{"id":27764,"date":"2022-07-15T17:20:03","date_gmt":"2022-07-15T16:20:03","guid":{"rendered":"https:\/\/www.intercom.com\/blog\/?p=27764"},"modified":"2024-10-22T17:49:58","modified_gmt":"2024-10-22T16:49:58","slug":"security-best-practices-intercom-workspace","status":"publish","type":"post","link":"https:\/\/www.intercom.com\/blog\/security-best-practices-intercom-workspace\/","title":{"rendered":"Best practices for securing your Intercom workspace"},"content":{"rendered":"<p>When running an online business, you have to be very aware of the wide variety of threats you face, where your vulnerabilities lie, and how to protect yourself from those risks.<\/p>\n<p>Essentially, this is your \u201cthreat model\u201d. What assets do you have and who wants them? If you\u2019re online, so is your data and your customers\u2019 data, which must be protected. Going further than that, your customers have to trust you with that data. No matter the size of your business, there are countless vulnerabilities and threat actors which may expose that data \u2013 and if customer trust is lost, it can be very hard to win back.<\/p>\n<p>How do you keep your business secure and also build and maintain the trust of your customers? We are extremely <a href=\"https:\/\/www.intercom.com\/blog\/intercom-for-enterprise-security\/\">conscious of our own security<\/a> \u2013 and that extends to our obligation to provide a safe and secure tool to our customers.<\/p>\n<p>In this post we\u2019ll talk about how to best secure your Intercom workspace and ensure you keep that data safe. We&#8217;ll cover:<\/p>\n<ul>\n<li>The importance of having strong teammate authentication for your workspace.<\/li>\n<li>How you should prevent user impersonation and conversation theft in your Messenger.<\/li>\n<li>How to implement &#8220;least privilege&#8221; with roles and permissions.<\/li>\n<li>How to see suspicious activity in your workspace and and how to add a security contact for important security-related communications.<\/li>\n<\/ul>\n<h2 id=\"secure-your-teammate-logins-with-2fa-sso-or-saml\">Secure your teammate logins with 2FA, SSO, or SAML<\/h2>\n<p><a href=\"https:\/\/www.verizon.com\/business\/resources\/reports\/2022\/dbir\/2022-data-breach-investigations-report-dbir.pdf\">Research shows<\/a> that shows that 82% of breaches last year were due to what&#8217;s known as the &#8220;human element&#8221; \u2013 hackers gaining access by deceiving people rather than finding weaknesses in code. As a result, securing access to your workspace is the most important area to focus on.<\/p>\n<p>By strengthening the access model for your workspace, you reduce the chances of the human element playing a part in any security issues. Have your <a href=\"https:\/\/haveibeenpwned.com\/\">credentials been in a breach<\/a>? Do you reuse passwords? Do any of your teammates?<\/p>\n<blockquote class=\"pullquote-style-one\"><p>&#8220;The attackers could talk to your customers directly, damage your reputation, or send spam under your brand&#8221;<\/p><\/blockquote>\n<p>If someone gets access to your workspace and customer conversations, that may create privacy issues under applicable law such as GDPR. The attackers could talk to your customers directly, damage your reputation, or send spam under your brand.<\/p>\n<p>While Intercom does support plain login and password, we highly recommend adding extra layers of security to that, either via <a href=\"https:\/\/www.intercom.com\/blog\/help\/en\/articles\/181-protect-your-account-with-2fa-google-sign-on-or-saml-sso\">two-factor authentication, Google SSO, or SAML<\/a>, if you\u2019re an Enterprise customer. This makes it that much harder for someone who compromises a credential to get access to your entire workspace.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.intercom.com\/blog\/wp-content\/uploads\/2022\/07\/Security-Login-Settings-Shadow.jpg\" \/><\/p>\n<p><strong>Key takeaway:<\/strong> Strengthen your <a href=\"https:\/\/app.intercom.com\/a\/apps\/_\/settings\/security\">login security in Settings<\/a>.<\/p>\n<h2 id=\"secure-your-user-conversations-with-identity-verification\">Secure your user conversations with Identity Verification<\/h2>\n<p>If you\u2019re using Intercom, you\u2019re likely using our world-class Messenger for chatting with your website visitors and logged-in users.<\/p>\n<p>But if you have a conversation with your user Bob, how can you be sure it\u2019s really Bob and not an impersonator? What if someone is just saying they\u2019re Bob but they\u2019re not actually him? That\u2019s where <a href=\"https:\/\/www.intercom.com\/blog\/help\/en\/articles\/183-enable-identity-verification-for-web-and-mobile\">Identity Verification<\/a> comes in.<\/p>\n<blockquote class=\"pullquote-style-two\"><p>&#8220;We strongly recommend enabling Identity Verification to prevent impersonation&#8221;<\/p><\/blockquote>\n<p>No matter if you\u2019re using Intercom for visitors or users or both, we strongly recommend enabling Identity Verification. Identity Verification allows you to send us a unique identity token for each of your users, meaning you\u2019re able to know with certainty which Bob is the real Bob.<\/p>\n<p>Even if you don\u2019t have any users on your workspace, we\u2019d still recommend you <a href=\"https:\/\/app.intercom.com\/a\/apps\/_\/settings\/security\">enforce Identity Verification<\/a> as it will prevent any malicious creation of users in your workspace. Enabling it won\u2019t impact your website visitors as anyone who starts a conversation will be identified by a unique cookie in their browser. Furthermore, you should also enable Identity Verification for your <a href=\"https:\/\/www.intercom.com\/blog\/help\/en\/articles\/183-enable-identity-verification-for-web-and-mobile\">iOS and\/or Android apps<\/a>.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.intercom.com\/blog\/wp-content\/uploads\/2022\/07\/Security-Identity-Verification-Shadow.jpg\" \/><\/p>\n<p><strong>Key takeaway:<\/strong> Set up and enforce <a href=\"https:\/\/www.intercom.com\/blog\/help\/en\/articles\/183-enable-identity-verification-for-web-and-mobile\">Identity Verification for your workspace in Settings<\/a>.<\/p>\n<h2 id=\"use-roles-and-permissions-to-implement-least-privilege\">Use Roles and Permissions to implement \u201cleast privilege\u201d<\/h2>\n<p>You can control what actions your teammates can take via <a href=\"https:\/\/www.intercom.com\/blog\/help\/en\/articles\/3659500-manage-permissions-effortlessly-with-custom-roles\">Permissions and Roles<\/a>. This can be really powerful to limit certain privileged actions to only a small number of teammates in your workspace \u2013 this approach is also known as \u201cleast privilege\u201d.<\/p>\n<p>In practice, it means you\u2019re only giving your teammates the powers they need to do their job and in doing so you limit the blast radius of any potential account takeover incident.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.intercom.com\/blog\/wp-content\/uploads\/2022\/07\/Security-Roles-Permissions-Shadow.jpg\" \/><\/p>\n<p><strong>Key takeaway:<\/strong> Set up <a href=\"https:\/\/www.intercom.com\/blog\/help\/en\/articles\/3659500-manage-permissions-effortlessly-with-custom-roles\">Roles in your workspace now<\/a>.<\/p>\n<h2 id=\"seeing-whats-going-on-inside-your-workspace\">Seeing what\u2019s going on inside your workspace<\/h2>\n<p>Even after you have roles, it\u2019s still good to periodically check your Teammate Activity Logs for suspicious activity.<\/p>\n<blockquote class=\"pullquote-style-one\"><p>&#8220;It\u2019s important to see whose logins are failing, who\u2019s being invited, settings being changed, or maybe a bulk export of all your data&#8221;<\/p><\/blockquote>\n<p>If you have a lot of teammates, it\u2019s important to see whose logins are failing, who\u2019s being invited, settings being changed, or maybe a bulk export of all your data. These insights are a valuable way of detecting any suspicious behavior and guard against the small but dangerous risk of internal bad actors.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.intercom.com\/blog\/wp-content\/uploads\/2022\/07\/Security-Activity-Log-Shadow.jpg\" \/><\/p>\n<p><strong>Key takeaway:<\/strong> Check your <a href=\"https:\/\/www.intercom.com\/blog\/help\/en\/articles\/4667982-review-actions-taken-in-your-workspace-with-teammate-activity-logs\">Teammate Activity Logs in Settings<\/a>.<\/p>\n<h2 id=\"vigilance-is-forever\">Vigilance is forever<\/h2>\n<p>The best advice we can give is to remain vigilant. The battle is never over. You can\u2019t \u201cachieve\u201d security. Stay humble, be prepared, and don\u2019t rest on your laurels!<\/p>\n<p>If we ever need to get in touch with you about a security issue, we\u2019ll use the Security contact in your workspace. You can set one in <a href=\"https:\/\/app.intercom.com\/a\/apps\/_\/settings\/security\">your Security settings<\/a>.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.intercom.com\/blog\/wp-content\/uploads\/2022\/07\/Security-Roles-Contact-Shadow-1.jpg\" \/><\/p>\n<p>It doesn\u2019t need to be a teammate on your workspace, it could be your security alias \u2013 for instance, ours is <a href=\"mailto:security@intercom.com\">security@intercom.com<\/a>, which you can use if you need to report an issue to us! \ud83d\ude42<\/p>\n<p class=\"inline-cta-quote\"><a href=\"https:\/\/www.intercom.com\/blog\/help\/en\/collections\/2094822-installing-intercom#security-in-your-workspace\" target=\"_blank\" rel=\"noopener\">For more resources on how to securely manage your Intercom workspace, check out our Security documentation.<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>How do you keep your business secure and also build and maintain the trust of your customers? Learn how to best secure your Intercom workspace and ensure you keep that data safe.<\/p>\n","protected":false},"author":241,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"category":[12898],"tags":[280,25074,331],"coauthors":[517],"class_list":["post-27764","post","type-post","status-publish","format-standard","hentry","category-engineering","tag-best-practices","tag-identity-verification","tag-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Best practices for securing your Intercom workspace - The Intercom Blog<\/title>\n<meta name=\"description\" content=\"How do you keep your business secure and also build and maintain the trust of your customers? Learn how to secure your Intercom workspace.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intercom.com\/blog\/security-best-practices-intercom-workspace\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Best practices for securing your Intercom workspace\" \/>\n<meta property=\"og:description\" content=\"How do you keep your business secure and also build and maintain the trust of your customers? Learn how to secure your Intercom workspace.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intercom.com\/blog\/security-best-practices-intercom-workspace\/\" \/>\n<meta property=\"og:site_name\" content=\"The Intercom Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/intercominc\" \/>\n<meta property=\"article:published_time\" content=\"2022-07-15T16:20:03+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-10-22T16:49:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intercom.com\/blog\/wp-content\/uploads\/2022\/07\/Security-Login-Settings-Shadow.jpg\" \/>\n<meta name=\"author\" content=\"Penny Gray\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@intercom\" \/>\n<meta name=\"twitter:site\" content=\"@intercom\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Penny Gray\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.intercom.com\\\/blog\\\/security-best-practices-intercom-workspace\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.intercom.com\\\/blog\\\/security-best-practices-intercom-workspace\\\/\"},\"author\":{\"name\":\"Penny Gray\",\"@id\":\"https:\\\/\\\/www.intercom.com\\\/blog\\\/#\\\/schema\\\/person\\\/c86751a91f068cc695958a684f7891ee\"},\"headline\":\"Best practices for securing your Intercom workspace\",\"datePublished\":\"2022-07-15T16:20:03+00:00\",\"dateModified\":\"2024-10-22T16:49:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.intercom.com\\\/blog\\\/security-best-practices-intercom-workspace\\\/\"},\"wordCount\":978,\"publisher\":{\"@id\":\"https:\\\/\\\/www.intercom.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.intercom.com\\\/blog\\\/security-best-practices-intercom-workspace\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.intercom.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/07\\\/Security-Login-Settings-Shadow.jpg\",\"keywords\":[\"best practices\",\"identity verification\",\"security\"],\"articleSection\":[\"Engineering\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.intercom.com\\\/blog\\\/security-best-practices-intercom-workspace\\\/\",\"url\":\"https:\\\/\\\/www.intercom.com\\\/blog\\\/security-best-practices-intercom-workspace\\\/\",\"name\":\"Best practices for securing your Intercom workspace - The Intercom Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.intercom.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.intercom.com\\\/blog\\\/security-best-practices-intercom-workspace\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.intercom.com\\\/blog\\\/security-best-practices-intercom-workspace\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.intercom.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/07\\\/Security-Login-Settings-Shadow.jpg\",\"datePublished\":\"2022-07-15T16:20:03+00:00\",\"dateModified\":\"2024-10-22T16:49:58+00:00\",\"description\":\"How do you keep your business secure and also build and maintain the trust of your customers? Learn how to secure your Intercom workspace.\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.intercom.com\\\/blog\\\/security-best-practices-intercom-workspace\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.intercom.com\\\/blog\\\/security-best-practices-intercom-workspace\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.intercom.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/07\\\/Security-Login-Settings-Shadow.jpg\",\"contentUrl\":\"https:\\\/\\\/www.intercom.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/07\\\/Security-Login-Settings-Shadow.jpg\",\"width\":1700,\"height\":1200,\"caption\":\"Intercom Security Best Practices \u2013\u00a0Authentication\"},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.intercom.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.intercom.com\\\/blog\\\/\",\"name\":\"The Intercom Blog\",\"description\":\"Articles and Podcasts on Customer Service, AI and Automation, Product, and more\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.intercom.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.intercom.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.intercom.com\\\/blog\\\/#organization\",\"name\":\"The Intercom Blog\",\"url\":\"https:\\\/\\\/www.intercom.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.intercom.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.intercom.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/08\\\/Intercom-logo-sq-black-trans.png\",\"contentUrl\":\"https:\\\/\\\/www.intercom.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/08\\\/Intercom-logo-sq-black-trans.png\",\"width\":1000,\"height\":1000,\"caption\":\"The Intercom Blog\"},\"image\":{\"@id\":\"https:\\\/\\\/www.intercom.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/intercominc\",\"https:\\\/\\\/x.com\\\/intercom\",\"https:\\\/\\\/www.instagram.com\\\/intercom\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/2491343\",\"https:\\\/\\\/www.pinterest.ie\\\/intercom\\\/\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCJG0MvLP03kyzzAkD-w98aQ\",\"https:\\\/\\\/en.wikipedia.org\\\/wiki\\\/Intercom_(company)\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.intercom.com\\\/blog\\\/#\\\/schema\\\/person\\\/c86751a91f068cc695958a684f7891ee\",\"name\":\"Penny Gray\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0eff08f3368713a4fe69048013deb488e2232208722802027a21e741ebe3f880?s=96&d=mm&r=pg8250e977eeb35832e30ff18e86a28157\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0eff08f3368713a4fe69048013deb488e2232208722802027a21e741ebe3f880?s=96&d=mm&r=pg\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0eff08f3368713a4fe69048013deb488e2232208722802027a21e741ebe3f880?s=96&d=mm&r=pg\",\"caption\":\"Penny Gray\"},\"url\":\"https:\\\/\\\/www.intercom.com\\\/blog\\\/author\\\/pennymerelle\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Best practices for securing your Intercom workspace - The Intercom Blog","description":"How do you keep your business secure and also build and maintain the trust of your customers? Learn how to secure your Intercom workspace.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intercom.com\/blog\/security-best-practices-intercom-workspace\/","og_locale":"en_US","og_type":"article","og_title":"Best practices for securing your Intercom workspace","og_description":"How do you keep your business secure and also build and maintain the trust of your customers? Learn how to secure your Intercom workspace.","og_url":"https:\/\/www.intercom.com\/blog\/security-best-practices-intercom-workspace\/","og_site_name":"The Intercom Blog","article_publisher":"https:\/\/www.facebook.com\/intercominc","article_published_time":"2022-07-15T16:20:03+00:00","article_modified_time":"2024-10-22T16:49:58+00:00","og_image":[{"url":"https:\/\/www.intercom.com\/blog\/wp-content\/uploads\/2022\/07\/Security-Login-Settings-Shadow.jpg","type":"","width":"","height":""}],"author":"Penny Gray","twitter_card":"summary_large_image","twitter_creator":"@intercom","twitter_site":"@intercom","twitter_misc":{"Written by":"Penny Gray","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.intercom.com\/blog\/security-best-practices-intercom-workspace\/#article","isPartOf":{"@id":"https:\/\/www.intercom.com\/blog\/security-best-practices-intercom-workspace\/"},"author":{"name":"Penny Gray","@id":"https:\/\/www.intercom.com\/blog\/#\/schema\/person\/c86751a91f068cc695958a684f7891ee"},"headline":"Best practices for securing your Intercom workspace","datePublished":"2022-07-15T16:20:03+00:00","dateModified":"2024-10-22T16:49:58+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intercom.com\/blog\/security-best-practices-intercom-workspace\/"},"wordCount":978,"publisher":{"@id":"https:\/\/www.intercom.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.intercom.com\/blog\/security-best-practices-intercom-workspace\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intercom.com\/blog\/wp-content\/uploads\/2022\/07\/Security-Login-Settings-Shadow.jpg","keywords":["best practices","identity verification","security"],"articleSection":["Engineering"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.intercom.com\/blog\/security-best-practices-intercom-workspace\/","url":"https:\/\/www.intercom.com\/blog\/security-best-practices-intercom-workspace\/","name":"Best practices for securing your Intercom workspace - The Intercom Blog","isPartOf":{"@id":"https:\/\/www.intercom.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intercom.com\/blog\/security-best-practices-intercom-workspace\/#primaryimage"},"image":{"@id":"https:\/\/www.intercom.com\/blog\/security-best-practices-intercom-workspace\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intercom.com\/blog\/wp-content\/uploads\/2022\/07\/Security-Login-Settings-Shadow.jpg","datePublished":"2022-07-15T16:20:03+00:00","dateModified":"2024-10-22T16:49:58+00:00","description":"How do you keep your business secure and also build and maintain the trust of your customers? Learn how to secure your Intercom workspace.","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intercom.com\/blog\/security-best-practices-intercom-workspace\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.intercom.com\/blog\/security-best-practices-intercom-workspace\/#primaryimage","url":"https:\/\/www.intercom.com\/blog\/wp-content\/uploads\/2022\/07\/Security-Login-Settings-Shadow.jpg","contentUrl":"https:\/\/www.intercom.com\/blog\/wp-content\/uploads\/2022\/07\/Security-Login-Settings-Shadow.jpg","width":1700,"height":1200,"caption":"Intercom Security Best Practices \u2013\u00a0Authentication"},{"@type":"WebSite","@id":"https:\/\/www.intercom.com\/blog\/#website","url":"https:\/\/www.intercom.com\/blog\/","name":"The Intercom Blog","description":"Articles and Podcasts on Customer Service, AI and Automation, Product, and more","publisher":{"@id":"https:\/\/www.intercom.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intercom.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.intercom.com\/blog\/#organization","name":"The Intercom Blog","url":"https:\/\/www.intercom.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.intercom.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.intercom.com\/blog\/wp-content\/uploads\/2019\/08\/Intercom-logo-sq-black-trans.png","contentUrl":"https:\/\/www.intercom.com\/blog\/wp-content\/uploads\/2019\/08\/Intercom-logo-sq-black-trans.png","width":1000,"height":1000,"caption":"The Intercom Blog"},"image":{"@id":"https:\/\/www.intercom.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/intercominc","https:\/\/x.com\/intercom","https:\/\/www.instagram.com\/intercom\/","https:\/\/www.linkedin.com\/company\/2491343","https:\/\/www.pinterest.ie\/intercom\/","https:\/\/www.youtube.com\/channel\/UCJG0MvLP03kyzzAkD-w98aQ","https:\/\/en.wikipedia.org\/wiki\/Intercom_(company)"]},{"@type":"Person","@id":"https:\/\/www.intercom.com\/blog\/#\/schema\/person\/c86751a91f068cc695958a684f7891ee","name":"Penny Gray","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/0eff08f3368713a4fe69048013deb488e2232208722802027a21e741ebe3f880?s=96&d=mm&r=pg8250e977eeb35832e30ff18e86a28157","url":"https:\/\/secure.gravatar.com\/avatar\/0eff08f3368713a4fe69048013deb488e2232208722802027a21e741ebe3f880?s=96&d=mm&r=pg","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0eff08f3368713a4fe69048013deb488e2232208722802027a21e741ebe3f880?s=96&d=mm&r=pg","caption":"Penny Gray"},"url":"https:\/\/www.intercom.com\/blog\/author\/pennymerelle\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.intercom.com\/blog\/wp-json\/wp\/v2\/posts\/27764","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.intercom.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.intercom.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.intercom.com\/blog\/wp-json\/wp\/v2\/users\/241"}],"replies":[{"embeddable":true,"href":"https:\/\/www.intercom.com\/blog\/wp-json\/wp\/v2\/comments?post=27764"}],"version-history":[{"count":0,"href":"https:\/\/www.intercom.com\/blog\/wp-json\/wp\/v2\/posts\/27764\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.intercom.com\/blog\/wp-json\/wp\/v2\/media?parent=27764"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.intercom.com\/blog\/wp-json\/wp\/v2\/category?post=27764"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.intercom.com\/blog\/wp-json\/wp\/v2\/tags?post=27764"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.intercom.com\/blog\/wp-json\/wp\/v2\/coauthors?post=27764"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}