Search icon CANCEL
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Mastering Salesforce Experience Cloud

You're reading from   Mastering Salesforce Experience Cloud Strategies for creating powerful customer interactions

Arrow left icon
Product type Paperback
Published in Oct 2024
Publisher Packt
ISBN-13 9781835466346
Length 328 pages
Edition 1st Edition
Arrow right icon
Toc

Table of Contents (22) Chapters Close

Preface 1. Part 1:Curating a Digital Experience Strategy FREE CHAPTER
2. Chapter 1: Defining Your Digital Experience Strategy 3. Chapter 2: Translating Your Audience and Interactions into Meaningful Technology Features 4. Chapter 3: Technology Component Identification – Which Parts of Experience Cloud Do I Need? 5. Part 2: Infrastructure Setup to Support and Customize Design Strategy
6. Chapter 4: Curating Data Models 7. Chapter 5: Understanding Experience Cloud Templates 8. Chapter 6: When to Use Aura Components, Lightning Web Components, and Lightning Runtime Components 9. Part 3: Human-Centric Development
10. Chapter 7: Leveraging Screen Flows versus Apex 11. Chapter 8: Understanding Inputs – Emails, Chats, and Text Messages 12. Chapter 9: Marketing Automation Setup 13. Chapter 10: Leveraging Case Management and Knowledge Bases 14. Part 4: Site Launch
15. Chapter 11: Security – Authentication, Data Sharing, and Encryption 16. Chapter 12: Monitoring Your Site – Salesforce Native Reporting 17. Chapter 13: Site Launch, Maintenance, and Moderation 18. Part 5: Certifications
19. Chapter 14: Best Practices and Certification Test Preparation 20. Index 21. Other Books You May Enjoy

Security – Authentication, Data Sharing, and Encryption

While cyber-attacks are definitely on the rise, most data breaches aren’t committed by people who growl, “I’m in” as a bunch of neon green letters stream down a page to “hack” into “the mainframe.” Data breaches mostly happen when someone at a corporation is sloppy, not paying attention, or deceived by an outside party. Make no mistake, hackers absolutely exist, and good ones can definitely code their way around vulnerabilities in your system architecture to get what they’re after. However, the true culprit behind data leaks is usually people within their own organization making preventable mistakes in a hurry.

Good Information Security (InfoSec) practices start with the right mindset: designing for caution and prioritizing safety first. With anything externally-facing such as a digital site, you need to be especially thoughtful about the security mechanisms...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at €18.99/month. Cancel anytime