{"componentChunkName":"component---src-templates-tag-js","path":"/tags/other/","result":{"data":{"site":{"siteMetadata":{"title":"LoginRadius Blog"}},"allMarkdownRemark":{"totalCount":5,"edges":[{"node":{"fields":{"slug":"/identity/cybersec-roundup-june-2021/"},"html":"<p>The year 2021 will mark the 4th anniversary of the first WannaCry Ransomware attack, which brought the concept of ransomware breaches into the limelight. It has been about half a decade since then. </p>\n<p>Cybersecurity isn’t just an IT issue anymore. It has caused substantial losses to businesses, governments, and individuals around the world. As we head into the third quarter of 2021, this insight is picking up steam.</p>\n<p>In this blog, we will look at the top security breaches in June 2021—when the world economy is already dealing with the effects of the coronavirus.</p>\n<h2 id=\"popular-companies-that-lost-control-of-consumer-data-in-june-2021\" style=\"position:relative;\"><a href=\"#popular-companies-that-lost-control-of-consumer-data-in-june-2021\" aria-label=\"popular companies that lost control of consumer data in june 2021 permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Popular Companies That Lost Control of Consumer Data in June 2021</h2>\n<h3 id=\"1-linkedins-massive-data-breach\" style=\"position:relative;\"><a href=\"#1-linkedins-massive-data-breach\" aria-label=\"1 linkedins massive data breach permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. LinkedIn's Massive Data Breach</h3>\n<p>According to a report by <a href=\"https://restoreprivacy.com/linkedin-data-leak-700-million-users/\">RestorePrivacy</a>, on June 22, a user on a famous hacker site announced the sale of data from 700 million people. </p>\n<p>One million LinkedIn members' email addresses, full names, phone numbers, addresses, and geolocations were included in a sample shared by the user.</p>\n<p>LinkedIn, on the other hand, explained the data's apparent legitimacy. \"Our initial study has revealed that this data was scraped from LinkedIn and other websites and that it contains the same data that we disclosed earlier this year in our April 2021 scraping update,\" the company noted.</p>\n<p>This is LinkedIn's second data security breach incident this year. Earlier, in April 2021, around 500 million user data was stolen from the platform, which included publicly visible profile data.</p>\n<h3 id=\"2-alibabas-billion-item-data-leak\" style=\"position:relative;\"><a href=\"#2-alibabas-billion-item-data-leak\" aria-label=\"2 alibabas billion item data leak permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. Alibaba's Billion-item Data Leak</h3>\n<p>A software developer based in China used Alibaba’s popular <a href=\"https://www.theregister.com/2021/06/16/alibaba_tabao_scraped_data_leak/\">Taobao shopping website</a> for eight months to collect more than 1.1 billion pieces of user information without the company noticing until recently.</p>\n<p>A spokeswoman for Alibaba Group Holding Ltd. said the company proactively discovered and addressed a security flaw in its systems that allowed some unauthorized searches by a third party. The company said it would strengthen security and work with law enforcement but didn’t say how many people were affected.</p>\n<p>The firm revealed that 925 million of its users an average of once a month use their platforms for retail, and the breach of its database caused no personal information or financial losses.</p>\n<p><strong>Also Read</strong>: <a href=\"https://www.loginradius.com/blog/identity/data-security-best-practices/\">9 Data Security Best Practices For 2021</a></p>\n<h3 id=\"3-ea-suffers-a-data-breach\" style=\"position:relative;\"><a href=\"#3-ea-suffers-a-data-breach\" aria-label=\"3 ea suffers a data breach permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3. EA Suffers a Data Breach</h3>\n<p>Hackers broke into Electronic Arts (EA), the video-game publisher behind Battlefield, FIFA, and The Sims, and stole detailed source code to FIFA 21, the Frostbite engine, and other game development tools. </p>\n<p>Other reputable game creators are unlikely to utilize EA's code without permission, but malevolent hackers might use it to cheat or breach a game or engine. A data hack might expose confidential projects and game concepts. Breaching of security is also bad for a company's reputation.</p>\n<p>In addition, the hackers claimed to have Microsoft Xbox and Sony SDKs and API keys for sale. They even uploaded a screenshot displaying a total of 780GB of stolen items.</p>\n<p><img src=\"/f4a2525a9984da26e33c408c8eaa8826/Dark-Web-Hackers-e1623404162841.webp\" alt=\"Dark-Web-Hackers-e1623404162841\"></p>\n<p>Screenshot: <a href=\"https://www.bleepingcomputer.com/news/security/hackers-breach-gaming-giant-electronic-arts-steal-game-source-code/\">Bleepingcomputer</a></p>\n<h3 id=\"4-cvs-data-records-accidentally-exposed\" style=\"position:relative;\"><a href=\"#4-cvs-data-records-accidentally-exposed\" aria-label=\"4 cvs data records accidentally exposed permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>4. CVS Data Records Accidentally Exposed</h3>\n<p>According to <a href=\"https://abc7chicago.com/cvs-data-breach-medical-records-health-cyber-attack/10798172/\">ABC News</a>, more than one billion search data from CVS Pharmacy's website were exposed online. The vulnerability was discovered by a cybersecurity researcher named Jeremiah Fowler. </p>\n<p>The details are related to search phrases on CVS Pharmacy's website and included information about Covid-19 vaccines that people were looking for. Fowler added that users typed in their email address in some cases, which was available in the records.</p>\n<p>CVS admitted to ABC News that they had overlooked a database connected to them and that the breach stemmed from a third-party vendor who was hosting the information. The database has been shut down since. </p>\n<p><strong>Also Read</strong>: <a href=\"https://www.loginradius.com/blog/identity/cyber-threats-business-risk-covid-19/\">Protecting Organization From Cyber-Threats: Business at Risk During COVID-19</a>.</p>\n<h3 id=\"5-jbs-sa-the-worlds-largest-meat-supplier\" style=\"position:relative;\"><a href=\"#5-jbs-sa-the-worlds-largest-meat-supplier\" aria-label=\"5 jbs sa the worlds largest meat supplier permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>5. JBS SA: The World’s Largest Meat Supplier</h3>\n<p>Computer network disruptions at JBS, a multinational conglomeration of animal processing and food manufacturing companies, have had trouble reeling in Australia, Canada, and the US. </p>\n<p>JBS has the five largest beef plants in the United States, and the shutdown has put a fifth of the country's meat supply on hold.</p>\n<p>In June, <a href=\"https://www.bbc.com/news/world-us-canada-57318965\">JBS confirmed</a> that it paid a ransom of nearly $11 million worth of bitcoin to hackers after they disabled its computer systems and demanded payment in the cryptocurrency.</p>\n<h3 id=\"6-nyc-law-departments-large-scale-lockout\" style=\"position:relative;\"><a href=\"#6-nyc-law-departments-large-scale-lockout\" aria-label=\"6 nyc law departments large scale lockout permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>6. NYC Law Department’s Large-Scale Lockout</h3>\n<p>The New York City Law Department was hacked, leaving thousands of its lawyers locked out of their accounts.</p>\n<p>It turned out that a hacker got into the network of the 1,000-lawyer agency by using a worker's email password. The invasions caused havoc with the city's lawyers, halted court procedures, and threw the department's legal affairs into turmoil. Most expressed concerns about the exposure of Social Security numbers and other sensitive data.</p>\n<p>Officials also stated that there was no evidence that the attack harmed the city's computer systems, even though the inquiry was still ongoing. Investigators are still attempting to figure out who the criminal is and the motive of the perpetrator.</p>\n<h2 id=\"protect-your-organization-against-cyber-attacks\" style=\"position:relative;\"><a href=\"#protect-your-organization-against-cyber-attacks\" aria-label=\"protect your organization against cyber attacks permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Protect Your Organization Against Cyber Attacks</h2>\n<p>Seeing how cyber attacks can cause damage should be reason enough to take preventive measures right away. For instance, McKinsey sees next-generation <a href=\"https://www.loginradius.com/\">Identity and Access Management</a> leading enterprise cybersecurity spending in 2021. </p>\n<p><img src=\"/6039906b9eea3dd9caa2c3f9dc025129/mckinsey.webp\" alt=\"mckinsey\"></p>\n<p><strong>Image Source</strong>: <a href=\"https://www.mckinsey.com/business-functions/risk/our-insights/covid-19-crisis-shifts-cybersecurity-priorities-and-budgets\">McKinsey </a></p>\n<p>What other steps can you take to reinforce your organization's cybersecurity framework and protect it from cyberattacks?</p>\n<ul>\n<li>\n<p><strong>Passwordless authentication:</strong> <a href=\"https://www.loginradius.com/blog/identity/passwordless-authentication-the-future-of-identity-and-security/\">Passwordless authentication</a> eliminates the need for users to enter passwords during the verification process. Instead, they must produce another type of proof that verifies their identity, such as a one-time password (OTP), secret PIN, SMS- or app-generated codes, biometrics, etc. </p>\n<p>Hackers want your data. They spend a lot of time trying to break into computer systems, and your passwords are the keys to those systems. So, when you do not have passwords in the first place, that gateway is already locked. </p>\n</li>\n<li>\n<p><strong>Data encryption and regular data backups</strong>: Data encryption is still one of the most effective methods of preventing data leaks. Ensure that sensitive data, such as private consumer information, employee information, and other sorts of sensitive corporate data, is encrypted first and then backed up. </p>\n<p>This way, if your company's sensitive data slips into the wrong hands or you fall victim to ransomware attacks, there's nothing to lose. </p>\n</li>\n<li><strong>Use MFA</strong>: Two-factor authentication or multi-factor authentication adds additional layers of security to the traditional password-based method of identity verification. You'll need to provide an extra authentication method such as a PIN, passcode, or even your fingerprint to re-verify your identity. </li>\n</ul>\n<p>Authenticating consumers is difficult and time-consuming. When used in conjunction, <a href=\"https://www.loginradius.com/contact-sales/\">a CIAM solution like LoginRadius</a> can significantly improve cybersecurity. It uses the approaches mentioned above and all recommended practices to filter permitted access and avoid typical attack situations.</p>\n<p><a href=\"https://www.loginradius.com/contact-us?utm_source=blog&#x26;utm_medium=web&#x26;utm_campaign=cybersec-roundup-june-2021\"><img src=\"/8fce571f703a5970dbb1359a2fe0e51a/book-a-demo-loginradius.webp\" alt=\"book-free-demo-loginradius\"></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"July 01, 2021","updated_date":null,"title":"Cyber Security Round-Up: What Happened in June 2021","tags":["other"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5037593984962405,"src":"/static/f4034ab174208315d71641eba87aee31/58556/cybersec-roundup-june-2021-cover.webp","srcSet":"/static/f4034ab174208315d71641eba87aee31/61e93/cybersec-roundup-june-2021-cover.webp 200w,\n/static/f4034ab174208315d71641eba87aee31/1f5c5/cybersec-roundup-june-2021-cover.webp 400w,\n/static/f4034ab174208315d71641eba87aee31/58556/cybersec-roundup-june-2021-cover.webp 800w,\n/static/f4034ab174208315d71641eba87aee31/cc834/cybersec-roundup-june-2021-cover.webp 1024w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Navanita Devi","github":null,"avatar":null}}}},{"node":{"fields":{"slug":"/identity/how-ui-ux-affects-registration/"},"html":"<p>With the growing need to be online, people are logging into far too many websites all at once. No wonder problems like changing passwords, usernames, and registered mail IDs become obstacles in many instances. </p>\n<p>It is a bad experience for users and definitely not good news for businesses too!</p>\n<p>User experience dominates everything else in today’s marketplace. Among 4.8 billion internet users today, 73% of people prefer user experience over price in their choice of brand. </p>\n<p>It is pretty obvious now that brands should seek new ways to deliver an exceptional customer experience. </p>\n<p>Having spoken about experience, the user interface also crosses the mind. They are two sides of the same coin but cannot be compared with the same weight. Here is my summarized take on both of them. </p>\n<p><strong><em>The user interface is the space where interaction between humans and machines occurs. User experience, on the other hand, encompasses all the aspects of a person’s behavior, attitude, and emotions about using a particular product, system, or service.</em></strong></p>\n<p>No matter where you are on the web, there are various windows open for user interactions. These may be places where users fill their shopping carts, interactive web games, or (most certainly) the website login and registration forms. </p>\n<p>Login is a big deal that decides the entire UX your website is going to deliver. Businesses should try to put as little resistance as possible into their registration process. As with it comes customer identities—the most accurate first-party data beneficial for conversions and customer retention.</p>\n<p>So, what are the best practices that businesses should adopt to create easy-to-sign up registration forms?</p>\n<h2 id=\"the-idea-behind-a-simple-signup-form\" style=\"position:relative;\"><a href=\"#the-idea-behind-a-simple-signup-form\" aria-label=\"the idea behind a simple signup form permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>The Idea Behind a Simple Signup Form</h2>\n<p>A big mailing list and lead generation are the two primary goals of any business. </p>\n<p>For example, look at <a href=\"https://expandedramblings.com/index.php/tinder-statistics/\">Tinder’s 60 million daily active users</a>. </p>\n<p>There is no magical potion behind their user acquisition practices. They are just a bit more careful in their strategies.</p>\n<p>A crucial step in creating a sign-up form is to spend time understanding the user's reasons for signing up. Before preparing your questions, it’s important to think about the following: </p>\n<ul>\n<li>Why is there a need to re-enter your email id when you just mentioned it?</li>\n<li>Do you really NEED a username? Won’t a combination of email id and password be enough for you to log in?</li>\n<li>If, in the end, you still need to verify your email account, won’t a single space asking for your email id be sufficient?</li>\n<li>Will <a href=\"https://www.loginradius.com/resource/social-login-reconsidered/\">Social Login</a> be a good alternative for your situation? If yes, then which network providers should you include?</li>\n<li>Why make your visitors wait till the end of form submission to know about their mistakes like already registered email-id, username already exists, or the password doesn’t meet the guidelines?</li>\n</ul>\n<p>When you finally have all your answers, let's help you design your registration page. </p>\n<p>First stop. Remember <a href=\"https://bizibl.com/marketing/download/8-second-era-connect-distracted-consumers\">the 8-second rule</a>. Your design will either capture a buyer’s interest or lose them for good within the first eight seconds. </p>\n<p>So, how do you keep pace with consumer demands? The following rules will help. </p>\n<p><strong>Rule #1:</strong> Keep the dimensions of all your form fields big. Not everyone is handy with tabs or uses their mouse to click on each field.</p>\n<p><strong>Rule #2:</strong> Make sure your visitors don't have to delete anything when filling out your text fields, as this would just waste their time.</p>\n<p><strong>Rule #3:</strong> Follow the single-column design for your Signup page, as two columns will create confusion when tabbing.</p>\n<p><strong>Rule #4:</strong> Make your sign-up button visible enough with a clear call to action message.</p>\n<p><strong>Rule #5:</strong> Ask only for information that is needed and relevant to your business. Do not stretch your registration form to a length that frustrates your visitor.</p>\n<p><strong>Rule #6:</strong> Do not confuse your visitors and keep it simple and consistent throughout your entire web interface. Also, make it easy to find where to register.</p>\n<p><strong>Rule #7:</strong> Build a value around registration and let your visitors know the purpose of your signup. </p>\n<p>And last, perform A/B testing on your signup forms. You will surely get some space for improvements.</p>\n<h2 id=\"5-examples-of-high-conversion-sign-up-page\" style=\"position:relative;\"><a href=\"#5-examples-of-high-conversion-sign-up-page\" aria-label=\"5 examples of high conversion sign up page permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>5 Examples of High-Conversion Sign Up Page</h2>\n<h3 id=\"1-pinterest\" style=\"position:relative;\"><a href=\"#1-pinterest\" aria-label=\"1 pinterest permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. Pinterest</h3>\n<p><img src=\"/1ff64f5ed2974125b300a06f05fa6be1/how-ui-ux-affects-registration-pinterest1.webp\" alt=\"how-ui-ux-affects-registration-pinterest1\"></p>\n<p>Image source: <a href=\"https://www.pinterest.com/\">Pinterest</a></p>\n<p><strong>Sign-Up form takeaways</strong></p>\n<ol>\n<li>The signup form is a popup that dims the background to only focus on the form. Great designing strategy indeed! </li>\n<li>No bombarding of social networks. Only Facebook and Google are enough.</li>\n<li>Shows the advantages of registering for an account that is good enough to attract new visitors.</li>\n</ol>\n<h3 id=\"2-lane-crawford\" style=\"position:relative;\"><a href=\"#2-lane-crawford\" aria-label=\"2 lane crawford permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. Lane Crawford</h3>\n<p><img src=\"/608ba2088ccb6371107dd4687a12e138/how-ui-ux-affects-registration-landcf.webp\" alt=\"how-ui-ux-affects-registration-landcf\"></p>\n<p>Image Source: <a href=\"https://secure.lanecrawford.com/account/accountCreation.jsp\">Lane Crawford</a></p>\n<p><strong>Sign-Up form takeaways</strong></p>\n<ol>\n<li>Invites visitors to join its world of style by showcasing the benefits for registered users.</li>\n<li>Dynamic representation of offers that are currently going on the portal.</li>\n</ol>\n<h3 id=\"3-gnc\" style=\"position:relative;\"><a href=\"#3-gnc\" aria-label=\"3 gnc permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3. GNC</h3>\n<p><img src=\"/910d2c0e575808e4283cd393e9c51984/how-ui-ux-affects-registration-gnc.webp\" alt=\"how-ui-ux-affects-registration-gnc\"></p>\n<p>Image source: <a href=\"https://www.gnc.com/checkout/index.jsp\">GNC</a></p>\n<p><strong>Sign-Up form takeaways</strong></p>\n<ol>\n<li>A neat and clean sign-up form with no additional fields.</li>\n<li>It has separate sections for login and registration.</li>\n</ol>\n<h3 id=\"4-canva\" style=\"position:relative;\"><a href=\"#4-canva\" aria-label=\"4 canva permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>4. Canva</h3>\n<p><img src=\"/36d0ae1bbbd4de8a16797d142e3145d6/how-ui-ux-affects-registration-canva.webp\" alt=\"how-ui-ux-affects-registration-canva\"></p>\n<p>Image source: <a href=\"https://www.canva.com/login\">Canva</a></p>\n<p><strong>Sign-Up form takeaways</strong></p>\n<ol>\n<li>It has a large form field for easy input.</li>\n<li>It has ONLY 2 form fields for a <a href=\"/blog/growth/sign-up-tips-conversion-rate/\">faster signup process</a>.</li>\n<li>It offers an easy one-click signup process with either your Facebook, Google, or Apple account.</li>\n</ol>\n<h3 id=\"5-make-my-trip\" style=\"position:relative;\"><a href=\"#5-make-my-trip\" aria-label=\"5 make my trip permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>5. Make My Trip</h3>\n<p><img src=\"/0a8935ea7375f168e0e7f22da0b95669/how-ui-ux-affects-registration-mmt.webp\" alt=\"how-ui-ux-affects-registration-mmt\"></p>\n<p>Image source: <a href=\"https://www.makemytrip.com/\">MakeMyTrip</a></p>\n<p><strong>Sign-Up form takeaways</strong></p>\n<ol>\n<li>A concise signup form asking only for your phone number.</li>\n<li>It displays a big slider of the latest offers on the registration page itself.</li>\n<li>Let you filter your trip even before you sign up. Amazing!</li>\n</ol>\n<h2 id=\"benefits-of-using-social-login\" style=\"position:relative;\"><a href=\"#benefits-of-using-social-login\" aria-label=\"benefits of using social login permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Benefits of Using Social Login</h2>\n<p>So far now, you have seen examples of registration forms of different varieties. The one thing common that you will notice in all of the above examples is Social Login. </p>\n<p>You must have probably used them many times to log on to various websites. They are increasingly common and faster modes of registration. </p>\n<p>In fact, according to <a href=\"https://www.loginradius.com/resource/digital-identity-trends-2020/\">Consumer Digital Identity Trend Report 2020</a>, 70.69% of 18-25 year-olds prefer social login.</p>\n<p>Well, no surprise there! </p>\n<p><img src=\"/81f34e18e9e62187c332411bd563ac54/how-ui-ux-affects-registration-lr.webp\" alt=\"how-ui-ux-affects-registration-lr\"></p>\n<p>Image source: <a href=\"https://accounts.loginradius.com/auth.aspx?plan=developer\">LoginRadius</a></p>\n<p>But should you be using them for your own business? Read on the following <a href=\"https://www.loginradius.com/blog/identity/2021/02/social-login-infographic/\">advantages of social login</a> to decide whether you should consider them an alternative to the traditional registration process. </p>\n<ul>\n<li><strong>Faster registration process:</strong> Social login is extremely useful as it cuts down the lengthy and frustrating registration process to just one click.</li>\n<li><strong>More conversions:</strong> Users logged in via social networks are more likely to make a purchase than those who don’t use social login.</li>\n<li><strong>No more password fatigue:</strong> Obviously, memorizing your multiple credentials is a big problem, but social login makes it easy. </li>\n<li><strong>Multiple identities:</strong> Visitors can log on to your website with various social identities that are for sure an excellent opportunity for businesses to control their online identity.</li>\n<li><strong>Huge amount of visitor data:</strong> With social login, you get instant demographic and psychographic data about your visitors that further lead you towards better segmentation, personalization, and goal-targeted offers.</li>\n<li><strong>Less failed logins:</strong> When there is no need to memorize usernames and passwords, naturally, there will be no more failed logins. </li>\n</ul>\n<p>But what about the downside?</p>\n<h2 id=\"drawbacks-of-social-login\" style=\"position:relative;\"><a href=\"#drawbacks-of-social-login\" aria-label=\"drawbacks of social login permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Drawbacks of Social Login</h2>\n<p>When people find so many options in front of them, they are most likely to do one of the following:</p>\n<ul>\n<li>Sometimes consumers forget which service they used to sign up, and then they hesitate to log in and leave the website.</li>\n<li>At times, people choose the wrong provider to sign in, leading to creating a second account. Unfortunately, there is no accurate way to determine whether a Twitter or Facebook profile belongs to the same person.</li>\n</ul>\n<p>Many companies overlook the crucial factors to consider when integrating social login into their website. Some precautions to take include:</p>\n<h2 id=\"best-practices-for-integrating-social-login\" style=\"position:relative;\"><a href=\"#best-practices-for-integrating-social-login\" aria-label=\"best practices for integrating social login permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Best Practices for Integrating Social Login</h2>\n<p><strong>Tip #1:</strong> Do not clutter your website with too many network providers just because it is a popular feature on the block. Add only those which are relevant to you. It is okay if you have only two providers on your login screen.</p>\n<p><strong>Tip #2:</strong> Find where most of your targeted audience floats. Look into every social media channel and find out which will work best for your business while keeping your product and service in mind.</p>\n<p><strong>Tip #3:</strong> Ask for the correct data from consumers and also explain why you want them. Apart from some basic information that a social network provider allows you to retrieve, access to all the other information should be permission-based. ** **</p>\n<p><strong>Tip #4:</strong> Give your visitors a notion of what they can get in exchange for their social credentials.  Just tickle their interests and give them a feeling that they are missing out on something really big.</p>\n<h2 id=\"a-few-recent-stats-on-social-login-preferences\" style=\"position:relative;\"><a href=\"#a-few-recent-stats-on-social-login-preferences\" aria-label=\"a few recent stats on social login preferences permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>A Few Recent Stats on Social Login Preferences</h2>\n<ol>\n<li><strong>70.69%</strong> of 18-25 year-olds prefer social login compared to 16.76% of over 50s.</li>\n</ol>\n<p><img src=\"/c22d9ab2d1a666111ec01db07d6bcd91/how-ui-ux-affects-registration-1.webp\" alt=\"how-ui-ux-affects-registration-1\"></p>\n<ol start=\"2\">\n<li><strong>38.69%</strong> of females prefer social login compared to 48.55% males.</li>\n</ol>\n<p><img src=\"/39c961d621b67215f5dbf16836208c39/how-ui-ux-affects-registration-2.webp\" alt=\"how-ui-ux-affects-registration-2\"></p>\n<ol start=\"3\">\n<li>In <strong>North America</strong>, Facebook and Google are the most popular social networks preferred by 40.23% and 38.04% of consumers, respectively. </li>\n</ol>\n<p><img src=\"/19c201c2ee4d6712a5e867244a0568ba/how-ui-ux-affects-registration-3.webp\" alt=\"how-ui-ux-affects-registration-3\"></p>\n<ol start=\"4\">\n<li>In <strong>Europe</strong>, a similar trend is witnessed. Facebook is preferred by 36.12% of consumers, and Google is preferred by 34.89%.</li>\n</ol>\n<p><img src=\"/d1cad505b5ed94874afdbdfb3fd3a69a/how-ui-ux-affects-registration-4.webp\" alt=\"how-ui-ux-affects-registration-4\"></p>\n<ol start=\"5\">\n<li><strong>Facebook</strong> is still preferred by 51.72% of consumers in the APAC region, and Google is preferred by 26.033%.</li>\n</ol>\n<p><img src=\"/6d83fbf414afa257aee9176528674c58/how-ui-ux-affects-registration-5.webp\" alt=\"how-ui-ux-affects-registration-5\"></p>\n<p>So, get cracking! Obviously, you do not want to lose out on your potential customers. Enjoy the endless benefits of Social Login with the <a href=\"https://www.loginradius.com/social-login/\">LoginRadius unified social API</a>. </p>\n<p><a href=\"https://www.loginradius.com/contact-us?utm_source=blog&#x26;utm_medium=web&#x26;utm_campaign=how-ui-ux-affects-registration\"><img src=\"/8fce571f703a5970dbb1359a2fe0e51a/book-a-demo-loginradius.webp\" alt=\"book-a-demo-loginradius\"></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"April 16, 2021","updated_date":null,"title":"A Detailed Guide on How UX/UI Affects Registration","tags":["other"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5037593984962405,"src":"/static/5c100b3ce4a21c8b21938d462d2e7536/58556/how-ui-ux-affects-registration-cover.webp","srcSet":"/static/5c100b3ce4a21c8b21938d462d2e7536/61e93/how-ui-ux-affects-registration-cover.webp 200w,\n/static/5c100b3ce4a21c8b21938d462d2e7536/1f5c5/how-ui-ux-affects-registration-cover.webp 400w,\n/static/5c100b3ce4a21c8b21938d462d2e7536/58556/how-ui-ux-affects-registration-cover.webp 800w,\n/static/5c100b3ce4a21c8b21938d462d2e7536/cc834/how-ui-ux-affects-registration-cover.webp 1024w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.webp"}}}},{"node":{"fields":{"slug":"/identity/marriott-data-breach-2020/"},"html":"<p>In mid-January 2020, Marriott International suffered a new data breach which affected around 5.2 million guests.</p>\n<p>Marriott claims the security breach could have revealed 5.2 million guests 'personal details. This is the second data breach by Marriott in recent years following a <a href=\"https://www.washingtonpost.com/business/2018/11/30/marriott-discloses-massive-data-breach-impacting-million-guests/\">breach in 2018</a>.</p>\n<h2 id=\"marriott-data-breach-2020-when-and-how-did-it-happen\" style=\"position:relative;\"><a href=\"#marriott-data-breach-2020-when-and-how-did-it-happen\" aria-label=\"marriott data breach 2020 when and how did it happen permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Marriott Data Breach 2020: When and How Did It Happen?</h2>\n<p><a href=\"https://news.marriott.com/news/2020/03/31/marriott-international-notifies-guests-of-property-system-incident/\">The breach was identified</a> at the end of February 2020 and dates back to mid-January 2020.</p>\n<p>Marriott says it discovered in late February that the network of an unspecified hotel chain had been hacked, and hackers who obtained the login credentials of two Marriott employees may have accessed the guest details. The firm has reason to believe the operation began as early as mid-January.</p>\n<p>The breach may have taken personal details such as names, birthdates, and telephone numbers, along with language preferences and loyalty account numbers. </p>\n<p><a href=\"https://mysupport.marriott.com/\">Marriott stated</a>, <em>\"While our investigation is continuing, we currently have no reason to assume that the details involved included passwords or PINs for Marriott Bonvoy account, payment card details, passport information, national IDs or driver's license numbers.\"</em></p>\n<p>Adding to it, Marriott said it contacted guests whose details may have been taken via email and launched a website dedicated to those who were affected. The company offered the program for tracking the personal information of visitors whose details could have been compromised.</p>\n<p>The hotel giant announced another <a href=\"https://news.marriott.com/2018/11/marriott-announces-starwood-guest-reservation-database-security-incident/\">data breach in late 2018</a>, which affected up to 500 million guests while staying at its subsidiary, Starwood, <a href=\"https://www.cnbc.com/2016/09/23/marriott-buys-starwood-becoming-worlds-largest-hotel-chain.html\">purchased by the company in 2016</a>.</p>\n<p>It could be considered an honest mistake to suffer one data breach but to suffer two in less than two years looks like carelessness. There are some promising signs that the company has learned some valuable information security lessons in spite of how it may look to an outsider. From this experience, the <a href=\"https://www.loginradius.com/blog/2020/03/improve-customer-experience-hospitality-industry/\">entire hospitality industry</a> should now know better.</p>\n<p><a href=\"https://www.loginradius.com/resource/pii-data-breach-report/\"><img src=\"/50eb35550996efd860854fef81a6360e/Protecting-PII-Against-Data-Breaches.webp\" alt=\"Protecting-PII-Data-Breaches-industry-report\"></a></p>\n<h2 id=\"what-does-the-hotel-industry-do-to-avoid-data-breaches-like-marriotts\" style=\"position:relative;\"><a href=\"#what-does-the-hotel-industry-do-to-avoid-data-breaches-like-marriotts\" aria-label=\"what does the hotel industry do to avoid data breaches like marriotts permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What does the Hotel Industry do to avoid data breaches like Marriott’s?</h2>\n<p><strong>1. Develop a Security-Centric Culture at the Top Level.</strong><br>\nWhen the security of customer identities and profiles is priority number one. A security-centric mindset ensures a serious approach to <a href=\"https://www.loginradius.com/security/\">customer data security</a>. The approach should be top-down instead of bottom-up, with responsibility resting with the CEO and board.</p>\n<p><strong>2. Stay ahead of the security curve.</strong><br>\nIt’s okay to be cautious in adopting innovations, but when it comes to customer data security products, companies should be proactive, constantly reviewing and trying new developments to <a href=\"https://www.loginradius.com/blog/2019/10/cybersecurity-attacks-business/\">stay ahead of hackers</a>.</p>\n<p><strong>3. Make your security spend for customer data security unbudgeted.</strong><br>\nInvest whatever it takes to protect sensitive customer data. Yes, stay within your financial metrics, but don’t cap the budget, because capping it means you’re compromising. Give the security team whatever they request to <a href=\"https://www.loginradius.com/blog/2019/10/cybersecurity-best-practices-for-enterprises/\">protect the brand</a>. It’s not going to cost billions.</p>\n<p><strong>4. Recognize that customer data security is not a cost center but a revenue center.</strong><br>\nCompanies need to understand that customer data security is part of the revenue center, not the cost center. With better security, you are not only preventing breaches, but you are also <a href=\"https://www.loginradius.com/blog/identity/digital-identity-management/\">building trust within your customer</a> base to generate more revenue.</p>\n<p>Let’s hope that Marriott and its peers in the travel industry have learned that, while the security of customer accounts may not be their core business, it still needs to be priority number one.</p>\n<p><a href=\"https://www.loginradius.com/contact-us?utm_source=blog&#x26;utm_medium=web&#x26;utm_campaign=marriott-data-breach-2020\"><img src=\"/dc606ee34e1fd846630cfcbae3647780/BD-Developers2-1024x310.webp\"></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"April 13, 2020","updated_date":null,"title":"Marriott Data Breach 2020: 5.2 Million Guest Records Were Stolen","tags":["other"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.408450704225352,"src":"/static/0723a654ea87ebf4c412dc3ab1a6bd18/c0524/marriott-data-breach.webp","srcSet":"/static/0723a654ea87ebf4c412dc3ab1a6bd18/61e93/marriott-data-breach.webp 200w,\n/static/0723a654ea87ebf4c412dc3ab1a6bd18/1f5c5/marriott-data-breach.webp 400w,\n/static/0723a654ea87ebf4c412dc3ab1a6bd18/c0524/marriott-data-breach.webp 769w","sizes":"(max-width: 769px) 100vw, 769px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.webp"}}}},{"node":{"fields":{"slug":"/identity/loginradius-announces-17m-series-funding-forgepoint-microsoft/"},"html":"<p><a href=\"https://www.loginradius.com/press/loginradius-announces-series-a-funding-from-forgepoint-and-microsoft-venture/\"><img src=\"/fa7a78b2c8ae160f6704287a6d651f65/funding-img.webp\"></a></p>\n<p>Today, I’m very excited to announce that <a href=\"https://www.loginradius.com/\">LoginRadius</a> has raised $17 million Series A funding, led by ForgePoint Capital and Microsoft’s venture fund, M12. In connection with the funding, both companies will also be joining our board to further our partnership, product and innovation cycles.</p>\n<p>Since LoginRadius’ launch in 2012, we have been relentlessly focused on customer identity and have experienced triple digital annual growth for the past two years.</p>\n<p>This funding opens huge possibilities for the company, in terms of helping us accelerate product innovation, and to expand globally to help serve the fast-growing $20 billion customer identity market.</p>\n<p>You can read the full Press Release <a href=\"https://www.loginradius.com/press/loginradius-announces-series-a-funding-from-forgepoint-and-microsoft-venture/\">here</a>.</p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"July 24, 2018","updated_date":null,"title":"LoginRadius Announces $17M Series A Funding from ForgePoint and Microsoft","tags":["industry-news","other"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.6666666666666667,"src":"/static/fdb8610707cb15170f7eb2bbee9fe5be/58556/loginradius-announces-17m-series-funding.webp","srcSet":"/static/fdb8610707cb15170f7eb2bbee9fe5be/61e93/loginradius-announces-17m-series-funding.webp 200w,\n/static/fdb8610707cb15170f7eb2bbee9fe5be/1f5c5/loginradius-announces-17m-series-funding.webp 400w,\n/static/fdb8610707cb15170f7eb2bbee9fe5be/58556/loginradius-announces-17m-series-funding.webp 800w,\n/static/fdb8610707cb15170f7eb2bbee9fe5be/99238/loginradius-announces-17m-series-funding.webp 1200w,\n/static/fdb8610707cb15170f7eb2bbee9fe5be/90fb1/loginradius-announces-17m-series-funding.webp 1500w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.webp"}}}},{"node":{"fields":{"slug":"/identity/ifma-loginradius-customer-success-story/"},"html":"<p><img src=\"/d5e304bbcf56ccf7e40fd76164dbd678/IFMAlogo.webp\" alt=\"IFMAlogo\"></p>\n<p>The <a href=\"https://www.ifma.org/\">International Facility Management Association (IFMA)</a> is the world’s largest international association and guidance body for facility management professionals. Founded in 1980, IFMA provides credentialing, education programs, and guidance to facility management professionals. Headquartered in Houston (USA), IFMA is a not-for-profit organization supporting professionals in 104 countries.</p>\n<h3 id=\"the-situation\" style=\"position:relative;\"><a href=\"#the-situation\" aria-label=\"the situation permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>The Situation</h3>\n<p>With registered members in more than 100 countries worldwide, IFMA intended to take as much of the member interaction online as possible. This meant that many of its services would be extended to members through their community websites. With the goal of providing a well-rounded online experience, they also wished to collect more information about its members.</p>\n<p>IFMA decided, however, that its members should not be forced to perform unproductive tasks such as completing long registration forms, or remembering multiple login credentials for the various websites. IFMA wanted a seamless user experience for its members so that they would not be distracted or repelled by the different stages in the workflow.</p>\n<h3 id=\"the-challenges\" style=\"position:relative;\"><a href=\"#the-challenges\" aria-label=\"the challenges permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>The Challenges</h3>\n<p>Some of the challenges that IFMA was experiencing included: </p>\n<ul>\n<li>Integrating a social layer into each of IFMA’s websites, and linking each social identity with the IFMA issued membership identity.</li>\n<li>Capturing and store its members’ basic and extended social profile data points, and assigning specific roles to each members after registration.</li>\n<li>Allowing for seamless access between multiple IFMA websites without having to re-authenticate the same member’s identity multiple times. </li>\n<li>Creating a single identity associated with each membership regardless of the number of websites operated by IFMA.</li>\n</ul>\n<h3 id=\"loginradius-solution\" style=\"position:relative;\"><a href=\"#loginradius-solution\" aria-label=\"loginradius solution permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>LoginRadius’ Solution</h3>\n<p>After the deployment of LoginRadius <a href=\"https://www.loginradius.com/blog/identity/customer-identity-and-access-management/\">customer identity and access management solution</a>, IFMA was able to simplify the member sign-up and engagement process. In addition to fulfilling its core objectives, IFMA was able to build rich member profiles with the obtained social profile data. Specifically, LoginRadius helped IFMA achieve its goals in the following ways:  </p>\n<p><strong>1. Introduce Social Login in the Authentication Layer</strong><br>\nIFMA wanted LoginRadius to remove the clunky and time consuming registration form in favour of a <a href=\"https://www.loginradius.com/social-login/\">seamless social login process</a> would increase members’ activities. IFMA opted for Google, Facebook, Twitter, and LinkedIn as the four social networks whose identities its members can utilize to signup and login to the community site. As expected, IFMA experienced a significant increase in member engagement, as well as the number of daily and monthly active users.  </p>\n<p><strong>2. Capture Social Profile Data and Assign Roles</strong><br>\nWith the help of LoginRadius, they were able to obtain the missing <a href=\"https://www.loginradius.com/\">data points via social login</a>. This allowed IFMA to capture the basic and extended data points from the member’s social profile that they have chosen to log in with. Alongside building rich profiles, LoginRadius also provided IFMA with a role management function. This allowed IFMA to assign hierarchical roles to each member upon registration, enabling them to increase website engagement.  </p>\n<p><strong>3. Single Sign-On on Multiple IFMA Websites</strong><br>\nIn preparation for future site additions, IFMA asked LoginRadius to implement <a href=\"https://www.loginradius.com/single-sign-on/\">Single Sign-On</a> for its properties in such a way that new websites can be added to the Single Sign-On grouping on a plug and play basis.  </p>\n<p><strong>4. A Unified Profile for Each Member</strong><br>\nLoginRadius’ cIAM solution ensured that while an individual member can be associated with a number of social profiles, in addition to the official IFMA profile, all of the data associated with the single member is centralized, with only one record created per user. The same convention would also be followed for any prospective IFMA websites as desired by the organization.</p>\n<iframe width=\"770\" height=\"480\" src=\"https://www.youtube.com/embed/p6hyCKXDsic\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen></iframe>\n<p>IFMA - LoginRadius Customer Success Story</p>\n<p><a href=\"https://www.loginradius.com/contact-us?utm_source=blog&#x26;utm_medium=web&#x26;utm_campaign=ifma-loginradius-customer-success-story\"><img src=\"/8fce571f703a5970dbb1359a2fe0e51a/book-a-demo-loginradius.webp\" alt=\"book-free-demo-loginradius\"></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"January 15, 2018","updated_date":null,"title":"IFMA, a LoginRadius Customer Success Story","tags":["other"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":0.975609756097561,"src":"/static/f9d85c5c91a2b4bd12993531023a8385/6e368/ifma-loginradius-customer-success-story.webp","srcSet":"/static/f9d85c5c91a2b4bd12993531023a8385/61e93/ifma-loginradius-customer-success-story.webp 200w,\n/static/f9d85c5c91a2b4bd12993531023a8385/6e368/ifma-loginradius-customer-success-story.webp 208w","sizes":"(max-width: 208px) 100vw, 208px"}}},"author":{"id":"Karl Wittig","github":null,"avatar":null}}}}]}},"pageContext":{"tag":"other"}},"staticQueryHashes":["1171199041","1384082988","2100481360","23180105","528864852"]}