\"#mandatory-access-control-mac\" aria-label=\"mandatory access control mac permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Mandatory Access Control (MAC)</h3>\n<p>MAC is a high-security authorization model commonly used in government and military settings. It operates on the principle of strict access controls determined by the system administrator. Access rights are assigned based on labels and categories, ensuring that users can only access information at or below their clearance level.</p>\n<h3 id=\"discretionary-access-control-dac\" style=\"position:relative;\"><a href=\"#discretionary-access-control-dac\" aria-label=\"discretionary access control dac permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Discretionary Access Control (DAC)</h3>\n<p>In contrast to MAC, DAC allows users to control access to the resources they own. Each resource has an owner who can determine who else can access it and what level of access they have. DAC is commonly used in less secure environments where users have more control over their data.</p>\n<h3 id=\"role-based-access-control-rbac\" style=\"position:relative;\"><a href=\"#role-based-access-control-rbac\" aria-label=\"role based access control rbac permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Role-Based Access Control (RBAC)</h3>\n<p>RBAC is a variation of role-based authorization that focuses on managing user access based on roles and their associated permissions. It simplifies access control by allowing administrators to grant or revoke permissions to entire groups of users through the management of roles.</p>\n<h2 id=\"advantages-of-authorization\" style=\"position:relative;\"><a href=\"#advantages-of-authorization\" aria-label=\"advantages of authorization permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Advantages of Authorization</h2>\n<p>Implementing robust authorization mechanisms offers various advantages that strengthen an organization's security posture and overall access management strategies.</p>\n<h3 id=\"enhanced-security-1\" style=\"position:relative;\"><a href=\"#enhanced-security-1\" aria-label=\"enhanced security 1 permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Enhanced Security</h3>\n<p>Authorization ensures that only authorized users can access specific resources and perform permitted actions. By enforcing proper access controls, organizations can significantly reduce the risk of data breaches, unauthorized access, and other security incidents.</p>\n<h3 id=\"granular-access-control\" style=\"position:relative;\"><a href=\"#granular-access-control\" aria-label=\"granular access control permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Granular Access Control</h3>\n<p>Authorization systems provide the flexibility to grant access on a granular level. This means administrators can define fine-grained access permissions for different users based on their roles, attributes, or other conditions. Granular access control allows for a more tailored and least privilege approach to access management.</p>\n<h3 id=\"compliance-and-auditing\" style=\"position:relative;\"><a href=\"#compliance-and-auditing\" aria-label=\"compliance and auditing permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Compliance and Auditing</h3>\n<p>Many industries have specific compliance requirements regarding data access and protection. Authorization mechanisms help organizations comply with these regulations by monitoring and controlling access to sensitive information. Additionally, audit logs can track user activities, providing valuable data for security investigations and compliance reporting.</p>\n<h3 id=\"reduced-human-errors\" style=\"position:relative;\"><a href=\"#reduced-human-errors\" aria-label=\"reduced human errors permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Reduced Human Errors</h3>\n<p>Implementing a structured authorization system reduces the likelihood of human errors in access control. Automated role-based or rule-based access assignment minimizes the chances of accidental misconfigurations and unauthorized access.</p>\n<h3 id=\"scalability-and-manageability\" style=\"position:relative;\"><a href=\"#scalability-and-manageability\" aria-label=\"scalability and manageability permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Scalability and Manageability</h3>\n<p>As organizations grow, managing access rights can become challenging. Authorization systems, particularly role-based ones, offer <a href=\"https://www.loginradius.com/scalability/\">scalable solutions</a>, making it easier to add or remove users from different roles as the organization's structure evolves.</p>\n<h3 id=\"user-experience\" style=\"position:relative;\"><a href=\"#user-experience\" aria-label=\"user experience permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>User Experience</h3>\n<p>A well-designed authorization system ensures that users can access the resources they need without unnecessary barriers. By providing a seamless and efficient user experience, employees can focus on their tasks without being impeded by access restrictions.</p>\n<h2 id=\"authentication-vs-authorization-understanding-the-techniques\" style=\"position:relative;\"><a href=\"#authentication-vs-authorization-understanding-the-techniques\" aria-label=\"authentication vs authorization understanding the techniques permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Authentication vs Authorization: Understanding the Techniques</h2>\n<p>When we talk about the difference between authentication and authorization, C IAM administrators should understand the core of utilizing both authentication and authorization, and how one differentiates from the other.</p>\n<p>For example, an organization will allow all its employees to access their workplace systems (that’s authentication!). But then, not everyone will have the right to access its gated data (that’s authorization!).</p>\n<p><a href=\"https://www.loginradius.com/authentication/\">Implementing authentication</a> with the right authorization techniques can protect organizations, while streamlined access will enable its workforce to be more productive.</p>\n<p>Here is the common authentication vs authorization techniques used by CIAM solutions to help you better understand the difference between authentication and authorization. However note that technologies like JWT, SAML, OpenID Authorization, and OAuth are used in both authentication and authorization.</p>\n<h3 id=\"popular-authentication-techniques\" style=\"position:relative;\"><a href=\"#popular-authentication-techniques\" aria-label=\"popular authentication techniques permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>Popular authentication techniques</strong></h3>\n<ul>\n<li><strong>Password-based authentication</strong> is a simple <a href=\"https://www.loginradius.com/blog/2019/06/what-is-multi-factor-authentication/\">method of authentication</a> that requires a password to verify the user's identity. </li>\n<li><strong>Passwordless authentication</strong> is <a href=\"https://www.loginradius.com/blog/2019/10/passwordless-authentication-the-future-of-identity-and-security/\">where a user is verified</a> through OTP or a magic link delivered to the registered email or phone number.</li>\n</ul>\n<p><a href=\"https://www.loginradius.com/resource/loginradius-ciam-passwordless-login/\"><img src=\"/3b805aa6360a4f8988029e88494d1c9d/passwordless-login.webp\" alt=\"passwordless-login\"></a></p>\n<ul>\n<li><strong>2FA/MFA</strong> requires <a href=\"https://www.loginradius.com/blog/2019/06/what-is-multi-factor-authentication/\">more than one security level</a>, like an additional PIN or security question, to identify a user and grant access to a system. </li>\n<li><strong>Single sign-on</strong> (SSO) allows users to access multiple applications with a single set of credentials. </li>\n<li><strong>Social authentication</strong> verifies and <a href=\"https://www.loginradius.com/social-login/\">authenticates users</a> with existing credentials from social networking platforms.</li>\n</ul>\n<h3 id=\"popular-authorization-techniques\" style=\"position:relative;\"><a href=\"#popular-authorization-techniques\" aria-label=\"popular authorization techniques permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>Popular authorization techniques</strong></h3>\n<ul>\n<li><strong>Role-based access controls</strong> (RBAC) can be implemented for system-to-system and user-to-system privilege management.</li>\n<li><strong>JSON web token</strong> (JWT) is an open standard for securely transmitting data between parties, and users are authorized using a public/private key pair.</li>\n<li><strong>SAML</strong> is a standard Single Sign-On format (SSO) where authentication information is exchanged through XML documents that are digitally signed.</li>\n<li><strong>OpenID authorization</strong> verifies user identity based on an authorization server's authentication.</li>\n<li><strong>OAuth</strong> allows the API to authenticate and access the requested system or resource.</li>\n</ul>\n<p>To learn more about the authentication vs authorization - concept, differences, and techniques, check out the infographic created by LoginRadius.</p>\n<p><img src=\"/629448d589d834fc695668f991845794/Authentication-Vs-Authorization-1.webp\" alt=\"Authentication-Vs-Authorization-infographic\"></p>\n<h2 id=\"implementing-identity-and-access-management-with-loginradius\" style=\"position:relative;\"><a href=\"#implementing-identity-and-access-management-with-loginradius\" aria-label=\"implementing identity and access management with loginradius permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Implementing Identity and Access Management with LoginRadius </h2>\n<p>Centralized identity and access management solutions can play a major role in delivering robust authentication and authorization for users within the organizational framework. </p>\n<p>A cloud-based CIAM solution like LoginRadius verifies authoritative user identities and automates privileges and rights based on <a href=\"https://www.loginradius.com/role-management/\">pre-defined roles</a>. </p>\n<p>What more? Not having to manually define permissions saves time, reduces backlogs, and ensure hassle-free user experience.</p>\n<p>Furthermore, with LoginRadius, opportunities to streamline CIAM are endless. That also includes securing access to privileged resources and safeguarding IT infrastructure from <a href=\"https://www.loginradius.com/blog/identity/cybersecurity-attacks-business/\">cyber attacks</a>.</p>\n<h2 id=\"faqs\" style=\"position:relative;\"><a href=\"#faqs\" aria-label=\"faqs permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>FAQs</h2>\n<p><strong>1.  What are some real-world examples of authentication and authorization in use?</strong></p>\n<p>Logging into a social media account using a username/password (authentication) and setting privacy controls for posts (authorization).</p>\n<p><strong>2. How do authentication and authorization improve overall security?</strong></p>\n<p>Authentication ensures only legitimate users access resources, while authorization restricts their actions, reducing potential threats from unauthorized users.</p>\n<p><strong>3. How can businesses determine which solution is best for their needs?</strong></p>\n<p>Businesses should assess their security requirements, user base, and budget to choose between various authentication methods (e.g., password-based, multi-factor, biometrics).</p>\n<p><strong>4. What are some common authentication and authorization technologies in use today?</strong></p>\n<p>Common authentication technologies include OTPs, fingerprint recognition, and smart cards. For authorization, role-based access control (RBAC) and OAuth are prevalent.</p>\n<p><strong>5.  How can authentication and authorization help with compliance requirements?</strong></p>\n<p>Properly implemented authentication and authorization processes can ensure data privacy and access controls, aiding businesses in meeting compliance regulations like GDPR or HIPAA.</p>\n<p><strong>6.  What is the future of authentication and authorization?</strong></p>\n<p>The future likely involves more advanced biometrics, continuous authentication, and AI-driven security measures to combat evolving cyber threats and enhance user experience. </p>\n<p><a href=\"https://www.loginradius.com/contact-us?utm_source=blog&#x26;utm_medium=web&#x26;utm_campaign=authentication-vs-authorization-infographic\"><img src=\"/788a6a84e389edac18728007099fdc1d/Book-a-free-demo-request.webp\" alt=\"book-a-free-demo-loginradius\"></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"June 11, 2020","updated_date":null,"description":"As companies progress towards digital maturity in times of robust cloud-based systems and stringent online security, authentication and authorization are used in conjunction with each other.","title":"Authentication and Authorization Defined: What's the Difference? [Infographic]","tags":["authentication","authorization","ciam solution"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.7699115044247788,"src":"/static/b562f82442eddeb1196fc242b03f5743/7f8e9/authentication-vs-authorization.webp","srcSet":"/static/b562f82442eddeb1196fc242b03f5743/61e93/authentication-vs-authorization.webp 200w,\n/static/b562f82442eddeb1196fc242b03f5743/1f5c5/authentication-vs-authorization.webp 400w,\n/static/b562f82442eddeb1196fc242b03f5743/7f8e9/authentication-vs-authorization.webp 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.webp"}}}},{"node":{"excerpt":"When the foundation of the General Data Protection Regulation (GDPR) was officially laid out, it prompted a rising need for organizations…","fields":{"slug":"/identity/consent-management/"},"html":"<p>When the foundation of the General Data Protection Regulation (GDPR) was officially laid out, it prompted a rising need for organizations running on <a href=\"https://www.loginradius.com/blog/2019/06/customer-identity-and-access-management/\">Customer Identity &#x26; Access Management</a> (CIAM) solutions to re-consider their security arrangements. </p>\n<p>To complement, LoginRadius introduces its Consent Management feature that offers a secure platform to support the European Union's <a href=\"https://www.loginradius.com/gdpr-and-privacy/\">GDPR compliance capabilities</a>.</p>\n<h2 id=\"intend-behind-the-launch\" style=\"position:relative;\"><a href=\"#intend-behind-the-launch\" aria-label=\"intend behind the launch permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Intend Behind The Launch</h2>\n<p>Customer data is at the epicenter of brand engagements today. With customer expectations dramatically shifting over the last couple of years, individuals demand customization and more control while interacting with brands online. </p>\n<p>GDPR exposed the world to a whole lot of data security concerns ranging from how to collect, store, get consent, and use personal information. The aim was to provide mutual benefits for companies and end-users by building stronger trust relationships.</p>\n<p>LoginRadius Consent Management will help companies and their security professionals understand the core mechanism of GDPR requirements and improve customer experience in the process. </p>\n<p><img src=\"/5fbc5db428266aae3bd875cc5a332e23/LoginRadius-Dashboard-Consent-Management.webp\"></p>\n<h2 id=\"key-features-of-the-loginradius-consent-management-to-meet-the-eus-gdpr\" style=\"position:relative;\"><a href=\"#key-features-of-the-loginradius-consent-management-to-meet-the-eus-gdpr\" aria-label=\"key features of the loginradius consent management to meet the eus gdpr permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Key Features of the LoginRadius Consent Management to Meet the EU's GDPR </h2>\n<ul>\n<li>It offers scoped access, encryption of data in transit and at rest, data backup, and a tested BCDR plan audited by independent third parties regularly. </li>\n<li>Our certifications include ISO 27001 and 27018, Service Organization Controls (SOC) 2 Type II, ISO 27001:2013, and EU-US Privacy Shield framework. </li>\n<li>\n<p>It allows the flexibility to perform every action of the consent lifecycle with ease, including:</p>\n<ul>\n<li>Creating, updating, and revocating custom consent forms. </li>\n<li>Scheduling consents forms and activating them at a future timestamp.</li>\n<li>Cloning consent form to create and replicate data.</li>\n<li>Offering user-friendly event-based experience for new and existing users.</li>\n</ul>\n</li>\n<li>Our platform enables easy deployment of consent forms via sequential steps with minimal custom code using our Identity Experience Framework and JavaScript Library.</li>\n<li>Customers own the right to grant consent, reject, access, withdraw, and modify data, along with portability and erasure in a transparent, freely given, clear, specific, informed, and unambiguous manner. </li>\n<li>It offers a single API for viewing and managing customer data across all systems, with a unified rich user profile. </li>\n<li>Our consent repository is designed as a secure database and a single source of truth for all data processing based on customers’ consent.</li>\n<li>It supports language localization for better and personalized communication.</li>\n</ul>\n<p><a href=\"https://www.loginradius.com/resource/loginradius-consent-management/\"><img src=\"/9c5ce3cacefd773e3410a21290c579f3/DS-Consent-Management-1024x310.webp\" alt=\"Loginraidus consent management datasheet\"></a></p>\n<h2 id=\"a-final-word\" style=\"position:relative;\"><a href=\"#a-final-word\" aria-label=\"a final word permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>A Final Word</h2>\n<p>LoginRadius Consent Management is an effort from the cloud-based CIAM solution provider to accelerate the path to compliance. Rest assured, companies can steer clear of GDPR-related fines that can otherwise be devastating even for the world's biggest companies. </p>\n<p>In addition to the GDPR, the LoginRadius Platform is also compliant with other international data privacy <a href=\"https://www.loginradius.com/blog/identity/how-loginradius-helps-enterprises-stay-ccpa-compliant-in-2020/\">standards like the CCPA</a>, NIST, and HIPPA.</p>\n<p><a href=\"https://www.loginradius.com/contact-us?utm_source=blog&#x26;utm_medium=web&#x26;utm_campaign=consent-management\"><img src=\"/8fce571f703a5970dbb1359a2fe0e51a/book-a-demo-loginradius.webp\" alt=\"book-free-demo-loginradius\"></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"May 29, 2020","updated_date":null,"description":"When the General Data Protection Regulation (GDPR) was officially laid out, it sparked an increasing need to re-consider their security arrangements for organisations running on Customer Identity & Access Management (CIAM) solutions.","title":"LoginRadius Launches Consent Management to Support the EU's GDPR Compliance","tags":["data privacy","compliance","consent management"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.408450704225352,"src":"/static/38970150e5b94b9c005f018579fcdbf9/c0524/Consent-Management.webp","srcSet":"/static/38970150e5b94b9c005f018579fcdbf9/61e93/Consent-Management.webp 200w,\n/static/38970150e5b94b9c005f018579fcdbf9/1f5c5/Consent-Management.webp 400w,\n/static/38970150e5b94b9c005f018579fcdbf9/c0524/Consent-Management.webp 769w","sizes":"(max-width: 769px) 100vw, 769px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.webp"}}}},{"node":{"excerpt":"If a couple of years ago, streaming apps were the future, then the future is here. As social isolation continues to be the new normal amidst…","fields":{"slug":"/identity/streaming-applications-secure-customer-data/"},"html":"<p><em>If a couple of years ago, streaming apps were the future, then the future is here.</em></p>\n<p>As social isolation continues to be the new normal amidst work-from-home and social distancing measures, the popularity of over-the-top (OTT) streaming apps – both video and audio has jumped exponentially to meet the <a href=\"https://www.loginradius.com/blog/2020/02/customer-experience-media-entertainment-industry/\">growing entertainment demands</a> of viewers.</p>\n<p>A recent study by Animoto suggests, <a href=\"https://animoto.com/blog/news/social-video-trends-consumers-2020\">70% of businesses</a> are investing in videos compared to the same time last year.</p>\n<p>With no new content for channels to run (because they are unable to shoot due to the pandemic), viewers are gravitating towards OTT streaming apps like Netflix, Disney Hotstar, Amazon Prime to watch fresh content.</p>\n<p><em>But what about data security amidst the volatile digital identity theft environment?</em></p>\n<p>With the boom in streaming applications, OTT services are a hotbed for sensitive credit card data and <a href=\"https://www.loginradius.com/resource/pii-data-breach-report/\">personally identifiable information</a>.</p>\n<p>But sadly, it is not an uncommon occurrence that people share passwords on-the-go or use the same passwords across the plethora of streaming app premium subscriptions they own.</p>\n<p>Cybercriminals can easily monetize such mistakes and sell access credentials for data theft and identity fraud.</p>\n<h2 id=\"recent-cyber-attacks-in-the-video-and-music-streaming-industry\" style=\"position:relative;\"><a href=\"#recent-cyber-attacks-in-the-video-and-music-streaming-industry\" aria-label=\"recent cyber attacks in the video and music streaming industry permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Recent Cyber Attacks in the Video and Music Streaming Industry</h2>\n<ul>\n<li>Popular streaming service, Disney+ indicated credential stuffing cyberattack on their application where hackers used stolen login credentials and then applied the brute force method to hack into accounts.</li>\n<li>Irdeto Piracy Trends <a href=\"https://www.aol.com/article/finance/2018/08/13/hundreds-of-stolen-passwords-for-netflix-hbo-hulu-and-more-discovered-for-sale-on-dark-web/23501424/\">Report revealed</a> that it discovered 854 listings of OTT credentials from 69 unique sellers in the dark web. What's more disturbing was the list included 42 popular streaming services, including Netflix, HBO, and Hulu.</li>\n<li>According to Proofpoint <a href=\"https://www.proofpoint.com/uk/resources/threat-reports/state-of-phish\">threat analysts</a>, cybercriminals steal valid credentials from thousands of Netflix, Disney+ streaming accounts, and sell them online at a discounted price.</li>\n<li>The online music streaming service provider, Mixcloud was compromised by AWS hackers who gained unauthorized access to their systems and tried to <a href=\"https://www.cisomag.com/aws-hacker-attacks-online-music-service-mixcloud/\">sell more than 20 million user data</a> on the dark web. </li>\n</ul>\n<p>It has become imperative for content streaming players to fight back. In fact, using automated bot detection and low-friction authentication like social and passwordless login can go a long way in <a href=\"https://www.loginradius.com/blog/2019/10/digital-identity-management/\">securing digital identities</a>.</p>\n<h2 id=\"cyber-threats-faced-by-video-and-music-streaming-apps\" style=\"position:relative;\"><a href=\"#cyber-threats-faced-by-video-and-music-streaming-apps\" aria-label=\"cyber threats faced by video and music streaming apps permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Cyber Threats Faced by Video and Music Streaming Apps</h2>\n<p>When it comes to entertainment-based streaming applications, security often takes the backseat. For customers, keeping Netflix or Amazon Prime's account credentials secure isn't much of a concern. They won't treat them the same way as they would their bank accounts.</p>\n<p>The lack of awareness is what hackers take advantage of. Some of the common ways attackers gain access to customer account include:</p>\n<h3 id=\"phishing-attack\" style=\"position:relative;\"><a href=\"#phishing-attack\" aria-label=\"phishing attack permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Phishing Attack</h3>\n<p>Phishing is a kind of social engineering attack where imposters dupe victims into opening an email link, instant message, or genuine looking sites to steal login credentials and credit card numbers.</p>\n<p>As the worldwide lockdown is forcing people to rely a lot more on streaming applications like Netflix, Disney+, Hulu, YouTube TV, fraudsters are seeing this as an opportunity to pose threats to users.</p>\n<p>According to a report by <a href=\"https://www.theguardian.com/media/2020/apr/19/hackers-exploit-coronavirus-lockdown-with-fake-netflix-and-disney-pages\">The Guardian</a>, more than 700 lookalike websites resembling Netflix and Disney+ signup pages have been created by hackers to take advantage of the pandemic streaming boom.</p>\n<p>These fake websites entice users with their free subscriptions to steal names, IDs, personal and financial information.</p>\n<h3 id=\"credential-stuffing-attack\" style=\"position:relative;\"><a href=\"#credential-stuffing-attack\" aria-label=\"credential stuffing attack permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Credential Stuffing Attack</h3>\n<p><a href=\"https://www.loginradius.com/blog/2019/09/prevent-credential-stuffing-attacks/\">Credential stuffing</a> is a kind of cyberattack where hackers use large databases of stolen credentials via automated bots to gain access to user accounts.</p>\n<p>One of the biggest loopholes that result in a credential stuffing attack include consumers using the same login and password for multiple applications services.</p>\n<p>Streaming apps are the perfect victim of such attacks. Often, hackers know when there is a worldwide demand for a particular service, for example, during the premiere of a popular series. They know users will be sharing login credentials with others. That's precisely the kind of opportunity hackers look for.</p>\n<h3 id=\"brute-force-attack\" style=\"position:relative;\"><a href=\"#brute-force-attack\" aria-label=\"brute force attack permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Brute Force Attack</h3>\n<p>A brute force attack is a kind of hacking attempt that hackers use to target login pages through trial and error. The bad actors use automated bots to attempt as many guesses as possible until they are able to crack open an account with the right combination.</p>\n<p>One of the biggest examples of brute force attacks on streaming apps is that they are relatively simple to perform. Also, the lack of mitigation strategy in the systems' security level makes it a <a href=\"https://www.loginradius.com/blog/2019/10/cybersecurity-attacks-business/\">popular form of cyberattack</a>.</p>\n<h3 id=\"account-takeover-attack\" style=\"position:relative;\"><a href=\"#account-takeover-attack\" aria-label=\"account takeover attack permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Account Takeover Attack</h3>\n<p>It seems like <a href=\"https://www.loginradius.com/blog/2020/04/corporate-account-takeover-attacks/\">account takeover attacks</a> are the new normal for content streaming applications today. Fraudsters have an intensive criminal ecosystem that often leverages a large database of previously stolen credentials to hack into OTT delivery models.</p>\n<p>They use bot infrastructure to attempt logging in with the hope that at least 1%-2% of these account owners will re-use their credentials. And when consumers do that, bam! Hackers take over those accounts and exploit them for financial gain.</p>\n<h3 id=\"man-in-the-middle-mitm-attack\" style=\"position:relative;\"><a href=\"#man-in-the-middle-mitm-attack\" aria-label=\"man in the middle mitm attack permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Man-in-the-Middle (MitM) Attack</h3>\n<p>Consider MitM attacks as cyber eavesdropping where attackers secretly place them between communication end-points and tamper data through a compromised, yet trusted system.</p>\n<p>Man-in-the-middle attacks can be easily automated, and hence, repercussions can be quite severe. Its negative brand publicity can cost businesses in millions, and customers can be ripped off money.</p>\n<p>Detecting MitM attacks is difficult, but they can be prevented through cybersecurity measures like multi-factor authentication and maximizing network control.</p>\n<h2 id=\"ott-over-the-top-streaming-services-and-apps\" style=\"position:relative;\"><a href=\"#ott-over-the-top-streaming-services-and-apps\" aria-label=\"ott over the top streaming services and apps permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>OTT (Over-The-Top) Streaming Services and Apps</h2>\n<p><img src=\"/3e72a8b8b5f32022055b935324bc1789/OTT-Over-The-Top-Streaming-Services-and-Apps-1024x703.webp\" alt=\"OTT (Over-The-Top) Streaming Services and Apps\"></p>\n<p>Streaming entertainment giants are completely <a href=\"https://www.loginradius.com/blog/2020/05/cyber-threats-business-risk-covid-19/\">aware of the cyber threats</a> - a reason why the media landscape is rapidly evolving to accommodate the growing security concerns.</p>\n<p>Some of the OTT (over-the-top) video streaming services and apps that stand out in the volatile environment include:</p>\n<h3 id=\"ott-video-streaming-services-and-apps\" style=\"position:relative;\"><a href=\"#ott-video-streaming-services-and-apps\" aria-label=\"ott video streaming services and apps permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>OTT Video Streaming Services and Apps</h3>\n<ol>\n<li><strong>Netflix</strong></li>\n</ol>\n<p>Content is king, and catalog is everything when it comes to a video streaming service's success. Netflix ticks both the checkboxes. With over 182.8 million subscribers, it is one of the biggest video-distribution networks in the world today.</p>\n<p>To accommodate the security of the vast customer base, Netflix takes a <a href=\"https://partnerhelp.netflixstudios.com/hc/en-us/articles/360001937528-Netflix-Content-Security-Best-Practices\">risk-based approach to content security</a>. </p>\n<p>Some of the measures include regular risk assessment, strong authentication protections via MFA, security training and awareness program, business continuity plan, and ensuring that only persons working on client projects can access the content.</p>\n<ol start=\"2\">\n<li><strong>Amazon Prime Video</strong> </li>\n</ol>\n<p>Another streaming giant, Amazon Prime, handles cybersecurity by following the best possible practices.</p>\n<p>Some of them include the use of SSL to encrypt web traffic, use of secure cookies to prevent client malware from hacking customers and email and DNS protection to verify the authenticity of the email and web addresses. They also have their headers obscured.</p>\n<ol start=\"3\">\n<li><strong>Disney +</strong></li>\n</ol>\n<p>One of the world's largest independent media conglomerates, the Walt Disney Company, or simply Disney+ offers enhanced security measures to keep the data of its millions of subscribers safe.</p>\n<p>Who does it do it? Disney uses a robust SSL algorithm for data encryption. Furthermore, it also ensures that the ASP.NET version header is not exposed, so it is harder for hackers to hack into their systems.</p>\n<ol start=\"4\">\n<li><strong>Voot</strong></li>\n</ol>\n<p>Voot is Viacom18's Premium video on demand (SVOD) service for the Indian audience. It's the latest offering, Voot Select is launched with an extensive digital portfolio.</p>\n<p>The platform offers 32 original shows with edgy and disruptive stories, four international channels, and the best network content 24 hours before the episodes air on TV.</p>\n<ol start=\"5\">\n<li><strong>Alt Balaji</strong></li>\n</ol>\n<p>Alt Balaji, one of the leading OTT players, is a homegrown streaming platform for Indian consumers. With a variety of new options in the original web-series category, it lets you stream Indian content at a minimal cost.</p>\n<p>Speaking of its cybersecurity adjustments, they undertake robust internal control measures to limit the access of information and also offer strong <a href=\"https://www.altbalaji.com/privacy-policy\">security policies against phishing</a> to protect consumer data from identity theft.</p>\n<ol start=\"6\">\n<li><strong>BritBox</strong> </li>\n</ol>\n<p>BritBox is a UK-based digital video subscription service, which is a joint venture between ITV and the BBC. It serves the consumers in the United Kingdom, the United States, and Canada.</p>\n<p>The platform offers an ensemble of the massively popular British TV content along with fresh series of a mixture of genres. BritBox has chosen LoginRadius as the <a href=\"https://www.loginradius.com/press/loginradius-powers-britbox-launch-high-performance-ciam/\">sole provider of its managed identity platform</a>.</p>\n<ol start=\"7\">\n<li><strong>Hulu</strong></li>\n</ol>\n<p>Hulu is a very popular American video streaming application co-owned by The Walt Disney Company and Comcast. It streams newer TV shows in the US and Japan.</p>\n<p>With an extensive library, Hulu majorly focuses on original content, documentaries, blockbuster, and independent films and other popular shows from popular network broadcasters across the globe.</p>\n<ol start=\"8\">\n<li><strong>Zee 5</strong></li>\n</ol>\n<p>Zee 5 is another popular video streaming app for Indian consumers from entertainment network Zee Entertainment Enterprises Limited (ZEEL). The online OTT platform offers entertainment through hyper-personalization in their content developing strategies.</p>\n<p>Zee 5 offers Live TV, TV shows, originals, international shows, and premium movies in 11 navigational and 12 featured languages to cater to the ever-evolving viewership pattern of users.</p>\n<ol start=\"9\">\n<li><strong>HBO Go</strong></li>\n</ol>\n<p>HBO GO is a streaming service that is offered for free along with an existing HBO subscription. Consumers can enjoy unlimited access to the best HBO shows, movies, sports, and documentaries.</p>\n<ol start=\"10\">\n<li><strong>SonyLIV</strong></li>\n</ol>\n<p>SonyLIV is another popular OTT service that streams quality content by Sony Pictures Networks India Private Limited (SPN) for Indian users. Launched in 2013, it is the first premium video-on-demand service that offers multi-screen engagement, a massively popular concept these days.</p>\n<p>With secured digitization taking over the streaming platform, consumers are swamped with choices – FuboTV, Tubi, Philo, Youtube TV, Sling TV, Crunchyroll, Apple TV Plus, Sony Crackle, Hotstar, Erosnow, Viu, Jio Cinema, Zengatv and more.</p>\n<h3 id=\"ott-audio-streaming-services-and-apps\" style=\"position:relative;\"><a href=\"#ott-audio-streaming-services-and-apps\" aria-label=\"ott audio streaming services and apps permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>OTT Audio Streaming Services and Apps</h3>\n<ol>\n<li><strong>Apple Music</strong></li>\n</ol>\n<p>Apple Music is one of the most loved music streaming apps that features more than 30 million songs and a 24/7 live radio. Music lovers can enjoy both commercial and local hits and options to upload their own music and stream to their devices.</p>\n<ol start=\"2\">\n<li><strong>Deezer</strong> </li>\n</ol>\n<p>Deezer is another popular music streaming app for music fanatics in the United States. It claims to offer the best quality music streaming service with an infinite collection of songs with automated recommendations.</p>\n<ol start=\"3\">\n<li><strong>iHeartRadio</strong></li>\n</ol>\n<p>iHeartRadio is one of the personal favorites of listeners who love to enjoy music from curated playlists. The premium on-demand music service houses millions of tracks, and there are radio stations that are offered for free.</p>\n<ol start=\"4\">\n<li><strong>Pandora</strong></li>\n</ol>\n<p>For music lovers looking for the most reliable online radio station, Pandora is the first choice. While there's a lot to enjoy in the free plan, listeners can enjoy unlimited skips with the premium account, along with a diverse collection of personalized radio stations.</p>\n<ol start=\"5\">\n<li><strong>SoundCloud</strong></li>\n</ol>\n<p>SoundCloud is a community-driven music streaming app and a popular choice for global indie creators. Listeners are exposed to millions of popular tracks, and they can also upload their own music.</p>\n<ol start=\"6\">\n<li><strong>Google Play Music</strong></li>\n</ol>\n<p>Google Play Music is undoubtedly one of the most popular audio streaming sites among music lovers. It is a perfect choice for on-demand music access with a tidy interface compared to other popular streaming sites.</p>\n<ol start=\"7\">\n<li><strong>Spotify</strong> </li>\n</ol>\n<p>Spotify has it all - from millions of songs, curated radio stations, playlists, podcasts, and even some video content. It is one of the most recognizable streaming music apps after Google Play Music.</p>\n<ol start=\"8\">\n<li><strong>Tidal</strong> </li>\n</ol>\n<p>Tidal is unquestionably a popular music streaming site that supports High Fidelity music. It offers a collection of over 50 million soundtracks and is available to dozens of countries worldwide. Tidal recommends users to access through Google Chrome to enjoy a HiFi music experience.</p>\n<p>Among its popular features include Android TV support, over 130,000 high definition music videos, expertly curated playlists, and a music blog.</p>\n<ol start=\"9\">\n<li><strong>YouTube Music</strong></li>\n</ol>\n<p>YouTube Music is the video service's most popular and recognizable music streaming offering. Like other music apps, users can enjoy millions of songs on the platform with the unique differentiation that it sources the YouTube channel.</p>\n<ol start=\"10\">\n<li><strong>Gaana</strong></li>\n</ol>\n<p>Gaana is an incredibly popular music streaming app among Indian audiences, mostly because of its selection of curated playlists and lively looking interface.</p>\n<p>With other popular options like TuneIn Radio, Wynk, JioSaavn, Amazon Prime Music, IDAGIO, PrimePhonic, and the likes, there is no shortage of music apps.</p>\n<p>Now, think of it this way. If nearly all of the population is attached to at least one streaming service (be it audio or video), we are a lucrative target for hackers to get their hands on sensitive data.</p>\n<h2 id=\"5-things-video-and-audio-streaming-industry-can-do-to-secure-the-user-experience\" style=\"position:relative;\"><a href=\"#5-things-video-and-audio-streaming-industry-can-do-to-secure-the-user-experience\" aria-label=\"5 things video and audio streaming industry can do to secure the user experience permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>5 Things Video and Audio Streaming Industry Can Do to Secure the User Experience</h2>\n<p><img src=\"/16101773583e02a6ee4bff2f6c183710/Video-and-Audio-Streaming-Industry-1024x703.webp\" alt=\"Video and Audio Streaming Industry \"></p>\n<p>Identity is the most important entity in the digital ecosystem. Streaming applications should know how to associate the required restrictions with the right users and secure customer experiences. Here are five other ways to enhance customer security. </p>\n<ol>\n<li><strong>Put user experience at the center.</strong></li>\n</ol>\n<p>Popular streaming sites like Netflix, Amazon Prime, Disney + already do that. They offer curated recommendations on their home screen based on viewers' most binge-watched genre. This is where the use of AI for seamless customer experience comes into play. </p>\n<p>Make sure the UX complement aspects such as targeted retention strategies, quick onboarding, and secure payment gateways. </p>\n<p>But then, let's not forget that hackers are skilled engineers that develop faulty algorithms to redirect consumers to different payment sites. Make sure <a href=\"https://www.loginradius.com/authentication/\">you are authenticating users</a> with a robust security system on your OTT platform. </p>\n<ol start=\"2\">\n<li><strong>Safeguard customer data.</strong> </li>\n</ol>\n<p>Securing customer data in the digital space is a big deal for any industry. As consumers continue to subscribe, and your community grows, the growing database becomes more and more vulnerable to security risks.</p>\n<p>Henceforth, if any brand fails to <a href=\"https://www.loginradius.com/security/\">prioritize security and privacy</a>, it may be a significant blow to reputation. </p>\n<p>Conversely, practicing the right cybersecurity measures and investing in the right identity management solution will gain a competitive edge over others. </p>\n<ol start=\"3\">\n<li><strong>Steer clear of targeted automation and bots.</strong></li>\n</ol>\n<p>A vast majority of credential stuffing attacks happen due to botnets. Hackers usually program botnets to devise account takeovers of consumer data that are most vulnerable to attacks. </p>\n<p><a href=\"https://www.loginradius.com/blog/2019/06/what-is-multi-factor-authentication/\">Using multi-factor authentication</a> can help a great deal in reducing such risks. Users trying to authenticate should first confirm the human use of a web browser. </p>\n<p>For example, the clicking pattern or movement of a mouse during Recaptcha evaluation can determine the difference between a bot and a human.</p>\n<ol start=\"4\">\n<li><strong>Implement low-fiction security solutions.</strong></li>\n</ol>\n<p>If remembering complex passwords is a problem for consumers, introduce <a href=\"https://www.loginradius.com/blog/identity/passwordless-authentication-the-future-of-identity-and-security/\">passwordless authentication</a> into your system where you can confirm a user's identity through OTP, magic link, or biometrics in a more efficient, and secure way.</p>\n<p>It will keep customer data safe without creating any inconvenience to user experience — a win-win for both parties.</p>\n<ol start=\"5\">\n<li><strong>Protection against piracy.</strong></li>\n</ol>\n<p>Piracy sites are quite popular in the industry because they allow users to stream content for free. The lack of a monthly subscription business model seems more appealing than premium streaming services where users cannot move past thumbnails unless they are subscribers.</p>\n<p>Other benefits like live streaming of premium TV content make piracy sites more popular among general users. Sometimes, they resemble popular streaming applications to make hacking even easier.</p>\n<p>Educate your customers about different hacking practices and make sure they can distinguish between you and your pirated version.</p>\n<h2 id=\"the-need-for-identity-management-in-online-streaming-services-and-applications\" style=\"position:relative;\"><a href=\"#the-need-for-identity-management-in-online-streaming-services-and-applications\" aria-label=\"the need for identity management in online streaming services and applications permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>The Need for Identity Management in Online Streaming Services and Applications</h2>\n<p>Securing content and safeguarding customer information is crucial to the functioning of streaming apps. Any loophole in the security system may lead to compromised service and put your OTT brand at risk.</p>\n<p>A <a href=\"https://www.loginradius.com/blog/2019/06/customer-identity-and-access-management/\">cloud-based identity management solution</a> like LoginRadius sits between streaming services and general users to safeguard data embedded in backend and frontend systems.</p>\n<p>Today, streaming subscribers want things to be effortless and easy-to-operate. An identity management platform ticks all the boxes here.</p>\n<p>Wondering how? Let's find out. </p>\n<ul>\n<li>\n<p><strong>Single Sign-On</strong>: SSO or <a href=\"https://www.loginradius.com/blog/2019/05/what-is-single-sign-on/\">Single Sign-on</a> allows a unified login system where a single set of login credentials can be used to access multiple partners.  </p>\n<p>Video broadcasting company BroadcastMed's successful implementation of SSO by LoginRadius is a good example.</p>\n</li>\n</ul>\n<p><a href=\"https://www.loginradius.com/resource/broadcastmed-case-study\"><img src=\"/126ce2cb537b24d68bc6b52a7f7def91/CS-BroadcstMed-1024x310.webp\" alt=\"BroadcastMed case study\"></a></p>\n<p>The identity provider offered a centralized login system where users can seamlessly navigate to third-party sites and other syndication partners without the need to log in and out every time.</p>\n<ul>\n<li>\n<p><strong>Passwordless Login</strong>: The general users love it if they can log in or register without a password. In the streaming industry, <a href=\"https://www.loginradius.com/blog/2019/10/passwordless-authentication-the-future-of-identity-and-security/\">passwordless login</a> can act as a catalyst for customer retention and loyalty.  </p>\n<p>With advanced authentication features like one-touch login and <a href=\"https://www.loginradius.com/docs/authentication/tutorial/smart-login/\">smart login</a>, subscribers can simply login by entering the OTP or email ID.</p>\n</li>\n<li><strong>Social Login</strong>: <a href=\"https://www.loginradius.com/social-login/\">Social login</a> is another authentication module that helps reduce login complexities and password fatigue. Subscribers can authenticate using their existing social media credentials instead of filling out time-consuming forms.</li>\n<li><strong>Increase security with MFA</strong>: Streaming applications can offer multi-factor authentication or <a href=\"https://www.loginradius.com/multi-factor-authentication/\">MFA as an additional security layer</a> to protect subscribers' data. They can minimize the risk of data theft by mandating customers to enter an instant OTP or open a link.</li>\n<li><strong>Compliance and privacy management</strong>: An identity management solution ensures that international <a href=\"https://www.loginradius.com/data-governance/\">data governance policies</a> are met. Additionally, it takes care of real-time fraud analysis to prevent stubborn hacking attempts.</li>\n</ul>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>Frictionless user experience and optimal security drive the transformation of the audio and video streaming industry. A common reason why most people do not favor multi-factor authentication or like to create unique passwords is because the process adds on to their effort.</p>\n<p>Even then data security remains a crucial aspect. You need to balance both the worlds. An identity management platform can help you achieve that.</p>\n<p><a href=\"https://www.loginradius.com/contact-us?utm_source=blog&#x26;utm_medium=web&#x26;utm_campaign=streaming-applications-secure-customer-data\"><img src=\"/788a6a84e389edac18728007099fdc1d/Book-a-free-demo-request-1024x310.webp\" alt=\"book-a-free-demo-loginradius\"></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"May 21, 2020","updated_date":null,"description":"OTT streaming apps should know how to mitigate data theft. Using a robust identity management solution in online streaming services helps secure digital identities.","title":"Streaming Applications: How to Secure Your Customer Data","tags":["data security","authentication","cx"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.9607843137254901,"src":"/static/ee364b2cb64da194a090d7c64fbaba1d/7f8e9/secure-customer-data.webp","srcSet":"/static/ee364b2cb64da194a090d7c64fbaba1d/61e93/secure-customer-data.webp 200w,\n/static/ee364b2cb64da194a090d7c64fbaba1d/1f5c5/secure-customer-data.webp 400w,\n/static/ee364b2cb64da194a090d7c64fbaba1d/7f8e9/secure-customer-data.webp 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.webp"}}}},{"node":{"excerpt":"Cyber threat for businesses has always been a big deal. With the world population self-quarantined at home and the stock market succumbing…","fields":{"slug":"/identity/cyber-threats-business-risk-covid-19/"},"html":"<p>Cyber threat for businesses has always been a big deal. With the world population self-quarantined at home and the stock market succumbing to the ill-fated Covid-19, cybercriminals are making the most of the on-going crisis and adding on to the cyberthreat landscape.</p>\n<p>In April 2020 alone, WHO reported that some 450 active official email addresses and passwords <a href=\"https://www.who.int/news-room/detail/23-04-2020-who-reports-fivefold-increase-in-cyber-attacks-urges-vigilance\">were leaked online</a> along with thousands of other credentials – all linked with people working to mitigate the coronavirus impact.</p>\n<p>For cybercriminals, it has become easier than ever to conduct social engineering campaigns where they use fake emails to exploit the fear around the COVID-19 pandemic.</p>\n<p>Before going through the protection module, let's find out a few more creative examples of cyber threat for businesses.</p>\n<ul>\n<li>Online sellers are claiming they offer unlimited delivery of essentials products like groceries, medical, cleaning, and household supplies. When buyers pre-order, they never receive the order.</li>\n<li>Cybercriminals are creating fake websites with bogus face masks, hand sanitizers, wipes, and other medical equipment.</li>\n<li>Charities are losing money to man-in-the-middle attacks. Scammers are stealing donated money by hacking into organizations' accounts and redirecting donors to fake accounts.</li>\n<li>Phishing attempts by tempting users to get hold of personal data like account numbers, Social Security numbers, and <a href=\"https://www.loginradius.com/blog/2019/09/prevent-credential-stuffing-attacks/\">login credentials</a>. </li>\n</ul>\n<p>Amidst IT facing the heat to mitigate the Covid-19 data breach challenges, certain techniques like phishing attack remain constant.</p>\n<p>It is time for businesses to pull the chord on attackers exploiting accounts and gaining access to high-profile resources. </p>\n<h2 id=\"industries-at-risk-during-covid-19\" style=\"position:relative;\"><a href=\"#industries-at-risk-during-covid-19\" aria-label=\"industries at risk during covid 19 permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Industries at Risk During COVID-19</h2>\n<p>With the majority of companies working on the \"work from home\" module, cyber threats for businesses have increased multi-fold – which is irrespective of any industry. The most notable ones include:</p>\n<h3 id=\"media-industry\" style=\"position:relative;\"><a href=\"#media-industry\" aria-label=\"media industry permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>Media Industry</strong></h3>\n<p>The <a href=\"https://www.loginradius.com/blog/2020/02/customer-experience-media-entertainment-industry/\">media and entertainment industry</a> is rapidly becoming a new favorite for cyber hackers as they find creative ways to exploit revenue-driven assets like intellectual property or commercially sensitive data in the industry's security infrastructure. </p>\n<p>Moreover, with the shooting popularity of streaming sites due to the pandemic, hackers are turning these services into a new hotspot for exploitation. </p>\n<p>According to the cybersecurity firm Mimecast, <a href=\"https://www.capetalk.co.za/podcasts/136/early-breakfast-with-abongile-nzelenzele/310995/streaming-services-spoofed-more-than-700-suspicious-domains-impersonating-netflix-found\">more than 700 fake websites</a> resembling Netflix and Disney+ signup pages were identified between 6th April 2020 and 12 April 2020. </p>\n<p>It seems like with the world population obliged to stay at home, hackers are redirecting their attention to streaming services for understandably obvious reasons – i.e. to pose cyber threat for businesses. </p>\n<h3 id=\"hospitality-industry\" style=\"position:relative;\"><a href=\"#hospitality-industry\" aria-label=\"hospitality industry permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>Hospitality Industry</strong></h3>\n<p>Hospitality is one of the hardest-hit industries during this time of the pandemic. It witnessed a sharp decline in the first quarter of 2020. But, just because the industry isn't in its best shape at the moment, it doesn't mean they aren't a target for bad actors anymore. </p>\n<p>Hackers are getting increasingly sophisticated and finding new ways to steal guests' information from systems, servers, and even the front desks. </p>\n<p><a href=\"https://www.loginradius.com/blog/2020/04/marriott-data-breach-2020/\">Marriott data breach</a> at the end of February 2020 made headlines for the second time. More than 5.2 million guest data including names, birth-dates, phone numbers, language preferences, and loyalty account numbers were exposed as a result of the breach.</p>\n<p>A data breach in this sector can lead to severe cyber threat for businesses like damage to reputation, loss of customer trust, and cost thousands of dollars in fines and penalties. </p>\n<h3 id=\"financial-industry\" style=\"position:relative;\"><a href=\"#financial-industry\" aria-label=\"financial industry permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>Financial Industry</strong></h3>\n<p>The <a href=\"https://www.loginradius.com/blog/2020/04/financial-industry-identity-management/\">financial industry</a> is no alien to cyberattacks during the novel coronavirus pandemic. The U.S. Secret Service and the FBI even declared that <a href=\"https://www.us-cert.gov/ncas/alerts/aa20-106a\">North Korea's hacking activities</a> are threatening the country's financial system and the stability of the global community at large.</p>\n<p>As governments across the globe are sanctioning millions of dollars to mitigate the economic crisis, financial institutions play the primary role in distributing the funds to companies and citizens. Therefore, this industry is a juicy target, not just for North Korea but for the bad actors at large. </p>\n<p>With people working remotely on less secure networks, they are easy targets for hackers to exploit sensitive systems and even bring down national economies. </p>\n<h3 id=\"retail-industry\" style=\"position:relative;\"><a href=\"#retail-industry\" aria-label=\"retail industry permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>Retail Industry</strong></h3>\n<p>Mimecast observed more than <a href=\"https://www.mimecast.com/globalassets/cyber-resilience-content/100-days-of-coronavirus-threat-intelligence.pdf\">60,000 COVID-19-related fake domains</a> were created since January 2020 to steal from unsuspecting panic-buyers through lookalike domains during the time of crisis. </p>\n<p>The <a href=\"https://www.loginradius.com/blog/2020/05/customer-experience-retail-industry/\">retail industry</a> has a lot to do with payment and transactions. Retailers are loaded with customers' personally identifiable information, and if hacked, millions of data are exposed.</p>\n<p>No doubt, attackers have become more opportunist and automated with time. In response to the increasing impersonation attack campaigns and cyber threat for businesses, organizations need to review their cybersecurity strategies and add multiple layers of security as their first line of defense. </p>\n<p><a href=\"https://www.loginradius.com/resource/how-retail-and-consumer-goods-companies-use-loginradius-identity-solution/\"><img src=\"/c95f0155d52f8dea65efe90f3ec7c41a/How-Retail-Consumer-Goods-Companies-Use-the-LoginRadius.webp\" alt=\"Datasheet-How-Retail-Consumer-Goods-Companies-Use-the-LoginRadius\"></a></p>\n<h3 id=\"gaming-industry\" style=\"position:relative;\"><a href=\"#gaming-industry\" aria-label=\"gaming industry permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>Gaming Industry</strong></h3>\n<p><a href=\"https://www.loginradius.com/blog/2020/01/improving-customer-experience-in-the-gaming-industry/\">Gamers are taking advantage</a> of social distancing to boost gaming skills while the newbies are using games to relieve their boredom or alleviate their anxiety.</p>\n<p>No doubt, the gaming industry is gradually becoming a lucrative target <a href=\"https://securityintelligence.com/posts/player-vs-hacker-cyberthreats-to-gaming-companies-and-gamers/\">for hackers</a> to make money - mostly in exchange for in-game items for profit. </p>\n<p>Also, gamers fall under elite demographics who do not mind spending money. So, their financial status is also a big turn-on for hackers. </p>\n<h3 id=\"education-industry\" style=\"position:relative;\"><a href=\"#education-industry\" aria-label=\"education industry permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>Education Industry</strong></h3>\n<p>The pandemic has reformed the online learning landscape (for good). E-learning is quickly shaping up as the new normal for the global education industry.</p>\n<p>With schools and colleges temporarily shut, the impact of the crisis is reshaping application processes and taking active care of crisis management strategies. </p>\n<p>That was the good part. Now, speaking of what went wrong, criminals are in no mood to spare this industry too. Recently, the popular online learning platform Unacademy <a href=\"https://www.business-standard.com/article/companies/unacademy-s-database-hacked-information-of-11-million-users-compromised-120050701280_1.html\">was hacked online</a>. </p>\n<p>The breach exposed details of 22 million users and listed 21,909,707 records for sale at $2,000 on darknet forums. Most of the compromised data included usernames, hashed passwords, email addresses, profile details, account status, date of joining, and last login date.</p>\n<h2 id=\"best-practices-for-companies-to-deal-with-cyber-threats-during-covid-19\" style=\"position:relative;\"><a href=\"#best-practices-for-companies-to-deal-with-cyber-threats-during-covid-19\" aria-label=\"best practices for companies to deal with cyber threats during covid 19 permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Best Practices for Companies to Deal With Cyber Threats During COVID-19</h2>\n<p><img src=\"/8a429cdab46eb634d4e7382988c72f09/Best-Practices-for-Companies-to-Deal-With-Cyber-Threats.webp\"></p>\n<p>As companies across the globe are adapting to new working environments to remain socially distant, it seems like cybercriminals are competing within themselves to come up with innovative ways to devise new cyber threat for businesses and exploit new vulnerabilities. </p>\n<p>It is high time for enterprises to understand the <a href=\"https://www.loginradius.com/blog/2019/10/cybersecurity-attacks-business/\">severity of cyberattacks</a> and work in advance to mitigate those threats. Following are a few best practices:</p>\n<h3 id=\"secure-remote-working\" style=\"position:relative;\"><a href=\"#secure-remote-working\" aria-label=\"secure remote working permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>Secure remote working.</strong></h3>\n<p>No matter how hard you try, remote working can never be like working from the office. There is a huge difference in attitude between the two. But when we at a more comfortable space, it is much easier to make mistakes.</p>\n<ul>\n<li>Train your employees on how to work on a remote setup. Get work from home organization policies drafted and educate employees so they can comply. </li>\n<li>Ensure that your employees' system communication at home is free from eavesdropping. Educate them on how to configure home Wi-Fi router for added security. Also, hard to guess passwords is a must. </li>\n<li>If you're working in a BYOD model, ask your employees to <a href=\"https://www.loginradius.com/blog/2019/10/cybersecurity-best-practices-for-enterprises/\">cover basic security features</a> like installing antivirus software and multi-factor authentication.</li>\n<li>All desktops, laptops and mobile devices should be patched and updated.</li>\n<li>Ensure your employees do not click or open any unknown attachment or donation links. In case of suspicion, ask them to verify first.</li>\n</ul>\n<h3 id=\"get-the-security-fundamentals-right\" style=\"position:relative;\"><a href=\"#get-the-security-fundamentals-right\" aria-label=\"get the security fundamentals right permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>Get the security fundamentals right.</strong></h3>\n<p>Bear in mind that cybercriminals are always on the lookout to leverage every vulnerability in their favor to pose cyber threat for businesses. Therefore, companies should remain composed during this global crisis and plan every counteractive move.</p>\n<ul>\n<li>If your organization is working on a remote setup, train your employees to install software updates as soon as they are released. Maybe, ask your IT team to patch anti-malware apps with email and online surfing to mitigate threat vulnerabilities.</li>\n<li>Even though multi-factor authentication is in place, ensure that your employees are practicing good <a href=\"https://www.loginradius.com/blog/2018/12/infographic-the-death-of-passwords/\">password hygiene</a>. Popular recommendations include passphrases, never using the same password for different accounts, updating default passwords, adding special characters instead of just digits or letters.</li>\n<li>Keep backup of your data and regularly test processes as things pile up. Moreover, it comes handy when businesses fall victim of ransomware attacks. Not relying on just the one data backup center means not having to pay criminals to get your data back.</li>\n</ul>\n<h3 id=\"conduct-safer-meetings\" style=\"position:relative;\"><a href=\"#conduct-safer-meetings\" aria-label=\"conduct safer meetings permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>Conduct safer meetings.</strong></h3>\n<p>Close to half a million Zoom (a video conferencing app) accounts were <a href=\"https://www.bleepingcomputer.com/news/security/over-500-000-zoom-accounts-sold-on-hacker-forums-the-dark-web/\">sold on the dark web</a>. Get the severity? Businesses need to be extra cautious while conducting meetings in a remote environment. Top recommendations include: </p>\n<ul>\n<li>The IT department should approve of the web-conference platform.</li>\n<li>Introduce new participants as they join in to avoid falling for imposters.</li>\n<li>Do not use the same meeting access codes for meetings. Change them occasionally.</li>\n<li>Never record meetings, unless extremely needed.</li>\n</ul>\n<h3 id=\"secure-confidential-data\" style=\"position:relative;\"><a href=\"#secure-confidential-data\" aria-label=\"secure confidential data permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>Secure confidential data.</strong></h3>\n<p>Because employees are working in their network environments, it has become imperative to <a href=\"https://www.loginradius.com/security/\">secure confidential organizational data</a>. Here are some instructions businesses would want to send out:</p>\n<ul>\n<li>Restrict employees from transferring business data to personal computers.</li>\n<li>Documents with sensitive data should be locked securely outside of office hours. </li>\n<li>Do not allow employees to print documents or emails that contain sensitive data, if not necessary.</li>\n</ul>\n<h2 id=\"how-loginradius-mitigates-the-risk-for-organizations\" style=\"position:relative;\"><a href=\"#how-loginradius-mitigates-the-risk-for-organizations\" aria-label=\"how loginradius mitigates the risk for organizations permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How LoginRadius Mitigates the Risk for Organizations</h2>\n<p><img src=\"/dd27c3c0adce088c05a1d17e2dc2389d/Industries-at-Risk-During-COVID-19.webp\" alt=\"Industries at Risk During COVID-19\"></p>\n<p>The coronavirus outbreak has pushed more people to go digital. A <a href=\"https://www.loginradius.com/blog/2019/06/customer-identity-and-access-management/\">customer identity and access management</a> (CIAM) solution like the cloud-based LoginRadius can help businesses deal with scalability and offer a secure environment to sustain the newfound digital identities. </p>\n<p>Few of the advantages for business and its customers include:</p>\n<ul>\n<li><strong>Frictionless access</strong>: With <a href=\"https://www.loginradius.com/blog/2019/05/what-is-single-sign-on/\">single sign-on (SSO)</a>, businesses can allow customers to authenticate without the need to create a new account every single time while entering into their multiple web-based services.</li>\n<li><strong>Seamless login</strong>: <a href=\"https://www.loginradius.com/social-login/\">Social login</a> reduces login issues and password fatigue. It is easy to use as customers do not need to fill out long traditional forms or remember complex credentials. They are instead authenticated using their existing social media credentials.</li>\n<li><strong>Advanced login options</strong>: Businesses can enjoy new and advanced login options like <a href=\"https://www.loginradius.com/blog/2019/10/passwordless-authentication-the-future-of-identity-and-security/\">passwordless authentication</a> where customers can authenticate and log in with a one-time link sent to their email address, phone number, and one-touch login customers can log in without the obligation to create new accounts. </li>\n<li><strong>Enhanced protection</strong>: LoginRadius offers <a href=\"https://www.loginradius.com/blog/2019/06/what-is-multi-factor-authentication/\">multi-factor authentication (MFA)</a> as an essential security feature to secure customers' sensitive data and account access. It prevents attackers from running cyber threat for businesses to a large extend. For example, MFA verifies identities by mandating customers to enter an additional code or open a link sent to their registered mobile number or email id.</li>\n<li><strong>Consent and privacy management</strong>: LoginRadius provides global <a href=\"https://www.loginradius.com/data-governance/\">data access governance</a> policies for businesses to ensure that regional data storage and other privacy compliances are met. Companies can abide by user-centric preferences laid out by international laws like the <a href=\"https://www.loginradius.com/blog/identity/ccpa-vs-gdpr-the-compliance-war/\">EU's GDPR and California's CCPA</a>.</li>\n</ul>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion </h2>\n<p>The digital space is all about identity, where cyber threat for businesses is at an all-time high. With the world on a standstill due to the pandemic, the idea of secure data governance and scalable identity management in the volatile environment should make the cut.</p>\n<p><a href=\"https://www.loginradius.com/contact-us?utm_source=blog&#x26;utm_medium=web&#x26;utm_campaign=cyber-threats-business-risk-covid-19\"><img src=\"/788a6a84e389edac18728007099fdc1d/Book-a-free-demo-request-1024x310.webp\" alt=\"book-a-free-demo-loginradius\"></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"May 18, 2020","updated_date":null,"description":"Cyber risks have always been a big deal for corporations. With the self-quarantined world population at home and the stock market succumbing to the ill-fated Covid-19.","title":"Protecting Organization From Cyber-Threats: Business at Risk During COVID-19","tags":["cybersecurity","data security","ciam solution"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5037593984962405,"src":"/static/3215c52cbabf88766fcec82fd858a33e/7f8e9/cyber-threats.webp","srcSet":"/static/3215c52cbabf88766fcec82fd858a33e/61e93/cyber-threats.webp 200w,\n/static/3215c52cbabf88766fcec82fd858a33e/1f5c5/cyber-threats.webp 400w,\n/static/3215c52cbabf88766fcec82fd858a33e/7f8e9/cyber-threats.webp 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.webp"}}}},{"node":{"excerpt":"LoginRadius has been simplifying identity management to help businesses build stronger relationships with their customers. With our…","fields":{"slug":"/identity/loginradius-ciam-china-business/"},"html":"<p>LoginRadius has been simplifying identity management to help businesses build stronger relationships with their customers.</p>\n<p>With our LoginRadius China CIAM platform, we aim to help businesses <a href=\"https://www.loginradius.com/blog/2019/10/digital-identity-management/\">securely manage digital identities</a> within the restrictive borders of mainland China.</p>\n<h2 id=\"intend-behind-the-launch\" style=\"position:relative;\"><a href=\"#intend-behind-the-launch\" aria-label=\"intend behind the launch permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Intend Behind the Launch</h2>\n<p>The Chinese online market is a lucrative hotspot for businesses with over 900 million active internet users, as of March 2020. From a digital business standpoint, it is critical for enterprises that want to expand their customer base by collecting and storing citizen's data, to understand China's cyber regime.</p>\n<p>We ensure that our LoginRadius China <a href=\"https://www.loginradius.com/blog/identity/customer-identity-and-access-management/\">customer identity and access management</a> platform meets the changing privacy regulations imposed by China, and businesses are able to streamline a hassle-free customer experience in the nation’s digital ecosystem.</p>\n<h2 id=\"key-features-of-the-loginradius-china-ciam\" style=\"position:relative;\"><a href=\"#key-features-of-the-loginradius-china-ciam\" aria-label=\"key features of the loginradius china ciam permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Key Features of the LoginRadius China CIAM</h2>\n<p><strong>Data Center</strong>: To meet the data localization regulation requirements of the Chinese government, LoginRadius owns a primary data center in China. We offer a mature operating model where data accessibility and data protection are completely transparent. Our cloud solution is highly scalable and provides up to a <strong>99.99% service level agreement guarantee</strong> with perfect deployment capabilities. </p>\n<p><strong>Chinese Social Providers</strong>: On the LoginRadius China CIAM platform, businesses can integrate APIs with native social networks like Sina Weibo, Kaixin, QQ Tencent, Renren, WeChat, along with approximately 40 other social providers. There are provisions for mobile native support for WeChat too along with the flexibility to add custom social providers.  </p>\n<p><strong>QQ Tencent Captcha</strong>: Captcha can be applied as a lockout method for brute force attacks. Because China does not support Google reCAPTCHA, LoginRadius serves QQ Tencent Captcha to ensure that the end-user is a human and not bots.</p>\n<p><strong>Multilingual Support</strong>: The LoginRadius China CIAM solution provides local language support through simplified and traditional Chinese. Businesses can easily configure language settings too.</p>\n<p><a href=\"https://www.loginradius.com/resource/loginradius-china-ciam\"><img src=\"/75daf4f44ad3b6733b6c8b006d6fbfe6/DS-Product-Chinese-CIAM-1024x310.webp\" alt=\"Loginradius ciam china datasheet\"></a></p>\n<h2 id=\"a-final-word\" style=\"position:relative;\"><a href=\"#a-final-word\" aria-label=\"a final word permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>A Final Word</h2>\n<p>Privacy and security rule everything in China. With the LoginRadius China customer identity and access management solution, we aim to offer a mainstream business capability for businesses that drive (or aims to drive) revenue growth by leveraging the identity data of Chinese citizens.</p>\n<p>From social integration, <a href=\"https://www.loginradius.com/multi-factor-authentication/\">strong authentication</a>, local language support to meeting the standard regional regulatory compliances, they are the key areas no clients should worry about.</p>\n<p><a href=\"https://www.loginradius.com/contact-us?utm_source=blog&#x26;utm_medium=web&#x26;utm_campaign=loginradius-ciam-china-business\"><img src=\"/dc606ee34e1fd846630cfcbae3647780/BD-Developers2-1024x310.webp\" alt=\"Book-a-demo-loginradius\"></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"May 14, 2020","updated_date":null,"description":"With our LoginRadius China CIAM platform, we aim to help businesses securely manage digital identities within the restrictive borders of mainland China.","title":"Announcement - LoginRadius China CIAM for Businesses to Benefit From Its Lucrative Market","tags":["industry-news"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.408450704225352,"src":"/static/ef16f4d047c68db7667dd53fb6ecf077/58556/LoginRadius-China-CIAM.webp","srcSet":"/static/ef16f4d047c68db7667dd53fb6ecf077/61e93/LoginRadius-China-CIAM.webp 200w,\n/static/ef16f4d047c68db7667dd53fb6ecf077/1f5c5/LoginRadius-China-CIAM.webp 400w,\n/static/ef16f4d047c68db7667dd53fb6ecf077/58556/LoginRadius-China-CIAM.webp 800w,\n/static/ef16f4d047c68db7667dd53fb6ecf077/99238/LoginRadius-China-CIAM.webp 1200w,\n/static/ef16f4d047c68db7667dd53fb6ecf077/7c22d/LoginRadius-China-CIAM.webp 1600w,\n/static/ef16f4d047c68db7667dd53fb6ecf077/ab15c/LoginRadius-China-CIAM.webp 2135w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.webp"}}}}]},"markdownRemark":{"excerpt":"Identity is evolving, and developers are at the forefront of this transformation. Every day brings a new learning—adapting to new standards…","fields":{"slug":"/identity/developer-first-identity-provider-loginradius/"},"html":"<p>Identity is evolving, and developers are at the forefront of this transformation. Every day brings a new learning—adapting to new standards and refining approaches to building secure, seamless experiences.</p>\n<p>We’re here to support developers on that journey. We know how important simplicity, efficiency, and well-structured documentation are when working with identity and access management solutions. That’s why we’ve redesigned the <a href=\"https://www.loginradius.com/\">LoginRadius website</a>—to be faster, more intuitive, and developer-first in every way.</p>\n<p>The goal? Having them spend less time searching and more time building.</p>\n<h2 id=\"whats-new-and-improved-on-the-loginradius-website\" style=\"position:relative;\"><a href=\"#whats-new-and-improved-on-the-loginradius-website\" aria-label=\"whats new and improved on the loginradius website permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What’s New and Improved on the LoginRadius Website?</h2>\n<p>LoginRadius’ vision is to give developers a product that simplifies identity management so they can focus on building, deploying, and scaling their applications. To enhance this experience, we’ve spent the last few months redesigning our interface— making navigation more intuitive and reassuring that essential resources are easily accessible.</p>\n<p>Here’s a closer look at what’s new and why it’s important:</p>\n<h3 id=\"a-developer-friendly-dark-theme\" style=\"position:relative;\"><a href=\"#a-developer-friendly-dark-theme\" aria-label=\"a developer friendly dark theme permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>A Developer-Friendly Dark Theme</h3>\n<p><img src=\"/f46881583c7518a93bb24e94c32320de/a-developer-friendly-dark-theme.webp\" alt=\"This image shows how LoginRadius offers several authentication methods like traditional login, social login, passwordless login, passkeys and more in a dark mode.\">    </p>\n<p>Developers spend long hours working in dark-themed IDEs and terminals, so we’ve designed the LoginRadius experience to be developer-friendly and align with that preference.</p>\n<p>The new dark mode reduces eye strain, enhances readability, and provides a seamless transition between a coding environment and our platform. Our new design features a clean, modern aesthetic with a consistent color scheme and Barlow typography, ensuring better readability. High-quality graphics and icons are thoughtfully placed to enhance the content without adding visual clutter.</p>\n<p>So, whether you’re navigating our API docs or configuring authentication into your system, our improved interface will make those extended development hours more comfortable and efficient.</p>\n<h3 id=\"clear-categorization-for-loginradius-capabilities\" style=\"position:relative;\"><a href=\"#clear-categorization-for-loginradius-capabilities\" aria-label=\"clear categorization for loginradius capabilities permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Clear Categorization for LoginRadius Capabilities</h3>\n<p><img src=\"/e5358b82be414940f3fb146013845933/capabilities.webp\" alt=\"This image shows a breakdown of all the LoginRadius CIAM capabilities, including authentication, security, UX, scalability and multi-brand management.\"></p>\n<p>We’ve restructured our website to provide a straightforward breakdown of our customer identity and access management platform capabilities, helping you quickly find what you need:</p>\n<ul>\n<li>Authentication: Easily understand <a href=\"https://www.loginradius.com/blog/identity/authentication-option-for-your-product/\">how to choose the right login method</a>, from traditional passwords and OTPs to social login, federated SSO, and passkeys with few lines of code.</li>\n<li>Security: Implement no-code security features like bot detection, IP throttling, breached password alerts, DDoS protection, and adaptive MFA to safeguard user accounts.</li>\n<li>User Experience: Leverage AI builder, hosted pages, and drag-and-drop workflows to create smooth, branded sign-up and login experiences.</li>\n<li>High Performance &#x26; Scalability: Confidently scale with sub-100ms API response times, 100% uptime, 240K+ RPS, and 28+ global data center regions.</li>\n<li>Multi-Brand Management: Efficiently manage multiple identity apps, choosing isolated or shared data stores based on your brand’s unique needs.</li>\n</ul>\n<p>This structured layout ensures you can quickly understand each capability and how it integrates into your identity ecosystem.</p>\n<h3 id=\"developer-first-navigation\" style=\"position:relative;\"><a href=\"#developer-first-navigation\" aria-label=\"developer first navigation permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Developer-First Navigation</h3>\n<p><img src=\"/a8c155c2b6faf3d5f4b4de4e2b14d763/developers-menu.webp\" alt=\"This image shows the LoginRadius menu bar, highlighting the developer dropdown.\">   </p>\n<p>We’ve been analyzing developer workflows to identify how you access key resources. That’s why we redesigned our navigation with one goal in mind: to reduce clicks and make essential resources readily available.</p>\n<p>The new LoginRadius structure puts APIs, SDKs, and integration guides right at the menu bar under the Developers dropdown so you can get started faster. Our Products, Solutions, and Customer Services are also clearly categorized, helping development teams quickly find the right tools and make informed decisions.</p>\n<h3 id=\"quick-understanding-of-integration-benefits\" style=\"position:relative;\"><a href=\"#quick-understanding-of-integration-benefits\" aria-label=\"quick understanding of integration benefits permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Quick Understanding of Integration Benefits</h3>\n<p><img src=\"/b2f9a964a2da0ea83e2f8596b833bba7/we-support-your-tech-stack.webp\" alt=\"This image shows a list of popular programming languages and frameworks offered by LoginRadius.\"></p>\n<p>Developers now have a clear view of the tech stack available with LoginRadius, designed to support diverse business needs.</p>\n<p>Our platform offers pre-built SDKs for Node.js, Python, Java, and more, making CIAM integration seamless across popular programming languages and frameworks.</p>\n<h2 id=\"over-to-you-now\" style=\"position:relative;\"><a href=\"#over-to-you-now\" aria-label=\"over to you now permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Over to You Now!</h2>\n<p>Check out our <a href=\"https://www.loginradius.com/\">revamped LoginRadius website</a> and see how the improved experience makes it easier to build, scale, and secure your applications.</p>\n<p>Do not forget to explore the improved navigation and API documentation, and get started with our free trial today. We’re excited to see what you’ll build with LoginRadius!</p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"February 21, 2025","updated_date":null,"description":"LoginRadius’ vision is to give developers a product that simplifies identity management so they can focus on building, deploying, and scaling their applications. To enhance this experience, we’ve redesigned our website interface, making navigation more intuitive and reassuring that essential resources are easily accessible.","title":"Revamped & Ready: Introducing the New Developer-First LoginRadius Website","tags":["Developer tools","API","Identity Management","User Authentication"],"pinned":true,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.7857142857142858,"src":"/static/80b4e4fbe176a10a327d273504607f32/58556/hero-section.webp","srcSet":"/static/80b4e4fbe176a10a327d273504607f32/61e93/hero-section.webp 200w,\n/static/80b4e4fbe176a10a327d273504607f32/1f5c5/hero-section.webp 400w,\n/static/80b4e4fbe176a10a327d273504607f32/58556/hero-section.webp 800w,\n/static/80b4e4fbe176a10a327d273504607f32/99238/hero-section.webp 1200w,\n/static/80b4e4fbe176a10a327d273504607f32/7c22d/hero-section.webp 1600w,\n/static/80b4e4fbe176a10a327d273504607f32/1258b/hero-section.webp 2732w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.webp"}}}},"pageContext":{"limit":6,"skip":366,"currentPage":62,"type":"//identity//","numPages":72,"pinned":"ee8a4479-3471-53b1-bf62-d0d8dc3faaeb"}},"staticQueryHashes":["1171199041","1384082988","2100481360","23180105","528864852"]}