top of page


The Hidden Vulnerability: How Compromised Credentials Fuel Ransomware and Beyond
In today's interconnected digital landscape, the security of a company's sensitive data is only as strong as its weakest link. While...
Don Bush
Jun 114 min read
3
0


Email: More Dangerous than Ever
Most businesses and people assume email is secure. It is not. Every year millions of compromised email accounts are used by fraudsters....
Don Bush
Jun 43 min read
780
0


From Boasting to Breach: The Escalating Risk of Your Online Life
Imagine Johnny, an AI expert, famous for his globetrotting talks, boasting about racking up over a million Delta miles. Unbeknownst to...
Grace Howard
May 283 min read
5
0


myNetWatchman Welcomes Madhura Belani as Chief Product Officer
Belani to Drive Innovation in ATO Prevention and Enhanced Cybersecurity myNetWatchman, a leader in real-time compromised credential...
David Montague
May 212 min read
12
0


From Inbox to Outbreak: The BEC and FTF Epidemic
#emailfraud, #bec, #emailreputation
Grace Howard
May 143 min read
14
0


Verizon Report: Proactive Credential Screening - Your First Line of Cyber Defense
#credentialscreening, #ATOprevention, #VerizonDBIR, #cybersecurity
Don Bush
May 73 min read
6
0


Exclusive Webinar - From Target to Fortress: Safeguarding the Travel Industry Against Account Takeover
Register now for this April 22, 2025 webinar presented by myNetWatchman and Loyalty Security Alliance
Don Bush
Apr 91 min read
411
0


Anyone Can Get Phished
#phishing #itcanhappentoanyone #fraudprevention
Jen Baldwin
Apr 22 min read
367
0


Another One Bites the Dust: 23andMe Bankruptcy a Stark Reminder of Credential Stuffing's Cost
#credstuffing #compromisedmuch? #credentialstuffed #mynetwatchmanidentityhelp
Grace Howard
Mar 263 min read
453
0


Stolen Miles, Shattered Dreams: How Account Takeover Wreaks Havoc
#travel, #loyaltyprogram, #airlines, #hotels, #carrental, #ATO
Don Bush
Mar 123 min read
336
0


The Three Factors of Authentication: A Fraudster's Playground
#onlinefraud #fraudtactics #faceid #touchid
Jen Baldwin
Mar 53 min read
31
0


Bruce Lee Got it Right, “Be Like Water” or “Don't Block IP Addresses”
#identityintelligence #bestpractice #fraudprevention #brucelee, #belikewater
Jen Baldwin
Feb 262 min read
11
0


Act fast to stay ahead of fraudsters
Catch them before they damage your customers & business #fraudprevention #cybersecurity #credentialstuffing #datasecurity #databreach
Karen Simmons
Feb 193 min read
13
0


Don Bush
Feb 123 min read
20
0


Please Don't Block My Grandma Because My Fridge is Hacked! (Or, Why IP Blocking is Dumb)
Story time! Gather 'round and gain some wisdom.
#identityintelligence #bestpractice #fraudprevention
Jen Baldwin
Feb 52 min read
28
0


Canary in the Coal Mine: Detecting Account Takeover Before Your Digital Canary Dies
Use active web monitoring to protect your business from credential stuffing & account takeovers. #Cybersecurity #DataBreach #AccountTakeover
Rob Long
Jan 153 min read
18
0


The Security Paradox: How to Protect Users Without Ticking Them Off
Login processes can make or break a user experience. Excessive reliance on multi-factor authentication (MFA) often deters users from...
Karen Simmons
Dec 4, 20243 min read
24
0


Is your Identity Solution Balanced? Prevention or Remediation
Balancing prevention & remediation is key in protecting against ATO. Choose the right mix to minimize risk & customer friction.
Justin McDonald
Nov 20, 20243 min read
18
0


Special Holiday Introductory offer from myNetWatchman
Don’t let increased holiday fraud get you. Now until 1/31/2025 get unlimited use of mNW’s Email Reputation portal at a low one-time cost
Rob Long
Nov 14, 20242 min read
20
0


How Bad Actors Take Over Email Accounts
Email accounts are high-value targets for cybercriminals. Read about their takeover tactics and how Email Reputation tools can help
Rob Long
Nov 14, 20244 min read
19
0
bottom of page