The CMO’s New Role: 360 Degree Customer Engagement

Posted by Mo Nezarati on December 15, 2016

Once, chief marketing officers (CMOs) were primarily tasked with brand management, market research and advertising. Today they’re being asked to do a whole lot more—from implementing technologies to analyzing data to customer service to measuring impact—all in an effort to forge stronger bonds with customers.

Read More

Topics: CX, SMS, bots

Failed Delivery? Top Factors That Affect Message Delivery

Posted by Bryan Dingwall on December 1, 2016

In spite of its popularity and ease-of-use across the world, SMS delivery is not always guaranteed, and several factors influence the successful delivery of sent messages. From number validity to routing factors, this article will address some of the top factors that affect message delivery. If you’re a mobile app developer, you should take them into consideration when building and testing your apps.

Read More

Topics: Phone Numbers, SMS, messaging

How Secure is SMS-Based Two-Factor Authentication?

Posted by Alex Misevski on November 17, 2016

With the current increase in digital crime and internet fraud, depending on passwords is no longer sufficient, and two-factor authentication is becoming a critical aspect of maintaining the security of mobile applications. In fact, a recent report indicated that more than half a billion online personal records were breached in 2015, and mostly through mobile devices. Therefore, strengthening the authentication process should be a priority of any mobile app developer.

How It Works

Two-factor authentication, as the name suggests, involves presenting two authentication credentials to ascertain the legitimacy of the user signing in to an iOS or Android app. It adds an extra layer of security by sending a random code to an individual’s device using an SMS message, which the user will input, along with a name and password, to gain access to his or her account.

When a mobile app user wants to log into his or her account, he or she will be prompted to validate with a unique username and password—which is the initial authentication layer.

Next, the two-step verification will require an additional procedure to reconfirm the user’s credentials. The most cost-effective procedure involves using either one-time-password (OTP) security tokens sent via SMS to the user’s mobile device or out-of-band (OOB) methods involving completing the authentication process over a different channel other than the primary one.

The purpose of the additional step is to discourage attackers who are trying to steal a user’s information by fraudulently penetrating their accounts. If you integrate dual factor authentication into your apps, a cybercriminal will require both the first verification process as well as the OTP to gain access to a user's’ credentials.

With the two-step verification technique, even if a hacker has retrieved a user’s username and password by exploiting a vulnerability in a mobile application, taking complete control of the account will be difficult because of the absence of the one-time-password, which must be sent as an SMS to the user’s mobile device. Consequently, this results in fewer security breaches and reduced total costs on interruption.

Read More

Topics: Security, mobile apps, SMS